An approach to custom privacy policy violation detection problems using big social provenance data

被引:26
作者
Baeth, Mohamed Jehad [1 ]
Aktas, Mehmet S. [1 ]
机构
[1] Yildiz Teknik Univ, Dept Comp Engn, TR-34349 Istanbul, Turkey
关键词
big provenance data; complex event processing; privacy policy detection; real-time data processing; real-time monitoring;
D O I
10.1002/cpe.4690
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Social media software changes its system-wide privacy policies over time. Changes in such system-wide policies affect the privacy policies of the individual users. In turn, social media users lack the ability to configure and enforce customized privacy policies according to the precise privacy measure that they demand. To this end, we argue that there is an emerging need for third-party solutions that are independent of existing social media software and that can detect custom privacy policy violations. In order to address this need, we propose an approach to detecting custom privacy violations for social media users. We also introduce a generic software architecture that can be integrated with existing social media software to enable users to keep track of their data. The proposed solution utilizes social provenance data, which is defined as the metadata that describe the lifecycle of the data. To facilitate testing of the software architecture, we developed a prototype implementation and generated a large-scale synthetic provenance dataset. We discuss the details of the prototype implementation and the synthetic dataset. We evaluate the performance of the prototype under an increasing workload. We show the usability of the proposed architecture, as the initial performance testing results are promising.
引用
收藏
页数:9
相关论文
共 25 条
[1]   High-performance hybrid information service architecture [J].
Aktas, Mehmet S. ;
Pierce, Marlon .
CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2010, 22 (15) :2095-2123
[2]  
Aktas MehmetS., 2013, Data Provenance and Data Management in eScience, P59
[3]  
Aktas MS, 2018, PRONALIZ PROJECT WEB
[4]  
Aktas MS, 2017, CONCURR COMPUT PRACT
[5]  
[Anonymous], 2012, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, (Austin, TX, USA)
[6]  
[Anonymous], THESIS
[7]  
[Anonymous], 2012, P 8 S US PRIV SEC JU
[8]  
Baeth MJ, 2017, 9 INT C ADV DAT KNOW
[9]  
Carpenter Craig C., 2013, J INTERNET L, V16, P1
[10]   Temporal representation for mining scientific data provenance [J].
Chen, Peng ;
Plale, Beth ;
Aktas, Mehmet S. .
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE, 2014, 36 :363-378