Privacy homomorphisms for social networks with private relationships

Rovira i Virgili University, Department of Computer Engineering and Mathematics, UNESCO Chair in Data Privacy, Av. Països Catalans 26, Tarragona 43007, Catalonia, Spain
Computer Networks (Impact Factor: 1.26). 10/2008; 52(15):3007-3016. DOI: 10.1016/j.comnet.2008.06.017
Source: DBLP


Enabling private relationships in social networks is an important issue recently raised in the literature. We describe in this paper a new protocol which offers private relationships allowing resource access through indirect relationships without requiring a mediating trusted third party (although an optimistic trusted third party is used which only acts in case of conflict). Thanks to homomorphic encryption, our scheme prevents the resource owner from learning the relationships and trust levels between the users who collaborate in the resource access. In this way, the number of users who might refuse collaboration due to privacy concerns is minimized. This results in increased resource availability, as the chances that certain nodes become isolated at a given period of time are reduced. Empirical evidence is provided about the proposed protocol being scalable and deployable in practical social networks.

Download full-text


Available from: Alexandre Viejo
  • Source
    • "The proposal of Carminati et al [15] consists of enabling users to describe their access polices through a rich Semantic Web logic language derived from OWL. This proposal is also followed by others [18], [19]. But we follow a different approach as the work of Gürses and Berendt [2] has shown that, even the simplest logic-based models result in inconsistencies and challenging privacy scenarios when two co-owners define separately the rules of access for their information objects (as well as other reasons). "
    [Show abstract] [Hide abstract]
    ABSTRACT: Using the web for communication, purchases, searching information and/or socializing generates data, about ourselves, our connections and our activities, which is collected easily. In online social networks, users volunteer perhaps what is considered more personal information to their selected circles. But each person has personal preferences about what it considers public and what it considers private. The problem is that the information that is public may be used to disclose information that the users expect to remain confidential. This paper offers a path to provide tips and warnings to each user of an online social network so they can exercise control on the information they consider private not only by not disclosing such information, but by acting on their public information-items that could be informative for those information-items that are private. This is a significant challenge, because most web-applications use personalization to build a context and provide better services. We aim to raise awareness on privacy and to empower users, giving them the possibility to regulate the benefits of personalization with the privacy risks. In this paper we also show that information-items (like relationships) can be chosen as confidential, and that we can provide meaningful warnings on metrics of association and public attributes that are strong predictors of confidential information-items.
    Full-text · Conference Paper · Aug 2015
    • "Significant work has been done exploring cryptographic approaches to enhance the content sharing privacy on OSNs. Work in [11] presents a publickey protocol which achieves relationship protection without the presence of a central node so enabling private relationships using certificates or verifiable credentials. A number of the proposed access control models leverage users' attributes . "
    [Show abstract] [Hide abstract]
    ABSTRACT: In this study, the authors introduce a highly dynamic and manageable average speed monitoring system. They define a privacy preserving security protocol in which vehicles hold a pseudonymous non-traceable private digital identity. Vehicle's identity is kept undisclosed for as long as the average speed over a designated road section does not exceed the specified limit. During the protocol execution, non-refutable evidences are built for vehicles and authorities, for future disputes. Finally, the security properties of the protocol are formally proven using BAN logic and, a metric is defined to measure the reliability and feasibility of the author's proposal.
    No preview · Article · Apr 2015 · IET Intelligent Transport Systems
    • "The growth of information transmission and more intimate interactions among users are the most important reasons for users to forget the negative consequences of sharing personal information on the Internet, especially when the information is shared as public data for a long time [2]. Alongside OSNs' popularity growth, security risks and threats are growing, too, which affect users' privacy and confidentiality [3]. "

    No preview · Article · May 2014
Show more