Privacy Policy Negotiation in Social Media

被引:58
作者
Such, Jose M. [1 ]
Rovatsos, Michael [2 ]
机构
[1] Univ Lancaster, Secur Lancaster, Sch Comp & Commun, Infolab2l, Lancaster LA1 4WA, England
[2] Univ Edinburgh, Sch Informat, Informat Forum 2 12, 10 Crichton St, Edinburgh EH8 9AB, Midlothian, Scotland
关键词
Design; Algorithms; Performance Social media; privacy; conflicts; intimacy; social networking services; online social networks;
D O I
10.1145/2821512
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Social media involve many shared items, such as photos, which may concern more than one user. The challenge is that users' individual privacy preferences for the same item may conflict, so an approach that simply merges in some way the users' privacy preferences may provide unsatisfactory results. Previous proposals to deal with the problem were either time-consuming or did not consider compromises to solve these conflicts (e.g., by considering unilaterally imposed approaches only). We propose a negotiation mechanism for users to agree on a compromise for these conflicts. The second challenge we address in this article relates to the exponential complexity of such a negotiation mechanism. To address this, we propose heuristics that reduce the complexity of the negotiation mechanism and show how substantial benefits can be derived from the use of these heuristics through extensive experimental evaluation that compares the performance of the negotiation mechanism with and without these heuristics. Moreover, we show that one such heuristic makes the negotiation mechanism produce results fast enough to be used in actual social media infrastructures with near-optimal results.
引用
收藏
页数:29
相关论文
共 46 条
  • [41] Intimacy based Access Control for Social Network Sites
    Wang, Yonggang
    Zhai, Ennan
    Lua, Eng Keong
    Hu, Jianbin
    Chen, Zhong
    [J]. 2012 9TH INTERNATIONAL CONFERENCE ON UBIQUITOUS INTELLIGENCE & COMPUTING AND 9TH INTERNATIONAL CONFERENCE ON AUTONOMIC & TRUSTED COMPUTING (UIC/ATC), 2012, : 517 - 524
  • [42] White D. R., 2002, Complexity, V8, P72, DOI 10.1002/cplx.10053
  • [43] Wiese J, 2011, UBICOMP'11: PROCEEDINGS OF THE 2011 ACM INTERNATIONAL CONFERENCE ON UBIQUITOUS COMPUTING, P197
  • [44] Wishart Ryan, 2010, Proceedings 2010 IEEE International Symposium on Policies for Distributed Systems and Networks (POLICY 2010), P1, DOI 10.1109/POLICY.2010.13
  • [45] Wisniewski P., 2012, Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, P609, DOI DOI 10.1145/2207676.2207761
  • [46] [No title captured]