Professional Documents
Culture Documents
10 Published by the IEEE Computer Society 1089-7801/11/$26.00 © 2011 IEEE IEEE INTERNET COMPUTING
Guest Editors’ Introduction
and linkability is quite challenging given that social Web. They emphasize the importance of
even those sites that don’t disclose users’ per- effective countermeasures for personal infor-
sonal information might provide enough data mation leakage.
to identify and link a profile’s owner. Possible In “Location-Related Privacy in Geo-Social
recipients for such personally identifiable infor- Networks,” Carmen Ruiz Vicente, Dario Freni,
mation include hosting servers for the social Claudio Bettini, and Christian S. Jensen intro-
networking sites, the network itself, and third duce geo-social networks (GeoSNs), which
parties that might abuse or misuse such critical extend social networks by providing context-
and sensitive information. aware services focused on associating location
In addition, a new paradigm for security with users and content. The authors investi-
involves the need to address issues of inter- gate four privacy aspects related to location,
personal relationships and flexibility in online absence, co-location, and identity privacy in
social networks. For instance, a user could share GeoSNs, addressing potential attacks and pro-
his or her personal photo album with family tection techniques.
members but not with colleagues from work. “Friend-in-the-Middle Attacks: Exploiting
Social network sites enable users to create a Social Networking Sites for Spam,” by Markus
limited profile and select which other users map Huber, Martin Mulazzani, Gerhard Kitzler,
to it. Such primitive security mechanisms have Sigrun Goluch, and Edgar Weippl, examines
only limited expressiveness for controlling user- friend-in-the-middle attacks on social networks
to-user interactions, especially in a dynamic that might impersonate social network appli-
social network. The need for new security mech- cations and demonstrates how adversaries can
anisms based on metrics such as risk, trust, and use such critical attacks to automatically har-
social metrics is becoming more compelling. vest social data. This article helps determine
Social networks’ security and privacy require- the vulnerability of all major social networks
ments still aren’t well understood or fully and highlights how primitive current protection
defined. Nevertheless, it’s clear that they’ll be strategies are.
quite different from classic security and privacy Finally, “Preserving Relation Privacy in
requirements because social networks involve Online Social Network Data,” by Na Li, Nan
user-centric concerns and allow multiple users Zhang, and Sajal K. Das, addresses issues and
to specify security policies on shared data. So, challenges with regard to the disclosure and
we must bring a depth of security experience protection of relation privacy over online social
from multiple security domains and technolo- network data. The authors classify existing
gies to this field, as well as a breadth of knowl- techniques for protecting relation privacy based
edge about social networks. on the potential exposure of user identities.
In this Issue
This special issue aims to encompass research
advances in security and privacy in social net-
works and share corresponding state-of-the
A lthough the methods in this special issue
are a good start, the need still exists to
both advance existing privacy theories for
art technologies for realizing such advances. social networks and improve technologies for
We’ve carefully chosen four articles that deal sharing personal information. Rather than sim-
with novel technologies and methodologies for ply blocking access and limiting users’ expo-
securely building and managing social net- sure, we strongly believe that we must provide
works and relevant secure applications, as well new ways for users to share content with oth-
as cross-cutting issues. ers, without requiring them to be connected
The first article, “Modeling Unintended via conventional social relationships. Also, we
Personal-Information Leakage from Multi- must enable users to track the actions of other
ple Online Social Networks,” by Danesh Irani, selected users with whom they share a social
Steve Webb, Calton Pu, and Kang Li, describes relationship, but whose actions with regard to
an information-leakage measure for quantify- some content aren’t completely trusted. These
ing how much information is available about features will eventually let users distinguish
a user. The authors seek a way to protect users’ real and digital social relations and act accord-
privacy and reduce information leakage in the ingly when sharing data in social networks.
MAY/JUNE 201111
Security and Privacy in Social Networks
Cutting Edge
stay
on
the
of Artificial Intelligence
IEEE Intelligent Systems provides
peer-reviewed, cutting-edge arti-
cles on the theory and applications
of systems that perceive, reason,
learn, and act intelligently.
The #1 AI Magazine
IEEE
www.computer.org/intelligent