New model to help organize, keep private 'vast ocean' of social network data
- Date:
- August 27, 2010
- Source:
- University of Arkansas at Little Rock
- Summary:
- Researchers have developed a new model to manage the "vast ocean" of user-generated content being generated by the ever-growing social networking sites including Facebook and Twitter.
- Share:
Professors and a graduate student from the College of Engineering and Information Technology at the University of Arkansas at Little Rock (UALR) have developed a new model to manage the "vast ocean" of user-generated content being generated by the ever-growing social networking sites including Facebook and Twitter.
Dr. Nitin Agarwal, assistant professor in EIT's Department of Information Science, and his doctoral student M. Venkata Swamy worked with Dr. Srini Ramaswamy, former chair of the UALR Department of Computer Science and now director of Industrial Software Systems at ABB India, to develop a Context-Based Privacy Model. The model leverages intelligent, scalable, adaptive, and robust pattern-matching algorithms to allow Internet sites to automatically adjust privacy needs of consumers or organizations to the context in which the data is accessed.
The research was supported in part by grants from the Office of Naval Research and the National Science Foundation.
Their paper on the project was awarded "Best Paper" and was presented at the Second International Symposium on Privacy and Security Applications held in conjunction with the Institute of Electrical and Electronic Engineering (IEEE) International Conference on Privacy, Security, Risk, and Trust Aug. 20-22 in Minneapolis, Minn. Only 13 percent of papers submitted at the highly competitive conference are presented.
"With the advent of social media websites such as Facebook, MySpace, and Twitter, and social health websites such as PatientsLikeMe that help people with health conditions connect with people with like conditions, a vast ocean of user-generated content has been created -- including non-sensitive information as well as sensitive demographic, financial or health-related data," Agarwal said. "As a result, users may be unknowingly granting access to their data, leading to grave privacy concerns."
In recent years, companies' data information centers are facing increasing federal regulations due to these privacy concerns, forcing them to modify their privacy information-handling policies continuously. The existing research on developing privacy models, although seem persuasive, are essentially based on user, role or service identification. Such models are incapable of automatically adjusting privacy needs of consumers or organizations to the context in which the data is accessed.
"In this work, we propose a Context Based Privacy Model (CBPM), which leverages the automatic context identification of the information consumer borrowing concepts from Object Oriented methodology," the researchers said. A context could be defined as a secure or non-secure location, family members, or group of friends, etc.
"Considering numerous pieces of information such as name, telephone number, e-mail address, age, gender, items purchased online, social interactions each individual generates; and the number of contexts created, the CBPM matrix could quickly become huge and unmanageable."
The UALR team addresses that problem by leveraging intelligent, scalable, adaptive, and robust pattern-matching algorithms to compress the matrix, making it more manageable.
"Our work has shown the necessity of avant-garde privacy models dealing with the challenges of new types of information sources, creating a vast ocean of data with intricate access requirements and constraints, forcing us to think beyond the existing user, role, or service-based privacy models," Agarwal said. "The proposed work is unique, one of its kind emphasizing on the context more importantly than the content, with far-reaching implications in the privacy as well as the information security area."
Story Source:
Materials provided by University of Arkansas at Little Rock. Note: Content may be edited for style and length.
Cite This Page: