
NSF Org: |
CNS Division Of Computer and Network Systems |
Recipient: |
|
Initial Amendment Date: | August 30, 2013 |
Latest Amendment Date: | September 20, 2017 |
Award Number: | 1318659 |
Award Instrument: | Standard Grant |
Program Manager: |
Dan Cosley
dcosley@nsf.gov (703)292-8832 CNS Division Of Computer and Network Systems CSE Directorate for Computer and Information Science and Engineering |
Start Date: | October 1, 2013 |
End Date: | September 30, 2018 (Estimated) |
Total Intended Award Amount: | $500,000.00 |
Total Awarded Amount to Date: | $500,000.00 |
Funds Obligated to Date: |
|
History of Investigator: |
|
Recipient Sponsored Research Office: |
70 WASHINGTON SQ S NEW YORK NY US 10012-1019 (212)998-2121 |
Sponsor Congressional District: |
|
Primary Place of Performance: |
15 Metrotech Center Brooklyn NY US 11201-3840 |
Primary Place of
Performance Congressional District: |
|
Unique Entity Identifier (UEI): |
|
Parent UEI: |
|
NSF Program(s): | Secure &Trustworthy Cyberspace |
Primary Program Source: |
|
Program Reference Code(s): |
|
Program Element Code(s): |
|
Award Agency Code: | 4900 |
Fund Agency Code: | 4900 |
Assistance Listing Number(s): | 47.070 |
ABSTRACT
It is generally recognized that protecting online privacy is important, with modern society manifesting this concern in many ways. Preliminary research indicates that third parties, with modest crawling and computational resources, and employing simple data mining heuristics, can potentially combine online services and publicly available information to create detailed profiles of the users living in any targeted geographical area.
This research investigates measures that can significantly improve privacy protection of users, while not degrading their overall Internet experience. The focus is on less-trustworthy third parties (e.g., data brokers, advertisers, spammers, malware distributors, and pedophiles), who can scrape, aggregate and infer information from many different online and offline sources. This research has two interrelated research thrusts. First, it explores to what extent third parties can collect, aggregate, and statistically process information from OSNs and other online and offline sources to create profiles. This thrust is developing rigorous statistical methodologies and probabilistic models for estimating the degree of potential privacy leakage. Second, this research investigates a variety of privacy policies that governments can establish, and a wide range of measures OSNs can take, to reduce the privacy risk. For promising combinations of policies and measures, this research quantifies the trade-off between privacy protection and usability.
PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH
Note:
When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external
site maintained by the publisher. Some full text articles may not yet be available without a
charge during the embargo (administrative interval).
Some links on this page may take you to non-federal websites. Their policies may differ from
this site.
PROJECT OUTCOMES REPORT
Disclaimer
This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.
This research, which was begun in 2013, studied the Internet privacy of adults and children. The focus of the research was on how 3rd parties -- such as foreign governments and companies such as the now infamous Cambridge Analytica -- can scrape information from social networks, search engines, and public records, combine the information, and use data science inference techniques to obtain very vivid pictures of the private lifes of large swaths of adults and children. Our research group was among the first to recognize this problem and undertake an indepth inverstigation of potential 3rd-party attacks. Our research showed how two privacy laws -- COPPA and the Right to Be Forgotten -- originally intended to improve the privacy of children and adults could backfire and acutally reduce Interent users' privacy. We showed how parents who post photos of their babies and children can inadvertently leak - through inference techniques - private informaiotn of their children. We showed that anonymous usesrs on Twitter exhibit significantly different behavior than non-anonymous users. We showed that location-based social networks can often be exploited by 3rd parties to determine the exact location of users, and to de-anonymize users in anonymous services like Yik Yak. The research led to 13 research papers on privacy and anonymity, covering a variety of different Internet applications, including Facebook, Google, Twitter, eBay, mobile dating services such as Tinder, and anonymous mobile apps such as Yik Yak. Our work has been extensively covered by the media, including the New York Times, NPR, and Bloomberg.
We are not at all surprised that many Internet applications today are being successfully attacked by thrid parties, such as foreign governments and companies working for political campaigns such as Cambridge Analytica. In particular, because Facebook over the years has been overly aggressive in trying to network the world, it has set itself up for numerous privacy attacks. Although Facebook has recently taken small measures to reduce the problem, it needs to make more fundamental changes to provide the safety and privacy that Internet users expect. In particular, we recommend that Facebook follow the example of Wechat, the popular social networking and messaging applicaiton in China. In Wechat, users cannot see other users' friend lists, and it does not recommend potential friends to users. By making this fundamental change, Facebook would go a long way in reducing potential inference attacks that currently plague the social network.
We would like to thank NSF for its generous support to pursue this research.
Last Modified: 10/16/2018
Modified by: Keith W Ross
Please report errors in award information by writing to: awardsearch@nsf.gov.