DocumentCode
732308
Title
Identifying Transitivity Threats in Social Networks
Author
Hanvey, Sorren ; Catano, Nestor
Author_Institution
Lero - The Irish Software Res. Centre, Limerick, Ireland
fYear
2015
fDate
18-18 May 2015
Firstpage
14
Lastpage
19
Abstract
Transitivity threats refer to the unintended disclosure of information to unintended recipients as a consequence of an unrelated action. In the context of social networking sites, transitivity threats refer to potential privacy policy breaches that stem from the automated transmission of data/content due to user actions within the social network. For example, commenting on some content within the social network makes the commented content visible to the recipients of the comment, thereby breaching the privacy policy under which the original/commented content was shared. This paper presents a novel approach for modelling and comparing social network privacy policies to deal with transitivity threats. Our approach differs from existing approaches in its use of formal methods techniques to compare social network privacy policies. This work builds on a predicate calculus definition for social networking, modelling social network content, people, friendship relations, and privacy policies as access permissions to content. We have implemented our approach as a tool called Poporo. The tool extends on a previous version of the Poporo tool that checked a third party application´s compliance with system invariants. We validate our approach by using Poporo on several examples.
Keywords
data privacy; social networking (online); Poporo tool; automated content transmission; automated data transmission; content permission access; content sharing; friendship relation; people relation; privacy policy breaching; social network content modelling; social network privacy policies; social networking sites; social networks; system invariants; third-party application compliance; transitivity threat identification; transitivity threats; unintended information disclosure; unintended recipients; unrelated action; user actions; Calculus; Context; Data privacy; Facebook; Java; Privacy; Formal Methods; Privacy; Transitivity;
fLanguage
English
Publisher
ieee
Conference_Titel
TEchnical and LEgal aspects of data pRivacy and SEcurity, 2015 IEEE/ACM 1st International Workshop on
Conference_Location
Florence
Print_ISBN
978-1-4673-7097-4
Type
conf
DOI
10.1109/TELERISE.2015.11
Filename
7182464
Link To Document