You are on page 1of 3

Guest Editors’ Introduction

Security and Privacy


in Social Networks
T
Gail-Joon Ahn he Internet’s wide adoption has perpetrate identity theft, or medical
Arizona State University contributed to online social net- information, such as health condi-
working sites’ thriving popularity, tions, diagnoses, or treatment histories.
Mohamed Shehab which is evident in the attention such Unfortunately, current trends in social
University of North Carolina sites receive from both the media and networks indirectly require users to
at Charlotte academia. Over the past several years, become system and policy administra-
several social networking sites have tors to protect their online contents.
Anna Squicciarini arisen to facilitate social interactions Further complicating this issue is social
Pennsylvania State University on the Internet while revolutionizing networks’ rapid growth as well as their
how online users interact with their continual adoption of new services.
friends, coworkers, colleagues, family,
and even strangers. Moreover, some A New Paradigm
social networks let users further parti- The use of personal information in
tion their sets of friends based on social social networks raises new privacy con-
community, organization, geographical cerns and requires insights into secu-
location, or how well they know each rity problems. Online social networks
other. have recently emerged as a challeng-
Most social networking sites offer ing research area with a vast reach and
the basic features of online interaction, application space. Several studies and
communication, and interest sharing, recent news reports have highlighted
letting individuals create online pro- the increased risk to personal data
files that other users can view. One processed by online social networking
of the most important issues we must applications, as well as the user popu-
immediately address in this context lation’s lack of awareness. In general,
is the security and privacy of sensi- the privacy issue in social networking
tive information, which is generally is coupled with the identifiability and
any data an adversary could use to linkability of the information avail-
cause significant harm to users. Such able in this social setting, its pos-
data might include financial informa- sible recipients, and its potential uses.
tion, which an attacker could use to Protecting information’s identifiability

10 Published by the IEEE Computer Society 1089-7801/11/$26.00 © 2011 IEEE IEEE INTERNET COMPUTING
Guest Editors’ Introduction

and linkability is quite challenging given that social Web. They emphasize the importance of
even those sites that don’t disclose users’ per- effective countermeasures for personal infor-
sonal information might provide enough data mation leakage.
to identify and link a profile’s owner. Possible In “Location-Related Privacy in Geo-Social
recipients for such personally identifiable infor- Networks,” Carmen Ruiz Vicente, Dario Freni,
mation include hosting servers for the social Claudio Bettini, and Christian S. Jensen intro-
networking sites, the network itself, and third duce geo-social networks (GeoSNs), which
parties that might abuse or misuse such critical extend social networks by providing context-
and sensitive information. aware services focused on associating location
In addition, a new paradigm for security with users and content. The authors investi-
involves the need to address issues of inter- gate four privacy aspects related to location,
personal relationships and flexibility in online absence, co-location, and identity privacy in
social networks. For instance, a user could share GeoSNs, addressing potential attacks and pro-
his or her personal photo album with family tection techniques.
members but not with colleagues from work. “Friend-in-the-Middle Attacks: Exploiting
Social network sites enable users to create a Social Networking Sites for Spam,” by Markus
limited profile and select which other users map Huber, Martin Mulazzani, Gerhard Kitzler,
to it. Such primitive security mechanisms have Sigrun Goluch, and Edgar Weippl, examines
only limited expressiveness for controlling user- friend-in-the-middle attacks on social networks
to-user interactions, especially in a dynamic that might impersonate social network appli-
social network. The need for new security mech- cations and demonstrates how adversaries can
anisms based on metrics such as risk, trust, and use such critical attacks to automatically har-
social metrics is becoming more compelling. vest social data. This article helps determine
Social networks’ security and privacy require- the vulnerability of all major social networks
ments still aren’t well understood or fully and highlights how primitive current protection
defined. Nevertheless, it’s clear that they’ll be strategies are.
quite different from classic security and privacy Finally, “Preserving Relation Privacy in
requirements because social networks involve Online Social Network Data,” by Na Li, Nan
user-centric concerns and allow multiple users Zhang, and Sajal K. Das, addresses issues and
to specify security policies on shared data. So, challenges with regard to the disclosure and
we must bring a depth of security experience protection of relation privacy over online social
from multiple security domains and technolo- network data. The authors classify existing
gies to this field, as well as a breadth of knowl- techniques for protecting relation privacy based
edge about social networks. on the potential exposure of user identities.

In this Issue
This special issue aims to encompass research
advances in security and privacy in social net-
works and share corresponding state-of-the
A lthough the methods in this special issue
are a good start, the need still exists to
both advance existing privacy theories for
art technologies for realizing such advances. social networks and improve technologies for
We’ve carefully chosen four articles that deal sharing personal information. Rather than sim-
with novel technologies and methodologies for ply blocking access and limiting users’ expo-
securely building and managing social net- sure, we strongly believe that we must provide
works and relevant secure applications, as well new ways for users to share content with oth-
as cross-cutting issues. ers, without requiring them to be connected
The first article, “Modeling Unintended via conventional social relationships. Also, we
Personal-Information Leakage from Multi- must enable users to track the actions of other
ple Online Social Networks,” by Danesh Irani, selected users with whom they share a social
Steve Webb, Calton Pu, and Kang Li, describes relationship, but whose actions with regard to
an information-leakage measure for quantify- some content aren’t completely trusted. These
ing how much information is available about features will eventually let users distinguish
a user. The authors seek a way to protect users’ real and digital social relations and act accord-
privacy and reduce information leakage in the ingly when sharing data in social networks.

MAY/JUNE 201111
Security and Privacy in Social Networks

Acknowledgments Mohamed Shehab is assistant professor at the University


We would like to express our gratitude and appreciation to of North Carolina, Charlotte. His research interests
those who substantially contributed to this special issue: include distributed access control, secure distributed
editor-in-chief Michael Rabinovich and associate editor- collaboration in multidomain environments, Web
in-chief Maarten van Steen, for their cheerful and vigorous services security, and security for social networks.
cooperation, the reviewers for their helpful and invaluable Shehab has a PhD in computer engineering from Pur-
comments that enhanced the quality of the selected arti- due University. Contact him at mshehab@uncc.edu.
cles, and the authors for contributing outstanding articles
and providing revised versions in a timely manner. Anna Squicciarini is an assistant professor at the Pennsyl-
vania State University. Her research interests include
Gail-Joon Ahn is an associate professor at Arizona State trust negotiation techniques for peer-to-peer systems,
University. His research interests include information digital identity management techniques for federated
and systems security, vulnerability and risk manage- systems, privacy enhanced technologies, and access
ment, access and identity management, and security control and privacy for social networks and Web 2.0
architecture for distributed systems. Ahn has a PhD in platforms. Squicciarini has a PhD in computer sci-
information technology from George Mason University. ence from the University of Milan. Contact her at
He serves as an associate editor for ACM Transactions asquicciarini@ist.psu.edu.
on Information and System Security and an associate
editor-in-chief for IEEE Transactions on Dependable
and Secure Computing, and is a senior member of both Selected CS articles and columns are also available
IEEE and the ACM. Contact him at gahn@asu.edu. for free at http://ComputingNow.computer.org.

Cutting Edge
stay
on
the

of Artificial Intelligence
IEEE Intelligent Systems provides
peer-reviewed, cutting-edge arti-
cles on the theory and applications
of systems that perceive, reason,
learn, and act intelligently.

The #1 AI Magazine
IEEE

www.computer.org/intelligent

12 www.computer.org/internet/ IEEE INTERNET COMPUTING

You might also like