Access Control Policy Misconfiguration Detection in Online Social Networks

被引:8
作者
Javed, Yousra [1 ]
Shehab, Mohamed [1 ]
机构
[1] Univ N Carolina, Coll Comp & Informat, Charlotte, NC 28223 USA
来源
2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM) | 2013年
关键词
Policy; Access Control; Privacy; Social Network;
D O I
10.1109/SocialCom.2013.82
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The ability to stay connected with friends online and share information, has accounted for the popularity of online social networking websites. However, the overwhelming task of access control policy management for information shared on these websites has resulted in various mental models of sharing with a false sense of privacy. The misalignment between a user's intended and actual privacy settings causes access control misconfigurations, raising the risk of unintentional privacy leaks. In this paper, we propose a scheme to extract the user's mental model of sharing, enhance this model using information learned from their existing policies, and enable them to compose misconfiguration free policies. We present the possible misconfiguration patterns based on which we scan the Facebook user's access control policies. We implemented a prototype Facebook application of our scheme and conducted a pilot study using Amazon Mechanical Turk. Our preliminary results show that the users' intended policies were significantly different than their actual policies. Our scheme was able to detect the misconfiguration patterns in album policies. However, the reduction in the number of misconfigurations after using our approach was not significant. Participants' perceptions of our proposed policy misconfiguration patterns and the usability of our scheme was positive.
引用
收藏
页码:544 / 549
页数:6
相关论文
共 17 条
[1]  
Acquisti A., 2005, Proceedings of WPES05, P71
[2]  
Acquisti A, 2006, LECT NOTES COMPUT SC, V4258, P36
[3]  
[Anonymous], 2010, New York Times.
[4]  
[Anonymous], 2012, P 8 S US PRIV SEC JU
[5]  
[Anonymous], 2008, UPSEC
[6]  
Anwar M., 2012, Proceedings of the 27th Annual ACM Symposium on Applied Computing, SAC '12, P1443
[7]  
Church L., 2009, SOUPS 09, P20
[8]  
Eda T., 2009, WWW 09, P1199
[9]  
Egelman S, 2011, 29TH ANNUAL CHI CONFERENCE ON HUMAN FACTORS IN COMPUTING SYSTEMS, P2295
[10]  
Fang L., 2010, Proceedings of the 19th International Conference on World Wide Web (WWW), P351, DOI DOI 10.1145/1772690.1772727