Modeling the Risk & Utility of Information Sharing in Social Networks

被引:3
作者
Fouad, Mohamed R. [1 ]
Elbassioni, Khaled [2 ]
Bertino, Elisa [1 ]
机构
[1] Purdue Univ, Dept Comp Sci, W Lafayette, IN 47907 USA
[2] Max Planck Inst Informat, Dept Algorithms & Complex 1, D-66123 Saarbrucken, Germany
来源
PROCEEDINGS OF 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY, RISK AND TRUST AND 2012 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM/PASSAT 2012) | 2012年
关键词
privacy; risk; trust; access control; scalability;
D O I
10.1109/SocialCom-PASSAT.2012.131
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
With the widespread of social networks, the risk of information sharing has become inevitable. Sharing a user's particular information in social networks is an all-or-none decision. Users receiving friendship invitations from others may decide to accept this request and share their information or reject it in which case none of their information will be shared. Access control in social networks is a challenging topic. Social network users would want to determine the optimum level of details at which they share their personal information with other users based on the risk associated with the process. In this paper, we formulate the problem of data sharing in social networks using two different models: (i) a model based on diffusion kernels, and (ii) a model based on access control. We show that it is hard to apply the former in practice and explore the latter. We prove that determining the optimal levels of information sharing is an NP-hard problem and propose an approximation algorithm that determines to what extent social network users share their own information. We propose a trust-based model to assess the risk of sharing sensitive information and use it in the proposed algorithm. Moreover, we prove that the algorithm could be solved in polynomial time. Our results rely heavily on adopting the supermodularity property of the risk function, which allows us to employ techniques from convex optimization. To evaluate our model, we conduct a user study to collect demographic information of several social networks users and get their perceptions on risk and trust. In addition, through experimental studies on synthetic data, we compare our proposed algorithm with the optimal algorithm both in terms of risk and time. We show that the proposed algorithm is scalable and that the sacrifice in risk is outweighed by the gain in efficiency.
引用
收藏
页码:441 / 450
页数:10
相关论文
共 15 条
[1]  
[Anonymous], P ADV NEUR INF PROC
[2]  
[Anonymous], 2003, SIAM monographs on discrete mathematics and applications
[3]  
[Anonymous], [No title captured]
[4]  
[Anonymous], 2002, P 19 INT C MACH LEAR
[5]   Solving convex programs by random walks [J].
Bertsimas, D ;
Vempala, S .
JOURNAL OF THE ACM, 2004, 51 (04) :540-556
[6]  
Damiani E., 2002, ACM Transactions on Information and Systems Security, V5, P169, DOI 10.1145/505586.505590
[7]  
Fouad MR, 2008, LECT NOTES COMPUT SC, V5159, P32, DOI 10.1007/978-3-540-85259-9_3
[8]  
Fouad M. R., 2012, 20121 CERIAS PURD U
[9]  
Gratzer G., 2003, GEN LATTICE THEORY
[10]  
Grotschel M., 1993, Geometric Algorithms and Combinatorial Optimization, V2