Skip to main content

Quantifying Direct Trust for Private Information Sharing in an Online Social Network

  • Conference paper
Intelligent Distributed Computing

Part of the book series: Advances in Intelligent Systems and Computing ((AISC,volume 321))

  • 1854 Accesses

Abstract

Online Social Networks (OSNs) are actively being used by a large fraction of people. People extensively share a wealth of their information online. This content if retrieved, stored, processed and spread beyond scope without user’s consent may result in a privacy breach. Adopting a coarse grained privacy mechanism such as sharing information to a group of “close friends” or the strong ties of the network is one of the solutions to minimize the risk of unwanted disclosure but this does not fully contribute in the process of protecting privacy. There is a high probability for an unwanted information disclosure even if the information is shared only with the strong ties. In most of the privacy literature while building trust the online sharing behavior is never looked into consideration. Hence, in this paper we propose and implement a privacy preserving model where such unwanted and unintentional private information disclosures could be minimized by further refining the trusted community of strong ties with respect to their privacy quotient.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 129.00
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 169.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Gross, R., Acquisti, A.: Information revelation and privacy in online social networks. In: Proceedings of the 2005 ACM Workshop on Privacy in the Electronic Society, pp. 71–80. ACM (2005)

    Google Scholar 

  2. Singh, S., Bawa, S.: A privacy, trust and policy based authorization framework for services in distributed environments. International Journal of Computer Science 2(2) (2007)

    Google Scholar 

  3. Sherchan, W., Nepal, S., Paris, C.: A survey of trust in social networks. ACM Computing Surveys (CSUR) 45(4), 47 (2013)

    Article  Google Scholar 

  4. Adali, S., Escriva, R., Goldberg, M.K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B.K., Wallace, W.A., Williams, G.: Measuring behavioral trust in social networks. In: 2010 IEEE International Conference on Intelligence and Security Informatics (ISI), pp. 150–152. IEEE (2010)

    Google Scholar 

  5. Liu, K., Terzi, E.: A framework for computing the privacy scores of users in online social networks. In: Ninth IEEE International Conference on Data Mining, ICDM 2009, pp. 288–297. IEEE (2009)

    Google Scholar 

  6. Kumaraguru, P., Cranor, L.F.: Privacy indexes: A survey of westin’s studies (2005)

    Google Scholar 

  7. Lind, P.G., da Silva, L.R., Andrade Jr., J.S., Herrmann, H.J.: Spreading gossip in social networks. Physical Review E 76(3), 036117 (2007)

    Google Scholar 

  8. Shaw, A.K., Tsvetkova, M., Daneshvar, R.: The effect of gossip on social networks. Complexity 16(4), 39–47 (2011)

    Article  MathSciNet  Google Scholar 

  9. Buskens, V.: Social networks and trust, vol. 30. Springer (2002)

    Google Scholar 

  10. Trifunovic, S., Legendre, F., Anastasiades, C.: Social trust in opportunistic networks. In: INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1–6. IEEE (2010)

    Google Scholar 

  11. Srivastava, A., Geethakumari, G.: Measuring privacy leaks in online social networks. In: 2013 International Conference on Advances in Computing, Communications and Informatics (ICACCI), pp. 2095–2100. IEEE (2013)

    Google Scholar 

  12. Baker, F., Kim, S.-H.: Item response theory: Parameter estimation techniques, vol. 176. CRC Press (2004)

    Google Scholar 

  13. Li, N., Najafian Razavi, M., Gillet, D.: Trust-aware privacy control for social media. In: CHI 2011 Extended Abstracts on Human Factors in Computing Systems, pp. 1597–1602. ACM (2011)

    Google Scholar 

  14. McAuley, J.J., Leskovec, J.: Learning to discover social circles in ego networks. In: NIPS, vol. 272, pp. 548–556 (2012)

    Google Scholar 

  15. Kempe, D., Kleinberg, J., Tardos, É.: Maximizing the spread of influence through a social network. In: Proceedings of the ninth ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 137–146. ACM (2003)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Srivastava, A., Krishnakumar, K.P., Geethakumari, G. (2015). Quantifying Direct Trust for Private Information Sharing in an Online Social Network. In: Buyya, R., Thampi, S. (eds) Intelligent Distributed Computing. Advances in Intelligent Systems and Computing, vol 321. Springer, Cham. https://doi.org/10.1007/978-3-319-11227-5_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-11227-5_3

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-11226-8

  • Online ISBN: 978-3-319-11227-5

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics