xbook redesigning privacy control in social xbook
play

xBook: Redesigning Privacy Control in Social xBook: Redesigning - PowerPoint PPT Presentation

xBook: Redesigning Privacy Control in Social xBook: Redesigning Privacy Control in Social Networking Platforms Networking Platforms Kapil Singh, Sumeer Bhola and Wenke Lee Social networking is growing 2 Privacy concerns are growing


  1. xBook: Redesigning Privacy Control in Social xBook: Redesigning Privacy Control in Social Networking Platforms Networking Platforms Kapil Singh, Sumeer Bhola and Wenke Lee

  2. Social networking is growing… 2

  3. Privacy concerns are growing… • More personal data being fed to social networks 3

  4. Privacy concerns are growing… • More personal data being fed to social networks Op-Ed: Post a photo, wear a pirate hat on myspace, and say goodbye to your career 4

  5. Privacy concerns are growing… • More personal data being fed to social networks Op-Ed: Post a photo, wear a pirate hat on myspace, and say goodbye to your career Mayor in MySpace photo flap asked to resign 5

  6. Privacy concerns are growing… • More personal data being fed to social networks Op-Ed: Post a photo, wear a pirate hat on myspace, and say goodbye to your career Mayor in MySpace photo flap asked to resign Hoover Police officers arrest Facebook burglary suspects 6

  7. Social Networks as Platforms • Social networks now act as programming platforms: third party applications. • Integration with the platform – Set of APIs allow an application to have access to user content and integrate into user’s profile 7

  8. Social Platform Architecture Application Trusted domain 8

  9. Social Platform Architecture Application Trusted domain No control over who can develop and deploy an application. No control over who can develop and deploy an application. 9

  10. Social Platform Architecture Application Trusted domain No control over who can develop and deploy an application. No control over who can develop and deploy an application. Minimal or no control on what these applications can access. Minimal or no control on what these applications can access. 10

  11. Social Platform Architecture External entities (e.g. Ad agencies) Application Trusted domain No control over who can develop and deploy an application. No control over who can develop and deploy an application. Minimal or no control on what these applications can access. Minimal or no control on what these applications can access. No control on what an application can do with what it can access. . No control on what an application can do with what it can access 11

  12. Current Affairs: Facebook 12

  13. Current Affairs: Facebook 13

  14. Facebook’s privacy policy is insufficient… If you, your friends, or members of your network use any third-party applications If you, your friends, or members of your network use any third-party applications developed using the Facebook Platform ("Platform Applications"), those Platform developed using the Facebook Platform ("Platform Applications"), those Platform Platform Platform Applications may access and share certain information about you with others Applications may access and share certain information about you with others with others in with others in Applications may access and share certain information about you Applications may access and share certain information about you accordance with your privacy settings. You may opt-out of any sharing of certain or all accordance with your privacy settings. You may opt-out of any sharing of certain or all information through Platform Applications on the Privacy Settings page. In addition, third information through Platform Applications on the Privacy Settings page. In addition, third party developers who have created and operate Platform Applications ("Platform party developers who have created and operate Platform Applications ("Platform may also have access to your personal information (excluding your may also have access to your personal information (excluding your r r Developers"), may also have access to your personal information (excluding you Developers"), may also have access to your personal information (excluding you contact information) if you permit Platform Applications to access your data. contact information) if you permit Platform Applications to access your data. ss your data. ss your data. contact information) if you permit Platform Applications to acce contact information) if you permit Platform Applications to acce Before allowing any Platform Developer to make any Platform Application available to Before allowing any Platform Developer to make any Platform Application available to you, Facebook requires the Platform Developer to enter into an agreement which, among you, Facebook requires the Platform Developer to enter into an agreement which, among other things, requires them to respect your privacy settings and strictly limits their other things, requires them to respect your privacy settings and strictly limits their collection, use, and storage of your information. However, while we have undertaken collection, use, and storage of your information. However, while we have undertaken contractual and technical steps to restrict possible misuse of such information by such contractual and technical steps to restrict possible misuse of such information by such Platform Developers, we of course cannot and do not guarantee that all Platform Platform Developers, we of course cannot and do not guarantee that all Platform we of course cannot and do not guarantee that all Platform we of course cannot and do not guarantee that all Platform Developers will abide by such agreements. Please note that Facebook Developers will abide by such agreements. Please note that Facebook Facebook does not Facebook does not does not does not Developers will abide by such agreements. Please note that Developers will abide by such agreements. Please note that screen or approve Platform Developers and cannot control how such Platform screen or approve Platform Developers and cannot control how such Platform h Platform h Platform screen or approve Platform Developers and cannot control how suc screen or approve Platform Developers and cannot control how suc Developers use any personal information that they may obtain in connection with Developers use any personal information that they may obtain in connection with Developers use any personal information that they may obtain in Developers use any personal information that they may obtain in connection with connection with Platform Applications. Platform Applications. Platform Applications. Platform Applications. 14

  15. Facebook applications • Users need to trust the applications. • Mistakes are made: – “Top Friends” application allowed access to the profile of anyone using the application. – “We expect expect third-party apps to follow the rules the users set” – director at Facebook. • Deliberate “mistakes” are made: – “Google confirms Adsense ads, security problems in Facebook applications” 15

  16. Facebook applications • Users need to trust the applications. • Mistakes are made: – “Top Friends” application allowed access to the profile of anyone using the application. – “We expect expect third-party apps to follow the rules the users set” – director at Facebook. • Deliberate “mistakes” are made: – “Google confirms Adsense ads, security problems in Facebook applications” No enforcement, because it is not possible in the No enforcement, because it is not possible in the current architecture! current architecture! 16

  17. Our Goals • Provide privacy protection for users’ data in presence of third party applications. – Prevent data leaks out to external entities. – Provide user-user access control (for data flowing through an application). – Protection of application’s proprietary data. • No changes should be required on the browser side. • The user should be oblivious to any design changes. 17

  18. 18 Trusted domain Our Solution: xBook

  19. Our Solution: xBook Trusted domain (xBook) • Pull the applications into the trusted Pull the applications into the trusted xBook xBook domain. domain. • 19

  20. Our Solution: xBook Trusted domain (xBook) • Pull the applications into the trusted Pull the applications into the trusted xBook xBook domain. domain. • • Monitor the applications at runtime in the browser. Monitor the applications at runtime in the browser. • 20

  21. Our Solution: xBook Pre-declared access Trusted domain (xBook) • Pull the applications into the trusted Pull the applications into the trusted xBook xBook domain. domain. • • Monitor the applications at runtime in the browser. Monitor the applications at runtime in the browser. • • Allow applications access to any user data, but Allow applications access to any user data, but require require require them to them to • require make use of that data explicit. make use of that data explicit. 21

  22. Our Solution: xBook Pre-declared access X External X entities External Trusted domain (xBook) entities • Pull the applications into the trusted Pull the applications into the trusted xBook xBook domain. domain. • • Monitor the applications at runtime in the browser. Monitor the applications at runtime in the browser. • • Allow applications access to any user data, but Allow applications access to any user data, but require require require them to them to • require make use of that data explicit. make use of that data explicit. • Use information flow techniques to prevent data leaks by the Use information flow techniques to prevent data leaks by the • applications. applications. 22

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend