skip to main content
10.1145/2185354.2185358acmotherconferencesArticle/Chapter ViewAbstractPublication PagespsosmConference Proceedingsconference-collections
research-article

Privacy attacks in social media using photo tagging networks: a case study with Facebook

Published:17 April 2012Publication History

ABSTRACT

Social-networking users unknowingly reveal certain kinds of personal information that malicious attackers could profit from to perpetrate significant privacy breaches. This paper quantitatively demonstrates how the simple act of tagging pictures on the social-networking site of Facebook could reveal private user attributes that are extremely sensitive. Our results suggest that photo tags can be used to help predicting some, but not all, of the analyzed attributes. We believe our analysis make users aware of significant breaches of their privacy and could inform the design of new privacy-preserving ways of tagging pictures on social-networking sites.

References

  1. R. G. Alessandro Acquisti and F. Stutzman. Faces of facebook: Privacy in the age of augmented reality. BlackHat USA, 2011.Google ScholarGoogle Scholar
  2. A. Besmer and H. R. Lipford. Moving beyond untagging: photo privacy in a tagged world. Conference on Human Factors in Computing Systems, pages 1563--1572, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. D. Boyd and E. Hargittai. Facebook privacy settings: Who cares? Journal on the Internet, 15(8), 2010.Google ScholarGoogle Scholar
  4. R. J. Brym and B. Wellman. Social structures: A network approach. Cambridge University Press, 1988.Google ScholarGoogle Scholar
  5. D. Fisher, D. W. McDonald, A. L. Brooks, and E. F. Churchill. Terms of service, ethics, and bias: Tapping the social web for cscw research. Computer Supported Cooperative Work (CSCW), Panel discussion, 2010.Google ScholarGoogle Scholar
  6. G. Friedland and R. Sommer. Cybercasing the joint: On the privacy implications of geo-tagging, 2010.Google ScholarGoogle Scholar
  7. X. Geng, Z. H. Zhou, Y. Zhang, G. Li, and H. Dai. Learning from facial aging patterns for automatic age estimation. In K. Nahrstedt, M. Turk, Y. Rui, W. Klas, and K. M. Patel, editors, ACM Multimedia, pages 307--316. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. M. Gjoka, M. Kurant, C. T. Butts, and A. Markopoulou. A Walk in Facebook: Uniform Sampling of Users in Online Social Networks. Technical report, arXiv.org, 2009.Google ScholarGoogle Scholar
  9. R. Gross and A. Acquisti. Information revelation and privacy in online social networks. Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pages 71--80, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. He, W. W. Chu, and Z. V. Liu. Inferring privacy information from social networks. In IEEE International Conference on Intelligence and Security Informatics, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. D. Kirkpatrick. The Facebook Effect: The Inside Story of the Company That Is Connecting the World. Simon and Schuster, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. D. Krackhardt. Simmelian Ties - Super Strong & Sticky, chapter 2, pages 21--37. Sage, Thousand Oaks, CA, 1998.Google ScholarGoogle Scholar
  13. B. Krishnamurthy. I know what you will do next summer. ACM SIGCOMM Computer Communication Review, 40(5):65--70, Oct. 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. B. Krishnamurthy and C. Wills. Characterizing privacy in online social networks. Proceedings of the first workshop on Online social networks, (37--42), 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. A. Lanitis, C. Taylor, and T. Cootes. Toward automatic simulation of aging effects on face images. Pattern Analysis and Machine Intelligence, IEEE Transactions on, 24(4):442--455, apr 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. J. Lindamood and M. Kantarcioglu. Inferring private information using social network data. Technical report, 2008.Google ScholarGoogle Scholar
  17. M. McPherson, L. Smith-Lovin, and J. M. Cook. BIRDS OF A FEATHER: Homophily in Social Networks. Annual Review of Sociology, 27(1):415--444, Aug. 2001.Google ScholarGoogle ScholarCross RefCross Ref
  18. A. Mislove, B. Viswanath, K. P. Gummadi, and P. Druschel. You are who you know: Inferring user profiles in online social networks.Google ScholarGoogle Scholar
  19. W. D. Nooy. Social Network Analysis, Graph Theoretical Approaches to, 2009.Google ScholarGoogle Scholar
  20. S. G. Roberts, R. I. Dunbar, T. V. Pollet, and T. Kuppens. Exploring variation in active network size: Constraints and ego characteristics. Social Networks, 31(2):138--146, May 2009.Google ScholarGoogle ScholarCross RefCross Ref
  21. D. J. Watts and S. H. Strogatz. Collective dynamics of 'small-world' networks. Nature, 393(6684):440--442, June 1998.Google ScholarGoogle ScholarCross RefCross Ref
  22. C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In Proceedings of the fourth ACM european conference on Computer systems - EuroSys '09, page 205, New York, New York, USA, 2009. ACM Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. K. H. Wolff. The Sociology of Georg Simmel. The Free Press, Glencoa, 1950.Google ScholarGoogle Scholar
  24. E. Zheleva and L. Getoor. To join or not to join: The illusion of privacy in social networks with mixed public and private user profiles. In 18th International World Wide Web Conference, pages 531--531, April 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Privacy attacks in social media using photo tagging networks: a case study with Facebook

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Other conferences
              PSOSM '12: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media
              April 2012
              43 pages
              ISBN:9781450312363
              DOI:10.1145/2185354

              Copyright © 2012 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 17 April 2012

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • research-article

              Acceptance Rates

              PSOSM '12 Paper Acceptance Rate7of21submissions,33%Overall Acceptance Rate7of21submissions,33%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader