Title :
Identifying Transitivity Threats in Social Networks
Author :
Hanvey, Sorren ; Catano, Nestor
Author_Institution :
Lero - The Irish Software Res. Centre, Limerick, Ireland
Abstract :
Transitivity threats refer to the unintended disclosure of information to unintended recipients as a consequence of an unrelated action. In the context of social networking sites, transitivity threats refer to potential privacy policy breaches that stem from the automated transmission of data/content due to user actions within the social network. For example, commenting on some content within the social network makes the commented content visible to the recipients of the comment, thereby breaching the privacy policy under which the original/commented content was shared. This paper presents a novel approach for modelling and comparing social network privacy policies to deal with transitivity threats. Our approach differs from existing approaches in its use of formal methods techniques to compare social network privacy policies. This work builds on a predicate calculus definition for social networking, modelling social network content, people, friendship relations, and privacy policies as access permissions to content. We have implemented our approach as a tool called Poporo. The tool extends on a previous version of the Poporo tool that checked a third party application´s compliance with system invariants. We validate our approach by using Poporo on several examples.
Keywords :
data privacy; social networking (online); Poporo tool; automated content transmission; automated data transmission; content permission access; content sharing; friendship relation; people relation; privacy policy breaching; social network content modelling; social network privacy policies; social networking sites; social networks; system invariants; third-party application compliance; transitivity threat identification; transitivity threats; unintended information disclosure; unintended recipients; unrelated action; user actions; Calculus; Context; Data privacy; Facebook; Java; Privacy; Formal Methods; Privacy; Transitivity;
Conference_Titel :
TEchnical and LEgal aspects of data pRivacy and SEcurity, 2015 IEEE/ACM 1st International Workshop on
Conference_Location :
Florence
Print_ISBN :
978-1-4673-7097-4
DOI :
10.1109/TELERISE.2015.11