Award Abstract # 1422215
SBE TWC: Small: Collaborative: Privacy Protection in Social Networks: Bridging the Gap Between User Perception and Privacy Enforcement

NSF Org: CNS
Division Of Computer and Network Systems
Recipient: THE PENNSYLVANIA STATE UNIVERSITY
Initial Amendment Date: August 21, 2014
Latest Amendment Date: May 24, 2017
Award Number: 1422215
Award Instrument: Standard Grant
Program Manager: Dan Cosley
dcosley@nsf.gov
 (703)292-8832
CNS
 Division Of Computer and Network Systems
CSE
 Directorate for Computer and Information Science and Engineering
Start Date: October 1, 2014
End Date: September 30, 2018 (Estimated)
Total Intended Award Amount: $279,154.00
Total Awarded Amount to Date: $295,154.00
Funds Obligated to Date: FY 2014 = $279,154.00
FY 2017 = $16,000.00
History of Investigator:
  • Dongwon Lee (Principal Investigator)
  • Mary Beth Rosson (Co-Principal Investigator)
  • Peng Liu (Co-Principal Investigator)
Recipient Sponsored Research Office: Pennsylvania State Univ University Park
201 OLD MAIN
UNIVERSITY PARK
PA  US  16802-1503
(814)865-1372
Sponsor Congressional District: 15
Primary Place of Performance: Pennsylvania State Univ University Park
110 Technology Center Building
State College
PA  US  16802-7000
Primary Place of Performance
Congressional District:
Unique Entity Identifier (UEI): NPM2J7MSCF61
Parent UEI:
NSF Program(s): Special Projects - CNS,
Secure &Trustworthy Cyberspace
Primary Program Source: 01001415DB NSF RESEARCH & RELATED ACTIVIT
01001718DB NSF RESEARCH & RELATED ACTIVIT
Program Reference Code(s): 025Z, 7434, 7923, 9178, 9251
Program Element Code(s): 171400, 806000
Award Agency Code: 4900
Fund Agency Code: 4900
Assistance Listing Number(s): 47.070

ABSTRACT

Online social networks, such as Facebook, Twitter, and Google+, have become extremely popular. They have significantly changed our behaviors for sharing information and socializing, especially among the younger generation. However, the extreme popularity of such online social networks has become a double-edged sword -- while promoting online socialization, these systems also raise privacy issues. To protect user privacy without compromising socialization functions, this project articulates a unifying framework that bridges the gap between the human-oriented and technology-centered perspectives. In particular, this project is developing methods to (1) detect the discrepancies between users' information sharing expectations and actual information disclosure; (2) design a user-centered yet computationally-efficient formal model of user privacy in social networks; and (3) develop a mechanism to effectively enforce privacy policies in the proposed model. The potential long-term social benefits are significant, since such awareness may gradually change people's privacy perceptions and affect their behavior in privacy-centric scenarios.

This project develops a concept of "Social Circles" to model social network access within a Restricted Access and Limited Control framework. Methods are being developed to derive social circles from a variety of types of existing information within the social network; these are used to determine appropriate access control settings. The project is assessing information flow and risk of leakage given such settings, including the issues raised by heterogeneity of systems. In addition to theoretical analysis of potential information flows with respect to a variety of adversary models, the project is conducting user studies to determine if this approach reduces the gap between perceived and actual privacy.

PUBLICATIONS PRODUCED AS A RESULT OF THIS RESEARCH

Note:  When clicking on a Digital Object Identifier (DOI) number, you will be taken to an external site maintained by the publisher. Some full text articles may not yet be available without a charge during the embargo (administrative interval).

Some links on this page may take you to non-federal websites. Their policies may differ from this site.

(Showing: 1 - 10 of 17)
Anirudh Narasimman, Qiaozhi Wag, Bo Luo, and Dongwon Lee "Arcana: Private Tweets On a Public Microblog Platform" An international conference , 2016
Chen Cao, Le Guan, Ning Zhang, Neng Gao, Jingqiang Lin, Bo Luo, Peng Liu, Ji Xiang, Wenjing Lou "CryptMe: Data Leakage Prevention for Unmodified Programs on ARM Devices." International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2018) , 2018
Fabo Wang, Yuqing Zhang, Kai Wang, Peng Liu and Wenjie Wang "Stay in Your Cage! A Sound Sandbox for Third-Party Libraries on Android" the European Symposium on Research in Computer Security (ESORICS) , 2016
Heqing Huang, Sencun Zhu, Kai Chen, Peng Liu "From System Services Freezing to System Server Shutdown in Android: All You Need Is a Loop in an Application" ACM CCS 2015 , 2015
Jamuna Gopal, Shu Huang, Bo Luo "FamilyID: A Hybrid Approach to Identify Family Information from Microblogs" Journal of Secure Communication and System , 2016
Jason Zhang, Dongwon Lee "ROAR: Robust Label Ranking for Social Emotion Mining" 32nd AAAI Conf. on Artificial Intelligence (AAAI), New Orleans, LA , 2018
Jin Yea Jang, Kyungsik Han, Dongwon Lee "No Reciprocity in "Liking" Photos: Analyzing Like Activities in Instagram" 27th ACM Conf. on Hypertext and Social Media (HT 2015) , 2015
Jin Yea Jang, Kyungsik Han, Dongwon Lee, Haiyan Jia, Patrick C. Shih "Teens Engage More with Fewer Photos: Temporal and Comparative Analysis on Behaviors in Instagram" 27th ACM Conf. on Hypertext and Social Media (HT) , 2016
Jungho Song, Kyungsik Han, Dongwon Lee, Sang-Wook Kim ""Is a Picture Really Worth a Thousand Words?": A Case Study on Classifying User Attributes on Instagram," PLOS ONE , v.13 , 2018
Kyung-Sik Han, Hyunggu Jung, Jin Yea Jang, Dongwon Lee "Understanding User?s Privacy Attitudes through Subjective and Objective Assessments: An Instagram Case Study" IEEE Computer , v.51 , 2018
Kyungsik Han, Sanghack Lee, Jin Yea Jang, Yong Jung, Dongwon Lee ""Teens are from Mars, Adults are from Venus": Analyzing and Predicting Age Groups with Behavioral Characteristics in Instagram" 8th Int?l ACM Web Science Conf. (WebSci) , 2016
(Showing: 1 - 10 of 17)

PROJECT OUTCOMES REPORT

Disclaimer

This Project Outcomes Report for the General Public is displayed verbatim as submitted by the Principal Investigator (PI) for this award. Any opinions, findings, and conclusions or recommendations expressed in this Report are those of the PI and do not necessarily reflect the views of the National Science Foundation; NSF has not approved or endorsed its content.

With the increasing participation in online social networks, it has become critical to preserve users’ privacy, without preventing them from socialization and information sharing. Unfortunately, existing approaches from either human-oriented or technology-centered camp fall short meeting such requirements. Often, findings in human-oriented camp have little concern on computational or implementation-related aspect while those in technology-centered camp use over-simplified privacy model due to lack of understanding of user needs and privacy policy. Toward this dichotomy between two perspectives on user privacy in social networks, over the project period, we have accomplished the following objectives: (1) we proposed a unifying Social Circle framework that bridges the gap between human-oriented and technology-centered privacy perspectives; (2) using the developed social circle model, we have analyzed the privacy protection mechanism in commercial social network platforms; (3) we have developed a personalized, context-aware privacy scoring mechanism to automatically assess the sensitiveness of unstructured text messages in online social platforms such as Twitter; and (4) we have Investigated users' privacy attitudes and leakages to better understand complicated privacy issues better, using Instagram as an example case. Our technical achievements have appeared or will appear in two dozen academic publications at top-tier outlets. Finally, we have also successfully trained a number of graduate students and undergraduate students under REU program, providing in-depth and hands-on research environment.


Last Modified: 02/16/2019
Modified by: Dongwon Lee

Please report errors in award information by writing to: awardsearch@nsf.gov.

Print this page

Back to Top of page