Modeling Unintended Personal-Information Leakage from Multiple Online Social Networks

被引:50
作者
Irani, Danesh [1 ]
Webb, Steve
Pu, Calton [2 ]
Li, Kang [3 ]
机构
[1] Georgia Inst Technol, Comp Sci Program, Atlanta, GA 30332 USA
[2] Georgia Inst Technol, Sch Comp Sci, Atlanta, GA 30332 USA
[3] Univ Georgia, Athens, GA 30602 USA
基金
美国国家卫生研究院; 美国国家科学基金会;
关键词
personal information leakage; security and privacy; Social networks;
D O I
10.1109/MIC.2011.25
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
Most people have multiple accounts on different social networks. Because these networks offer various levels of privacy protection, the weakest privacy policies in the social network ecosystem determine how much personal information is disclosed online. A new information leakage measure quantifies the information available about a given user. Using this measure makes it possible to evaluate the vulnerability of a user's social footprint to two known attacks: physical identification and password recovery. Experiments show the measure's usefulness in quantifying information leakage from publicly crawled information and also suggest ways of better protecting privacy and reducing information leakage in the social Web.
引用
收藏
页码:13 / 19
页数:7
相关论文
共 12 条
[1]  
[Anonymous], 2008, Proceedings of the 4th symposium on Usable privacy and security, SOUPS '08
[2]  
Balduzzi M, 2010, LECT NOTES COMPUT SC, V6307, P422, DOI 10.1007/978-3-642-15512-3_22
[3]  
Irani Danesh, 2009, 2009 International Conference on Computational Science and Engineering (CSE), P271, DOI 10.1109/CSE.2009.459
[4]  
Johnson C, 2006, INTERSECTIONS-GENDER
[5]   Designing and evaluating challenge-question systems [J].
Just, M .
IEEE SECURITY & PRIVACY, 2004, 2 (05) :32-39
[6]  
Lenhart A., 2009, Adults and social network websites
[7]   Robust de-anonymization of large sparse datasets [J].
Narayanan, Arvind ;
Shmatikov, Vitaly .
PROCEEDINGS OF THE 2008 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2008, :111-125
[8]   De-anonymizing Social Networks [J].
Narayanan, Arvind ;
Shmatikov, Vitaly .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :173-187
[9]   It's no secret Measuring the security and reliability of authentication via 'secret' questions [J].
Schechter, Stuart ;
Brush, A. J. Bernheim ;
Egelman, Serge .
PROCEEDINGS OF THE 2009 30TH IEEE SYMPOSIUM ON SECURITY AND PRIVACY, 2009, :375-390
[10]  
Sweeney Latanya, 2000, LIDAPWP4 CARN MELL U