Privacy-preserving Services: Social Networks Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources.

Slides:



Advertisements
Similar presentations
Virginia Career Network LinkedIn. What is LinkedIn? Overview Creating a profile Growing your contacts Sourcing capability.
Advertisements

1 drt 6455 eCommerce Law lesson 8 – IT and web 2.0 associate professor faculty of law university of montreal university of montreal chair in e-Security.
The Two Faces of Facebook Marianne Hebert, College Libraries (In collaboration with Jenica Rogers) Alumni Weekend July 11, 2008 SUNY Potsdam Presentation.
Our Digital World Second Edition
Privacy: Facebook, Twitter
The Big Idea for the “Emerging Young Artists” is to do SMART marketing using digital marketing avenues. The idea is to create awareness and increase.
The Importance of Social Media. Some facts and statistics: Nearly 1 out of every 5 minutes online is spent on social media Facebook reached 1.11 billion.
1 Working with Social Media in Research Settings Victoria Wade Careers Consultant.
Media Legal Update Lawrence M. Miller Schwartz, Woods & Miller.
Social Networking & Bar Association Communication -- What You Should Know About How to Use it to Your Advantage.
An Introduction to the Technology and Ethics of Cloud Computing Jack Newton Co-founder and President Themis Solutions Inc. (Clio)
SOCIAL MEDIA MARKETING FOR BUSINESS. The Internet has fundamentally changed the way people find, discover, share, shop, & connect. FACT.
Hongyu Gao Northwestern University EECS450 class presentation Adapted from slides of Harvard Townsend and Jessica Van Hattem Security Issues of Online.
Using LinkedIn To Enhance Employability Prospects For Computing Students Thomas Lancaster Birmingham City University.
Social Media Networking Sites Charlotte Jenkins Designing the Social Web
Personal Integrity and Björn Nilson Personal Integrity  Integrity vs Personal Integrity  Definition(s)  Physical and mental.
Slides prepared by Cyndi Chie and Sarah Frye1 A Gift of Fire Third edition Sara Baase Chapter 4: Intellectual Property.
ETHICAL ISSUES IN SOCIAL NETWORKING SUBMITTED BY :  PRIYANKA RANI(2948)  KRITIKA TANEJA(2956)  RISHU JAIN(2879)  RITU(2895)  DEEPAK AGGRAWAL(2944)
WEB2.0 Social Media & Independent Pharmacy Real World Use & Possibilities.
Facebook me! Online social networking as part of libraries’ web presence? This research is not affiliated with or sponsored by Facebook. Kim Holmberg Information.
TC2-Computer Literacy Mr. Sencer February 4, 2010.
Web 2.0 Web 2.0 is the term given to describe a second generation of the World Wide Web (WWW) that is focused on the ability for people to collaborate.
ISTEP Sping 2009 Brent Howard ESD 101 Technology Integration Specialist
Anthony Bonomi, Amber Heeg, Elizabeth Newton, Bianca Robinson & Marzi Shabani.
Harvard University CSCI E-2a Life, Liberty, and Happiness After the Digital Explosion 2: Privacy.
Social Media and Recordkeeping Allegra Huxtable Manager Government Recordkeeping Tasmanian Archive and Heritage Office.
 Digital marketing: Uses digital media to develop communications and exchanges with customers  Electronic media (E-marketing): Refers to the strategic.
Group #11 SOCIAL NETWORKING. a website where one connects with those sharing personal or professional interests, place of origin, education at a particular.
“Consistency is Key!” A Quick Guide to Online Marketing By Virtual Marketing Empire, LLC
Digital Marketing Strategy © 2012 Odd Dog Media 174 Roy St, Suite C, Seattle Sonitrol Digital Marketing April 5, 2013.
 Any website that allows social interaction; a portal for entertainment and communication  Examples: FACEBOOK, TWITTER, VINE, BLOGSTER, INSTAGRAM,
MEDIA INFLUENCES. WEBSITE RELIABILITY No one should assume that information on the Internet is accurate, timely, clear, and important. Many of us have.
What if I told you that a random stranger has access to…
Safe and Responsible Social Networking Stephanie ListerBrent Howard Assistant U.S. Attorney, ED of WANorth East Washington ESD 101 Computer Crime & Intellectual.
Creating an Online Professional Presence Using Social Media.
Eric J. Pritchard One Liberty Place, 46 th Floor 1650 Market Street Philadelphia, Pennsylvania (215)
Internet Safety. The Now Generation! Cyber-bullying Why? “A day in the life of a student has changed”
(By posting) Member Content to any part of the Web site, you automatically grant, and you represent and warrant that you have the right to grant, to (company.
CSCD 303 Essential Computer Security Spring 2013 Lecture 14 – Social network threats and Attacks Reading: See links - End of Slides.
Use of Electronic and Internet advertising options Standard 3.4.
SOCIAL NETWORKING The Legal Perspective Lawrence M. Miller Schwartz, Woods & Miller.
MEDIA INFLUENCES. WEBSITE RELIABILITY No one should assume that information on the Internet is accurate, timely, clear, and important. Many of us have.
Understanding and Using Social Media. Attention Overload.
Presentation (2): Overview of Changes in Communications Technology (15 minutes) Information Technology is not the Answer - Just a Tool”
2009 NOAC TRAININGTHE POWER OF ONE Passing it on Electronically Jason Coe.
Social Media 101 An Overview of Social Media Basics.
Chris Reed Professor of Electronic Commerce Law. The perceived problem “If I put my information in the Cloud then I lose all my rights to it” But is this.
Cloud based LIS Allows pathologists anywhere to consult on cases worldwide Slides are imaged and a consult request sent electronically Local physician.
Using Social Media for Fundraising and Communication with Supporters Lindsay Boyle – Communications & Research Coordinator Claire Chapman – Information.
Fan, Friend or Foe? The Risks of Social Networking.
Social Media Joy Hardee, Vidant Health Privacy Officer Beth Anne Atkins, Vidant Health Corporate Communications Nov. 20, 2015.
& Your Brand.  Examine:  Google search results  Linkedin  Facebook page  Twitter feed  Blog(s)  Your relationships, aptitude, opinions, expertise,
Social Networking and College Classrooms Some Thoughts for Instructors Kem Saichaie & Leighton Christiansen Des Moines Area Community College 27 February.
#GoingViral giulia_bonelli, formicablu Using social media to promote research CAGLIARI,
Blogs How to use the bog safely and secure? Create new username. Create a strong password to your account. Create the password to your uploaded files.
Introduction to Social Media October 28, 2010 Green County High School Vickie Buckman.
How Chapters Can use Social Media Mark Storace Sacramento Chapter March 2013.
Victor PTSA Fall Forum Don’t Lose Touch With Your Teen Tuesday, October 22, 2013 – 7PM Social media is now an integral part of our every day lives. For.
EULAs END USER LICENSE AGREEMENTS. What is a EULA?  a legal contract between a software application author or publisher and the user of that application.
From Facebook to Mugshots Facebook/MySpace EDD: Legal, social & ethical issues in use of modern personal posting technologies in law enforcement and academic.
Social Media Marketing: Social Media Websites is the right medium for all business marketing and its promotion. Social media can be effective branding.
A Gift of Fire Third edition Sara Baase
Social Media.
Overview The promotion of products or brands via Digital media Digital Media  Search Engine Marketing Search Engine Marketing  Social Media Marketing.
COPYRIGHT A Melbourne Athenaeum Library Cybersafety Information Guide
Use of Electronic and Internet advertising options
Unit# 5: Internet and Worldwide Web
Sr. Manager, Global Talent Acquisition
New Mexico Broadband Program Internet Tools for Small Business
Presentation transcript:

Privacy-preserving Services: Social Networks Amir Houmansadr CS660: Advanced Information Assurance Spring 2015 Content may be borrowed from other resources. See the last slide for acknowledgements!

Online Social Networks (OSN) Online Web services connecting people to socialize – Find friends, make friends – Follow celebrities and companies – Join groups – Share photos, videos – Communicate via messages, live chats – Etc.

CS660 - Advanced Information Assurance - UMassAmherst 3

OSN Popularity Over 900 million Facebook users worldwide – Over 150 million in U.S. – Over 450 million access via mobile – 300 million pictures uploaded to Facebook daily Over 140 million Twitter users; over 340 million Tweets sent daily Over 175 million LinkedIn members in over 200 countries Statistics from 2012

Privacy Issues in OSNs CS660 - Advanced Information Assurance - UMassAmherst 5

Challenges of Privacy in OSNs Protect user data from: – Other users/people Friends, FOF, general public Protection provided by most OSNs – Applications Right to use user data? What data? – OSN providers Benefit in examining and sharing Pressure from censors

Privacy leakage instances Information posted on OSNs is generally public – Unless you set privacy settings appropriately – “I’ll be on vacation” post plus geolocation invites burglars, i.e., “Please Rob Me” Indiscreet posts can lead to nasty consequences

Privacy leakage instances Employers, insurers, college admissions officers, et al. already screen applicants using OSNs Recent report from Novarica, research consultancy for finance and insurance industries: “We can now collect information on buying behaviors, geospatial and location information, social media and Internet usage, and more…Our electronic trails have been digitized, formatted, standardized, analyzed and modeled, and are up for sale. As intimidating as this may sound to the individual, it is a great opportunity for businesses to use this data.”

Privacy leakage instances Posts that got people fired: – Connor Riley: “Cisco just offered me a job! Now I have to weigh the utility of a [big] paycheck against the daily commute to San Jose and hating the work.” – Tania Dickinson: compared her job at New Zealand development agency to “expensive paperweight” – Virgin Atlantic flight attendants who mentioned engines replaced 4 times/year, cabins with cockroaches – Recent pizza girl got fired before starting the first day!

Privacy leakage instances OSNs don’t exactly safeguard posted info… LinkedIn Additionally, you grant LinkedIn a nonexclusive, irrevocable, worldwide, perpetual, unlimited, assignable, sublicenseable, fully paid up and royalty- free right to us to copy, prepare derivative works of, improve, distribute, publish, remove, retain, add, process, analyze, use and commercialize, in any way now known or in the future discovered, any information you provide, directly or indirectly to LinkedIn, including but not limited to any user generated content, ideas, concepts, techniques or data to the services, you submit to LinkedIn, without any further consent, notice and/or compensation to you or to any third parties. Any information you submit to us is at your own risk of loss. Facebook “You hereby grant Facebook an irrevocable, perpetual, non-exclusive, transferable, fully paid, worldwide license (with the right to sublicense) to (a) use, copy, publish, stream, store, retain, publicly perform or display, transmit, scan, reformat, modify, edit, frame, translate, excerpt, adapt, create derivative works and distribute (through multiple tiers), any User Content you (i) Post on or in connection with the Facebook Service or the promotion thereof subject only to your privacy settings or (ii) enable a user to Post, including by offering a Share Link on your website and (b) to use your name, likeness and image for any purpose, including commercial or advertising, each of (a) and (b) on or in connection with the Facebook Service or the promotion thereof. You may remove your User Content from the Site at any time. If you choose to remove your User Content, the license granted above will automatically expire, however you acknowledge that the Company may retain archived copies of your User Content.”

Privacy-preserving OSNs: Decentralized Systems CS660 - Advanced Information Assurance - UMassAmherst 11

Persona Decentralized structure Encrypt by group without many copies Precise Group control mechanism Groups created by one user should be available for use, both in enc/dec by friends Can be added onto existing applications

Group Key Management Data is encrypted with attribute-based encryption, any user could retrieve the data, but can decrypt it only if he ’ s a member of the group. Each Persona user is identified by a single public key, and stores their encrypted data in storage service. Users exchange public key and storage locations out of band

Revocation Removing a member requires re-keying Data encrypted with old key stays visible to revoked member

EASiER Encryption-based Access Control in Social Networks with Efficient Revocation Using a minimal trusted proxy in decryption Enforce revocation constraints Proxy cannot perform decryption or grant access

EASiER

Frientegrity See Slides HereHere CS660 - Advanced Information Assurance - UMassAmherst 17

Acknowledgement Some of the slides, content, or pictures are borrowed from the following resources, and some pictures are obtained through Google search without being referenced below: Adam C. Champion and Dong Xuan, Social Networking Security Adam C. Champion and Dong Xuan, Social Networking Security Dan Zhang’s presentation at CS CS660 - Advanced Information Assurance - UMassAmherst