Visualizing Privacy Implications of Access Control Policies in - - PowerPoint PPT Presentation

visualizing privacy implications of access control
SMART_READER_LITE
LIVE PREVIEW

Visualizing Privacy Implications of Access Control Policies in - - PowerPoint PPT Presentation

Visualizing Privacy Implications of Access Control Policies in Social Networks Mohd Anwar , Philip W. L. Fong , Xue-Dong Yang , Howard Hamilton University of Calgary, Alberta, Canada University of Regina, Saskatchewan,


slide-1
SLIDE 1

Visualizing Privacy Implications of Access Control Policies in Social Networks

Mohd Anwar∗, Philip W. L. Fong∗, Xue-Dong Yang†, Howard Hamilton†

∗ University of Calgary, Alberta, Canada † University of Regina, Saskatchewan, Canada

DPM 2009

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 1 / 31

slide-2
SLIDE 2

Motivation

In social networks, privacy settings allow users to choose access control policies

Figure: Privacy Setting in Facebook

What are the privacy implications of these policies? How do we help users assess topology-based policies?

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 2 / 31

slide-3
SLIDE 3

Related Work

Privacy for Impression Management: Goffman 1961, Patil & Kobsa 2003 Privacy Preservation Model for Social Networks: Fong, Anwar, & Zhao 2009 Generating Social Graph: Chakrabarti et al. 2007 Visualization (Social Graph/Security Policies): Freeman 2000, Heer & boyd 2005, Reeder et al. 2008

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 3 / 31

slide-4
SLIDE 4

Outline

Privacy in Social Networks User Specified Policies in Facebook-style Social Network Systems (FSNS) Topology-based Policies Reflective Policy Assessment (RPA) Tool Support for RPA Issues & Discussions Work in Progress

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 4 / 31

slide-5
SLIDE 5

Privacy in Social Networks

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 5 / 31

slide-6
SLIDE 6

What is Privacy?

Purpose of privacy is impression management

◮ Control the impression that other people form

Control over what impression one wants to convey to whom

◮ What profile items to present to whom? ◮ e.g. disclose the sorority photos to only friends, but siteseeing photos

to everybody

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 6 / 31

slide-7
SLIDE 7

Privacy and Access Control Policies

Impression is conveyed according to relationship Relationship can be encoded into the topology of a graph (e.g. social graph) Therefore, topological access control policies help users control impression

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 7 / 31

slide-8
SLIDE 8

User Specified Policies in FSNS

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 8 / 31

slide-9
SLIDE 9

Search, Traversal, and Access Policies

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 9 / 31

slide-10
SLIDE 10

Communication Policies

Stage I Stage II

Traversal Policies

To initiate a communication primitive

Search Policy

  • f receiver

Global Name Search Traverse Social Graph

Reach receiver’s search listing Communication event occurs

Communication Policy

  • f communication primitive

Communication Primitive Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 10 / 31

slide-11
SLIDE 11

Topology-based Policies

Facebook offers more general topology-based policies: “ only friends” and “friends of friends” Richer form of acquantance relationships can be represented:

Figure: 5-clique

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 11 / 31

slide-12
SLIDE 12

Topology-based Policies

Figure: 3 common-friends Figure: distance4

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 12 / 31

slide-13
SLIDE 13

Anti-monotonic Policies

Under an anti-monotonic policy, access becomes more difficult as the social graph becomes denser Disclosure of information only to those who do not know you well

◮ e.g. stranger (¬distancek) Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 13 / 31

slide-14
SLIDE 14

Reflective Policy Assessment (RPA)

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 14 / 31

slide-15
SLIDE 15

Idea of RPA

A mirror allows us to see what others see when they look at us To create a desired impression, we repeatedly look into the mirror and adjust our getup The process of formulating access control policies is similar to what it takes to create a desired look A user needs to repeatedly assess and adjust their policies We propose that a profile owner inspect her profile from the view point of a potential accessor

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 15 / 31

slide-16
SLIDE 16

Privacy Dilemma with RPA

A user must begin with identifying a potential accessor who is of interest to her. A potential accessor may not want her identity to be disclosed to the user conducting the policy assessment. This dilemma is rooted in the asymmetric nature of trust.

. . . v . . . n o t u - t r a v e r s a b l e u i

To address this dilemma, we propose approximating the extended neighbourhood of a user.

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 16 / 31

slide-17
SLIDE 17

Tool Support for RPA

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 17 / 31

slide-18
SLIDE 18

Policy assessment is nontrivial

Authorization depends on the existing topology of social graph Social Graph constantly changes, so do privacy needs It is nontrivial to comprehend the privacy consequence of adjusting privacy settings

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 18 / 31

slide-19
SLIDE 19

Proposed Tool

To facilitate RPA, we devise a tool that visually depicts the extended neighbourhood allows the profile owner to point to any user in the extended neighbourhood as a potential accessor The tool displays a succinct representation of the profile, as seen from the eyes of the potential accessor

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 19 / 31

slide-20
SLIDE 20

Properties of Social Graph

We use the following properties to establish the correctness of algorithm for generating social graph: Property 1. Given an origin, every neighbour of an interior node is reachable, and thus, no hidden edge can have an interior node as an end. Property 2. Suppose an origin is given. By definition, at least one end

  • f each visible edge is an interior node. Therefore, no visible edge

can join two fringe nodes.

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 20 / 31

slide-21
SLIDE 21

Graph Generation Algorithm

  • 1. Construct a graph consisting of all reachable nodes and visible edges

May Guy L i z Bob J a y J

  • y

L i n J

  • n

J

  • e

Ada Moe M e l Doe Me

O r i g i n F r i n g e ( r e a c h a b l e b u t n o n - t r a v e r s a b l e ) Interior ( r e a c h a b l e a n d t r a v e r s a b l e ) P r o p e r t y 2 P r o p e r t y 1 Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 21 / 31

slide-22
SLIDE 22

Graph Generation Algorithm

  • 2. Temporarily remove all interior nodes and visible edges.

J

  • n

J

  • e

Ada Moe M e l Doe

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 22 / 31

slide-23
SLIDE 23

Graph Generation Algorithm

  • 3. Add n “synthetic nodes” in the social graph.

J

  • n

J

  • e

Ada Moe M e l Doe

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 23 / 31

slide-24
SLIDE 24

Graph Generation Algorithm

  • 4. Use R-MAT (Chakrabarti et al. 2007) to randomly generate m

“synthetic edges” J

  • n

J

  • e

Ada Moe M e l Doe

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 24 / 31

slide-25
SLIDE 25

Graph Generation Algorithm

  • 5. Add back the interior nodes and visible edges removed in step 2, and

return the resulting graph.

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 25 / 31

slide-26
SLIDE 26

Prototypical visualization tool

May Guy L i z Bob J a y J

  • y

L i n J

  • n

J

  • e

Ada Moe Doe Me

C a n A c c e s s :

Basic Information

C a n T r a v e r s e T o :

Moe, Doe, Joy

C a n I n i t i a t e :

Messaging

M e l

Education & Work

p o t e n t i a l a c c e s s o r i n t e r e s t i n g a c c e s s s c e n a r i o s ( 4 - c l i q u e ) ( c o m m o n - f r i e n d - 2 )

Figure: The black node is the profile owner, the double-circled node depicts a potential accessor representing an interesting access scenario.

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 26 / 31

slide-27
SLIDE 27

Issues & Discussion

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 27 / 31

slide-28
SLIDE 28

No Information Leakage by RPA

Visible edges are already accessible by the profile owner. Hidden edges do not take part in the policy assessment. Topological information revealed by RPA is either already available (visible edges) or anonymized (synthetic edges).

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 28 / 31

slide-29
SLIDE 29

RPA Recommends Access Scenarios

Our visualization tool recommends nodes (potential accessors) that represent interesting access scenarios Based on the various profile appearances, partition the nodes into equivalence classes.

◮ Two nodes that (both satisfies and violates the same policy predicates)

produce the same profile appearance belong to the same access scenario.

Each equivalent class represents a distinct access scenario. The tool will selectively highlight a node if it corresponds to a novel access scenario.

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 29 / 31

slide-30
SLIDE 30

Work in Progress

We are in the process of addressing the following set of open questions: (a) How effective is our tool?

◮ A user study is in order.

(b) How many graphs does one need to generate in order to gain enough confidence on the policies under assessment?

◮ A probabilistic analysis needs to be done.

(c) How well does our tool perform in a very large extended neighbourhood? –

◮ The profile owner needs not conduct assessment on every node (just

  • ne per equivalent class).

◮ Apply focus + context technique on a hyperbolic plane to effectively

render a large neighbourhhod

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 30 / 31

slide-31
SLIDE 31

Questions & Comments

Thanks! Mohd Anwar Post-Doctoral Fellow Computer Science Department University of Calgary manwar@ucalgary.ca

Mohd Anwar (UofC) Privacy Implications of Access Control Policies DPM 2009 31 / 31