Social network privacy by means of evolving access control
First Claim
1. A computer-implemented method of controlling privacy loss in a data sharing social network, the method comprising the steps of:
- providing the data sharing social network containing a plurality of user data objects for sharing the plurality of user data objects with a plurality of users according to an access control policy;
dividing, by the computer, time into a sequence of time subintervals; and
updating, by the computer, the access control policy at each time subinterval by randomly resetting some of the plurality of user data objects as public or private.
1 Assignment
0 Petitions
Accused Products
Abstract
A method and software product for limit privacy loss due to data shared in a social network, where the basic underlying assumptions are that users are interested in sharing data and cannot be assumed to constantly follow appropriate privacy policies. Social networks deploy an additional layer of server-assisted access control which, even under no action from a user, automatically evolves over time, by restricting access to the user'"'"'s data. The evolving access control mechanism provides non-trivial quantifiable guarantees for formally specified requirements of utility (i.e., users share as much data as possible to all other users) and privacy (i.e., users expose combinations of sensitive data only with low probability and over a long time).
31 Citations
15 Claims
-
1. A computer-implemented method of controlling privacy loss in a data sharing social network, the method comprising the steps of:
-
providing the data sharing social network containing a plurality of user data objects for sharing the plurality of user data objects with a plurality of users according to an access control policy; dividing, by the computer, time into a sequence of time subintervals; and updating, by the computer, the access control policy at each time subinterval by randomly resetting some of the plurality of user data objects as public or private. - View Dependent Claims (2, 3, 4, 5, 6, 7, 8, 9)
-
-
10. A computer readable device having computer readable program code for operating on a computer for controlling privacy loss in a data sharing social network, the program code, when executing, causing the computer to perform steps comprising:
-
providing the data sharing social network containing a plurality of user data objects for sharing the plurality of user data objects with a plurality of users according to an access control policy; dividing time into a sequence of time subintervals; and updating the access control policy at each time subinterval by randomly resetting some of the plurality of user data objects as public or private. - View Dependent Claims (11, 12, 13, 14, 15)
-
Specification