101 research outputs found

    Provision of overcoming the weakness of OAuth 2.0 protocol in online social networking

    Get PDF
    The Open Authorization Protocol (OAuth 2.0) was introduced to provide secure and efficient method for providing authorization to the third party applications without sharing user’s credentials. Major social internet players like Facebook, Google and Twitter implement their API’s based on this protocol for enhancing the user experience of social sharing and sign-on. However OAuth doesn’t provides the necessary fine-grained access control or any suggestions. We have proposed an enhancement to the OAuth 2.0 authorization which will provide provision of fine grained authorization suggestions to the users while granting permission to the third party applications in online social networking. Our multi criteria suggestion based model method will utilizes user-based, application based, category-based combination filtering systems. Our category-based combination filtering system is based on decision made by the previous users and the application based permission requests for enhancing the user’s privacy control. We have provided a provision for strengthening the OAuth 2.0 protocol in online social networking websites by proposing OAuth 2.0 extension as a browser based extension which allows various users to compose their privacy settings at the time of installing third party applications. DOI: 10.17762/ijritcc2321-8169.150316

    When and where do you want to hide? Recommendation of location privacy preferences with local differential privacy

    Full text link
    In recent years, it has become easy to obtain location information quite precisely. However, the acquisition of such information has risks such as individual identification and leakage of sensitive information, so it is necessary to protect the privacy of location information. For this purpose, people should know their location privacy preferences, that is, whether or not he/she can release location information at each place and time. However, it is not easy for each user to make such decisions and it is troublesome to set the privacy preference at each time. Therefore, we propose a method to recommend location privacy preferences for decision making. Comparing to existing method, our method can improve the accuracy of recommendation by using matrix factorization and preserve privacy strictly by local differential privacy, whereas the existing method does not achieve formal privacy guarantee. In addition, we found the best granularity of a location privacy preference, that is, how to express the information in location privacy protection. To evaluate and verify the utility of our method, we have integrated two existing datasets to create a rich information in term of user number. From the results of the evaluation using this dataset, we confirmed that our method can predict location privacy preferences accurately and that it provides a suitable method to define the location privacy preference

    Risks of Friendships on Social Networks

    Full text link
    In this paper, we explore the risks of friends in social networks caused by their friendship patterns, by using real life social network data and starting from a previously defined risk model. Particularly, we observe that risks of friendships can be mined by analyzing users' attitude towards friends of friends. This allows us to give new insights into friendship and risk dynamics on social networks.Comment: 10 pages, 8 figures, 3 tables. To Appear in the 2012 IEEE International Conference on Data Mining (ICDM

    SoSharP:Recommending Sharing Policies in Multiuser Privacy Scenarios

    Get PDF

    A Cross-Disciplined Approach to Exploring the Privacy Paradox: Explaining Disclosure Behaviour Using the Theory of Planned Behaviour

    Get PDF
    The rise of the Internet and, specifically, the use of social network systems have seen privacy come to the forefront of concern for end-users. One way in which this privacy problem has manifested itself is the privacy paradox; where users concerns do not match their actual behaviour. Research has pointed to a lack of awareness and comprehension as a cause of this paradox and others like it and have recommended improving awareness as a potential solution. However, without knowing the direct, observable causes of the paradox formulating a solution which improves awareness is difficult as it will be based on assumption. As such, this paper proposes the Theory of Planned Behaviour as a sufficiently falsifiable theory to provide a means of exploring the causes of observed paradoxes and as a guide to implementing solutions. The TPB identifies the factors which inform behavioural action as well as a control factor that informs the intention (how easy it is perceived to perform the behaviour) and effects the actual outcome (is it actually easy?). Through an examination of users it is possible to identify which factor is lacking when the paradox is observed; in short the paradox can be robustly explained. Furthermore, this paper proposes that a framework for user interface design can efficiently be modelled around the TPB in order to produce Information Systems which facilitate the desired behaviour of the user in question effectively improving awareness and working towards a solution to observed paradoxes
    • …
    corecore