Proceedings of the Second ACM EuroSys Workshop on Social Network Systems 2009
DOI: 10.1145/1578002.1578007
|View full text |Cite
|
Sign up to set email alerts
|

Anonymous opinion exchange over untrusted social networks

Abstract: Social networks are the fastest growing Internet applications. They offer the possibility to get in touch with current friends, discover where the old ones are, and make new ones. While these applications are a great enabler for our social life, they are also well known to fall short on privacy. The lack of adequate privacy enhancing technology is particularly important in these applications due to the nature of information they deal with, and the fact that many users are underage. This paper provides a contri… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
17
0

Year Published

2010
2010
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 10 publications
(17 citation statements)
references
References 18 publications
0
17
0
Order By: Relevance
“…Golbeck [2009] investigates profiles similarity and how those relate to the way users determine trust, hence their willingness to share private information. Kacimi et al [2009] present a privacy protocol allowing anonymous opinion exchanges over untrusted SNSs. Korolova et al [2008] investigate the number of user accounts needed to be compromised to rebuild the entire social graph.…”
Section: Related Workmentioning
confidence: 99%
“…Golbeck [2009] investigates profiles similarity and how those relate to the way users determine trust, hence their willingness to share private information. Kacimi et al [2009] present a privacy protocol allowing anonymous opinion exchanges over untrusted SNSs. Korolova et al [2008] investigate the number of user accounts needed to be compromised to rebuild the entire social graph.…”
Section: Related Workmentioning
confidence: 99%
“…4). This feature of ad hoc networks allows us to support our privacy requirements by creating an element of anonymity or plausible deniability for question askers and answerers, in a similar fashion to the work on crowds (Reiter andRubin 1998), Freenet Clarke et al (2001) and the network of Kacimi et al (2009), whereby the complete path of the route of a particular question or answer is not known by any one node in the network and therefore the exact author of a specific question or answer is plausibly deniable (see below for an outline of the model). In order for such mechanisms to work, we use a uniform random topology for the network graph (C n;N , where n is the number of nodes and N is the number of links) based on the Erd} os and Rényi random graph model.…”
Section: User Privacy: Plausible Deniabilitymentioning
confidence: 99%
“…They also do not follow privacy considerations between asker and answers, nor do they investigate stigmergic techniques to solving this problem. Finally, Kacimi et al (2009) investigate anonymous opinion routing through social networks. They too use single hop routing tactics to mask the source of a message, however they do not consider the direction of the routing nor the quality of the users, and instead, simply look at accumulating opinions from a source statement.…”
Section: Related Workmentioning
confidence: 99%
“…The new technologies may also have a number of benefits for health care professionals [15]. First, they may support professional development and marketing efforts.…”
Section: Benefits For Providers and Insurersmentioning
confidence: 99%
“…Although informal networking was supported by the early World Wide Web, social networking sites are explicitly designed around group and network formation. In this setting, social networks form as users create links to one another, typically on the basis of offline relationships or shared interests and hobbies [15].…”
Section: Modeling Social Networking Applicationsmentioning
confidence: 99%