A Logical Framework for Verifying Privacy Breaches of Social Networks

06/09/2018
by   Néstor Cataño, et al.
0

We present a novel approach to deal with transitivity permission-delegation threats that arise in social networks when content is granted permissions by third-party users thereby breaking the privacy policy of the content owner. These types of privacy breaches are often unintentional in social networks like Facebook, and hence, (more) in-place mechanisms are needed to make social network users aware of the consequences of changing their privacy policies. Our approach is unique in its use of formal methods tools and techniques. It builds on a predicate logic definition for social networking that caters for common aspects of existing social networks such as users, social network content, friendship, permissions over content, and content transmission. Our approach is implemented in Yices. For the predicate logic model, we formulate a security policy for the verification of the permission flow of content owned by social network users and demonstrate how this security policy can be verified.

READ FULL TEXT

page 1

page 2

page 3

page 4

research
02/20/2014

Friend Inspector: A Serious Game to Enhance Privacy Awareness in Social Networks

Currently, many users of Social Network Sites are insufficiently aware o...
research
04/08/2018

Penetrating a Social Network: The Follow-back Problem

Modern threats have emerged from the prevalence of social networks. Host...
research
05/09/2020

A Social Search Model for Large Scale Social Networks

With the rise of social networks, information on the internet is no long...
research
11/26/2021

Uncovering the Dark Side of Telegram: Fakes, Clones, Scams, and Conspiracy Movements

Telegram is one of the most used instant messaging apps worldwide. Some ...
research
08/03/2020

Identifying the k Best Targets for an Advertisement Campaign via Online Social Networks

We propose a novel approach for the recommendation of possible customers...
research
04/15/2020

Caching Structures for Distributed Data Management in P2P-based Social Networks

Distributed applications require novel solutions to tackle problems that...
research
11/17/2022

Social Networks are Divulging Your Identity behind Crypto Addresses

Cryptocurrencies, such as Bitcoin and Ethereum, are becoming increasingl...

Please sign up or login with your details

Forgot password? Click here to reset