=Paper= {{Paper |id=Vol-356/paper-2 |storemode=property |title=Setting Access Permission through Transitive Relationship in Web-based Social Networks |pdfUrl=https://ceur-ws.org/Vol-356/paper2.pdf |volume=Vol-356 |dblpUrl=https://dblp.org/rec/conf/www/HongS08 }} ==Setting Access Permission through Transitive Relationship in Web-based Social Networks== https://ceur-ws.org/Vol-356/paper2.pdf
Setting Access Permission through Transitive Relationship
             in Web-based Social Networks

                                                     Dan Hong               Vincent Y. Shen
                                          Department of Computer Science and Engineering
                                          Hong Kong University of Science and Technology
                                                           Hong Kong
                                                      {csdhong,shen}@cse.ust.hk

ABSTRACT                                                                       1.     INTRODUCTION
The rising popularity of Web 2.0, such as blogs, forums, online cal-              With the increasing popularity of Web 2.0 services, more and
endars/diaries, etc., makes users more interested in keeping their             more Web users post their articles, pictures, comments on the Web
data on the Web. Sharing of such data could make life more enjoy-              through blogs, forums or other Web applications. Based on the
able and convenient. For example, posting new photos about activ-              “State of the Blogosphere” report [19], 120,000 new weblogs are
ities or sharing views about an event can let friends know what a              being created worldwide each day. Many online communities have
user cares about. However, some of these data (such as a person’s              been established when users create accounts at those website hosts.
location during a particular time, opinion about a political event,            In these communities users share their beliefs, opinions and in-
etc.) are private and should not be accessed by unauthorized users.            terests. Communities on these websites are set up based on the
Although Web 2.0 facilitates sharing, the fear of forwarding sen-              “common interest" page their members marked. Each person can
sitive data to a third party without knowledge of the data owners              be members of several different communities and private data (e.g.
discourages people from using certain applications due to privacy              identification, financial record, location, calendar, Web content) are
concerns. We take advantage of the existing relationships on social            commonly shared along community connections. However, these
networks and build a “trust network” with transitive relationship to           data sharing activities through Web-based social networking bring
allow data sharing while respecting the privacy of data owners. The            serious privacy concerns since users do not have control over who
trust network linking private data owners, private data requesters,            can access their personal data.
and intermediary users is a directed weighted graph. The permis-                  Nowadays, many users use a Web-based calendar, such as Google
sion value for each private data requester is automatically assigned           Calendar [9], to arrange their appointment schedules. It is possible
in this network based on the transitive relationship. Experiments              to provide a feature to let users define activity categories, such as
were conducted to confirm the feasibility of constructing the trust            “family activity”, “work activity”, “church activity”, etc. Figure
network from existing social networks, and to assess the appropri-             1(a) shows such a calendar which has several different categories.
ateness of permission value assignments in the query process. This             When a visitor of the website clicks on an item of the calendar,
privacy scheme can make private data sharing manageable by data                detailed information (such as location, contact person, etc.) about
owners, who only need to define the access rights of their closest             the event is displayed. It is also possible to provide a feature for
contacts once.                                                                 the owner to define different groups (user context) who may access
                                                                               different categories of the calendar. For example, assuming Alice is
Categories and Subject Descriptors                                             the owner of such a calendar. As a family member, her sister Karen
                                                                               can see “family activity” in detail but not the detailed information
K.4.1 [Computers and society]: Public Policy Issues—Privacy;                   of events in other categories. This strict definition of groups is use-
H.3.5 [Information storage and retrieval]: Online Information                  ful, but it does not fully satisfy Alice’s needs. To make the calendar
Services—Data sharing; H.1.2 [Models and principles]: User/Ma-                 more useful, some undefined visitors should also be allowed to see
chine Systems—Human factors                                                    part of her calendar. Consider the following two scenarios:

General Terms                                                                       • Bob, who is one of Alice’s colleagues, can check her sched-
                                                                                      ule and see the details of her “work activity”. Carl, who is
Design, Human Factors
                                                                                      Bob’s friend, hopes to make an appointment with Alice for
                                                                                      some business discussion.
Keywords
Data Privacy, Trust Network, Transitive Relationship, P3P, Social                   • Donald, who is Alice’s travel agent, can check her sched-
Network                                                                               ule for the arrangement of a family vacation. Edward, who
                                                                                      works for the car rental company which is a business part-
                                                                                      ner of Donald’s agency, needs the information regarding the
                                                                                      family’s arrival time.

                                                                                  The normal action for Carl is to ask his friend Bob to make the
Copyright is held by the Authors. Copyright transfered for publishing on-
                                                                               appointment for him. He may also write to Alice directly. This
line and a conference CD ROM.                                                  requires some amount of interactions between Carl and Bob, and
SWKM’2008: Workshop on Social Web and Knowledge Manage-                        may also involve Alice directly or indirectly. It will be more conve-
ment @ WWW 2008, April 22, 2008, Beijing, China.                               nient if Carl can inherit some access right from Bob, who is Alice’s
.
                     (a) Without Privacy Management                                    (b) With Privacy Management

                                                      Figure 1: Web Calendar Example


colleague, and can check Alice’s calendar directly for her “work ac-     data access permission values when there is an existing social net-
tivity" items when he visits her website. Donald (the travel agent)      work. The contributions of this paper include the construction of a
and Edward (the car rental agent) are in a similar situation; they       trust network from existing social networks. This network can be
should have the right to see the “family activity” category, but not     used to manage the sharing of private data in the Web environment.
the “work activity” category. Moreover, Alice’s calendar can be          This trust network concept may be applied to data sharing in other
checked by Donald and Edward based on additional context: Alice          ubiquitous computing environments.
might only allow Donald to check her calendar after the final ar-           The rest of the paper is organized as follows. Section 2 describes
rangement of her trip is settled and before the end of her trip (time    the related effort in improving privacy management. Section 3 de-
context); and Edward is only allowed to check Alice’s calendar in-       scribes how to bootstrap the trust network from an existing social
formation related to Edward’s city (location context) and during the     network. Using the Web calendar as a case study, Section 4 demon-
trip (time context, inherited from Donald).                              strates the process of trust network initialization and data sharing
   It is hard for Alice to assign a special group and access right       with obfuscation rules. A framework on how the components of
to every potential user for different calendar categories. It is not     the system to manage private data sharing can be implemented
possible to assign an access right to someone whom Alice does not        is given in Section 5. Section 6 summarizes the experiments we
even know, such as Carl and Edward. But a “trust network" can            have done using an existing social network (MSN.com) to study
be used to derive specific access rights when needed. The network        the characteristics and significant issues of the trust network. Sec-
is a directed graph which represents the trust relationship among        tion 7 discusses possible refinements for the permission assignment
users in it. During the query process, some private data owners          techniques. Section 8 contains the conclusions and future work.
(PDOs) might be willing to share their private data with private
data requesters (PDRs) through the network. We note that the trust
relationship is transitive; i.e., Alice trusts Bob and Bob trusts Carl   2.    RELATED WORK
implies Alice trusts Carl to a certain extent. It is also directional;      In order to identify Web users and their relationship with others,
i.e., although Alice trusts Carl by implication, Carl may not trust      the Friend of a Friend (FOAF) [2] project creates a set of machine-
Alice regarding his private data. Since the trusted PDR through          readable pages describing people, the links between them, and the
transitive trust relationship might have less access right (Edward       things they create and do. This could be the basis to construct trust
does not have the same right as Donald has in the above example),        networks by bootstrapping from existing social networks.
the information released to indirectly-trusted PDRs may need to             Much of the fundamental work in the analysis of social networks
be obfuscated according to the level of trust. The trust network         and the major advances in the past century have been carried out in
therefore requires:                                                      the fields of sociology, psychology, and communications [8, 22].
                                                                         The first step to facilitate social networking is to have a definition
   1. Trust relationship defined by PDOs                                 of trust that captures the social features for both local and global
                                                                         scopes [24]. Trust management is quite well studied in P2P sys-
   2. Obfuscation (Web data annotation) rules defined according          tems and semantic Web [13,14,16,23,24]. In [14], a definition that
      to the nature of private data                                      captures the nature of social trust relationships and an algorithm
                                                                         are proposed for computing the trust value in social networks using
   With the help of obfuscation rules, the access right is no longer     default logic. Kamvar et al. proposed EigenTrust for reputation
binary (“yes" or “no"). The access right for a private data item is      management for file sharing in P2P systems [13]. Richardon pro-
considered a PERMISSION VALUE, which represents how much de-             posed a trust value computation method using probability theory in
tail the private data item can be given to the PDR based on the level    global belief combination which can provide each user a personal-
of trust. Figure 1(b) shows the result when Carl looks at Alice’s        ized set of trust values [16]. Trust propagation is another important
calendar when he visits the website. From the figure we can find         research topic. Guha et al. proposed a method for predicting trust
out that Carl can only see the “work activity” and for the “family       between users [10]. The trust acquisition and propagation model is
activity” Carl only knows that Alice is busy. The ability to con-        discussed in [5, 6, 25]. However, the relationship between trust and
trol the sharing of private data makes life easier since Carl does not   online private data is not well addressed.
need to ask Bob, who is Alice’s colleague, to help checking Alice’s         The online data privacy problem has been noticed for quite a
calendar.                                                                long time. The Platform for Privacy Protection (P3P) Project [21]
   In this paper, we are not focusing on how to define Web data in       of the World Wide Web Consortium (W3C) is a method for web-
various levels of obfuscations. We solve the problem of assigning        sites to publish their privacy policies. The APPEL language [20]
works with P3P and enables users to exchange privacy preferences
according to published privacy policies. P3P has not yet received
much acceptance from Web users mainly due to its lack of en-
forcement, since current implementations do not include compli-
ance of user preferences. Kolari et al. have pointed out that an
enhanced P3P based on the Rei language can provide an improved
trust model [15].
   A lot of research has also been done on statistical databases
to protect privacy through query restriction, data perturbation and
output perturbation [1]. Such research focuses on hiding the re-
lationship between the identity of the PDO and relevant private
data [11, 18]. An example is that instead of giving the applica-
tion an exact location, a regional context is used to satisfy the K-
anonymity requirement. A list of candidates is returned to obfus-
cate private data [17]. There has not been much attempt to connect         Figure 2: Facebook Network Example (1190 nodes). The data
this approach with access control rules.                                   includes friends of ID 655183482 and friends of friends.
   Since P3P does not provide any mechanism to ensure that these
promises are consistent with internal data processing at the web-
site, a purpose-based access control method can be used as an ex-
tension of P3P [4]. To address this issue we have proposed to ex-                             permission = trust(a, g, c)
tend the P3P protocol, which is a W3C recommendation for Web
applications. We have successfully applied this extension to some          Where a is the PDO involved, g is a member within a group of
context-aware applications [12]. But the extension did not consider        contacts that the PDO has defined, and c is the context where the
transitive trust relationships. PDOs still need to specify every po-       permission value applies. The context in Definition 1 provides the
tential PDR’s access right based on the categories defined by P3P,         application developer and the PDOs the ability to set the constrains
which makes management of private data cumbersome.                         in data sharing. Context may be related to the time, location, nature,
                                                                           etc. of an event. For example, Alice only allows Bob to view his
                                                                           calendar on her “working” activity. The event type "working" in the
                                                                           calendar can be considered as one context. It is extensible based on
3. FROM SOCIAL NETWORK TO TRUST                                            the needs of the application or the PDOs.
   NETWORK                                                                    PDOs are requested to define data access permissions for all the
   In the Web-based social network, the PDOs need to have some             direct users using their privacy preferences. The permission value
control on the management of their private data. However, it is not        can be a decimal number ranging from [0,1], where 1 represents
practical for a PDO to set a particular permission value for each          total trust and 0 represents no trust at all. The 0 permission value
private data category for every potential PDR. The role-based ac-          is seldom used in online social networks because a PDO joins the
cess control (RBAC) has partially solved the problem [7]. In this          network for the purpose of sharing data with friends there. The
approach, it is required to define all the potential users’ into some      context in Definition 1 refers to the particular situation a permis-
groups. For example, in the UNIX file system, the file owner (user)        sion value is assigned. The context includes time context, location
can give each role (user, group, and other users) some specific per-       context, and query context (such as purpose, retention, etc.) When
missions (read, write, execute). With the role-based access control,       Web data annotation is available in the social network, the annota-
a PDO needs to define the permissions based on the roles of PDRs.          tion can also be part of the query context. For each kind of private
But it still may be difficult to define the role of every potential PDR.   data, the PDO can define several permission values to fit different
Therefore it will be very nice if a transitive trust relationship exists   contexts. A GROUP represents a group of PDOs who share the same
among the potential PDRs.                                                  permission value. A group can either be defined by a third party or
   It turns out that the transitive relationship does exist in our daily   by a PDO. One of the most popular Web-based social networks,
life. For example, if Carl wants to know how much is the toll to           Facebook, allows users to create private groups or to join the ex-
travel through the Cross Harbor Tunnel in Hong Kong, he may ask            isting regional or alumni networks. Figure 2 shows “my friends”
his friend Bob about it. If Bob does not have the answer, he may           and “friends of my friends” relationship on Facebook for one of
continue asking his friends by phone calls or by emails. Later from        the authors. We can see that the relationship has been defined be-
Alice, Bob finds out the toll charge and passes the information to         tween Facebook users through the profile. When a PDO assigns
Carl. Formally speaking, this transitive query continues until a sat-      his friends the permission which can be written in a preference file,
isfactory answer is obtained and returned to the originator along the      the network becomes the trust network. The preference file can be
query path.                                                                stored as a single document or attached to the private FOAF doc-
   When each person who is willing to share data in the community          ument [2]. The trust relationship described above only supports
is represented by a vertex, and when how much a PDO trusts a               the direct relationship. In the Web calendar application, the tran-
PDR is represented by an edge, the whole community becomes a               sitive trust relationship also needs to be considered. Carl, who is
trust network. When users share private data in a community, the           not directly connected with Alice, links to Alice through Alice’s
access decision is based on the trust relationship between the PDO         colleague Bob. In order to achieve this, we define a new operation
and the PDR in the trust network.                                          JOIN .

                                                                              D EFINITION 2. T RANSITIVITY determines whether a trust re-
  D EFINITION 1. The TRUST relationship between a PDO and                  lationship can be extended outside of the directly-connected PDRs.
one of its contacts is a permission value assigned by PDO to a             A propagated trust (Ptrust) relationship based on transitivity can
potential PDR:                                                             be used to extend the relationship to other users. The JOIN opera-
tion shows that the trust relationship is transitive; that is, if PDO
A trusts PDR B, who in turn trusts PDR C, it implies that PDO A
Ptrusts PDR C .

     ∀a : PDO, i, j : GROUP, c : CONTEXT, ∃interim ∈ i
     trust[a, i, c] = p1 , trust[interim, j, c] = p2 ⇒
     P trust[a, j, c] = trust[a, i, c] ⊲⊳ trust[interim, j, c] = min(p1 , p2 )

   With the JOIN operation, the permission propagates along the
trust network with the maximum possible value. Every potential
PDR can be assigned a permission value automatically if he is
within the community or from a related community. In a real ap-
plication a PDO might set more restricted access. Additional oper-
ations will be proposed in the future.

4. TRUST NETWORK AND OBFUSCATION                                                 Figure 3: FaceBook Multiple Relationship Example.
   Privacy management is separated into four steps: context prun-
ing, transitive trust network initialization, permission value com-
putation and data obfuscation. The four steps are applied when ap-        relationships together to build the trust network. For the example
propriate. In this section, we use the example when Edward sends          discussed in 1, after context pruning we know the direct trust rela-
a query on Alice’s “family activities” in the calendar application to     tionships form a tree. Figure 4 shows the result after merging all
demonstrate these four steps.                                             direct trust relationship trees of Alice, Bob, Edward and Donald.

4.1 Context Pruning
   In a Web-based social network, users are allowed to define a lot
of relationships with other users. For example, in Facebook users
can define every relationship with all friends, such as “We went
to school together” or “We took the course together”. Moreover, a
user can further specify which school and which course to establish
the link between two users. As a result, group definition is quite
complicated. Each PDO might need to define permission values
for an individual person or a group based on different contexts.
   The goal for context pruning is that trust relationship only prop-
agates within the same group of people. For example, Alice would
like to share her “work activity” with Bob. But she may not wish to
share the information with Bob’s family doctor, whom Bob trusts
totally. Therefore the trust network should be restricted by context.             Figure 4: Trust Network- Transitive Relationship
We zoom in Figure 2 and extract part of the real Facebook network
as shown in Figure 3. The church events in the calendar can be
                                                                             D EFINITION 3. In a trust network, the hops of a PDR is the
exchanged among all members of this network since all these five
                                                                          number of vertices to traverse along the shortest path from the PDO
people are from the same church "CBIBC". But the work event is
                                                                          to this PDR.
just shared between Michelle and Cammy since they “worked to-
gether" and no other user in the network has a similar context. Here         Even if the complexity of privacy preference files has been de-
“church” or “work”, which might be an attribute of the event, can         creased by using group-based permission assignments, to define the
be considered a context.                                                  permission values of every potential PDR is still plenty of work.
   Suppose there are two groups of users trusted by a PDO and a           With the transitive relationship, a PDO only needs to define the
PDR is in both of the groups. If the PDR requests information             permission values of those PDRs who have a “close” relationship,
from the PDO then it might be reasonable for the PDO to provide           or are directly connected in the trust network. Based on the privacy
the larger permission value derived from each of the two groups.          preferences defined for each of these PDRs, the trust relationship
Another task for context pruning is to find out the maximum per-          can be computed and propagated to the rest of the trust network.
mission value for every direct trust relationship on the condition of     Since there are various types of private data on the Web, we need
satisfying the context requirement.                                       to consider the data categories, sharing contexts during the trust
   In the previous example, during the trip time the travel agent         network merging process.
Donald is trusted by Alice based on RECIPIENT “ours”(see the
definition in [21]). For other times, since the query context is not      4.3     Permission Value Computation
satisfied, Donald is not trusted.                                            Note that to apply the transitive relationship, all the trust rela-
                                                                          tionships during the propagation process need to have the same
4.2 Transitive Trust Network Initialization                               context. Before computation of the permission value for a PDR,
   Even if a PDO defines only a small portion of the whole commu-         context pruning will ensure the network initialized in 4.2 is extend-
nity, data can still be shared based on the PDO’s preferences. The        able.
users a PDO trusts may also have their own trust relationships (e.g.,        Algorithm 1 can be applied to implement the JOIN operation in
Donald trusts Edward due to partnership). We need to merge all the        order to compute the shortest path from the PDO (source) to a PDR
(destination). Given a social network graph G(V, E), where V is             control factors:
the vertices set and E is the trust relationship set. p(u, v) is user v’s
permission value given by user u. Extract_M AX(Q) is used to                     1. Maximum propagation hops, hopmax : how many hops pri-
extract the vertex with the maximum permission value which is not                   vate data can be passed along the network. This is helpful to
in the finished set S. Through Algorithm 1, a user can get the most                 stop data propagation to PDRs who are too far away.
private data from a PDO based on the permission value assigned.
Algorithm 1 is only one simple and possible solution to compute                  2. Damping factor, ̟: How much data is obfuscated through
the permission value. The pageRank [3] or Max-Flow might be                         every hop. This method gradually reduces the information
used to defined and compute the Ptrust.                                             available and makes sure that an unknown PDR cannot get
                                                                                    too much detailed information through several trustable in-
                                                                                    termediary users.
Algorithm 1 Permission Value Computation
Input:A weighted directed graph G(V,E)                                           Therefore we can replace line 15-18 of Algorithm 1 by:
edge weight, p(u,v), is the permission from u to v
PDO, PDR
Output:Permission Value                                                           if min(permission[u], p(u, v)) × ̟ > permission[v]
 1: for all vertex v in V do                                                      hop[v] ≤ hopmax ∧ u is not PDO then
 2:   permission[v]=0                                                                permission[v] = min(permission[u], p(u, v)) × ̟
 3:   previous[v]=undefined                                                          previous[v] = u
 4: end for                                                                       end if
 5: permission[PDO]= 1
 6: S= empty set                                                               With the help of hopmax and the damping factor ̟, the private
 7: Q= V[G]
 8: while Q is not an empty set do                                          data is controlled to spread only within a certain number of hops.
 9:   u= Extract_MAX(Q)                                                     Moreover, the farther a PDR is away from a PDO, the less private
10:    if u equals PDR then                                                 data he receives. For the previous example, Edward can know Alice
11:       return permission[u]                                              is in HKUST without the damping factor. And if the ̟ = 0.7,
12:    end if                                                               then permission for Edward is 0.42. Edward can only know that
13:    S= S union u                                                         Alice is in Hong Kong. The permission values might be hard for
14:    for all edge (u,v) outgoing from u do
15:       if min(permission[u], p(u, v)) > permission[v]                    PDO to understand. It is helpful to visualize the social network by
          then                                                              painting users in the network with colors of different shades based
16:          permission[v] = min(permission[u], p(u, v))                    on the permission values assigned as shown in Figure 8. And it
17:          previous[v] = u                                                is also very helpful to assign the critical person, who has lots of
18:       end if                                                            connection the PDO are not familiar with, a sharp ̟ in order to
19:    end for                                                              keep the data private.
20: end while

   When Algorithm 1 is applied to Figure 4, it first puts Donald
                                                                            5.      FRAMEWORK OVERVIEW
and Bob into the waiting queue Q. Then the Extract_M AX                        In the Web calendar example, we use the Privacy Server frame-
function extracts Donald from the queue and puts Edward and Un-             work as shown in Figure 5. The PDOs define their private data
known1 into Q. Then Bob is extracted and Carl is put into Q, too.           through the PDO Preference Manager and store their preferences
The Extract_M AX function processes Unknown1 and Edward                     in the PDO Preference Database. When there is a data query ini-
in order. When Edward is handled, the algorithm knows Edward’s              tiated by a PDR, the Private Data Query Adapter acts as an inter-
permission value. Therefore the trust is propagated from Alice to           preter for the query and sets up the trust network based on PDO’s
Donald and finally to Edward. We compute the permission value of            preference definition. The data query should include all the context
every potential user (all users except Alice herself), and use a gra-       information (e.g., the reason to access the data, how to forward data
dient color to represent the value as shown in Figure 4. The darker         to third parties and application user name). With the PDO informa-
the vertex’s color, the higher permission value it holds. We can see        tion from Context Database, the Adapter computes the permission
the effects of trust propagation by the changing color shades.              value based on PDO’s preference and passes the value to the Ob-
                                                                            fuscation Manager. A fuzzy result is returned based on applicable
4.4 Data Obfuscation                                                        obfuscation rules and the permission value.
   There are lots of data items that can be represented in a hierarchi-
cal way. For example, the “current location" is a frequently-used
private data in different applications. Room 4208, Floor 4, HKUST,
Hong Kong, China is a common address to define a location pre-                                            Private Data      PDO
                                                                                            Data Query   Query Adaptor   Preference
cisely. To protect privacy, for some PDRs in some applications, a                                                        Database        PDO
                                                                                                                                      Preference
PDO may want different information shown on the PDR’s screen.                         PDR                                              Manager     PDO
                                                                                                          Obfuscation
Detailed information (room number, etc.) is given to close friends                             Result
                                                                                                           Manager

and general information (Hong Kong) is given to unknown PDRs.
Based on the transitive relationship, the permission value can be                                                         Context
                                                                                                                         Database
used to control the degree of obfuscation for a certain private data
item based on either the default value or the user’s preference.
   From Figure 4, we see that when the trust network becomes com-                  Figure 5: Privacy Server Implementation Framework
plex it is quite possible for an unknown PDR to obtain private data
after several data passing actions. In order to make sure the pri-             A trust network is set up based on the transitive relationship de-
vate data passing scale is controllable, a PDO needs to set up some         fined by each PDO, which is derived from the online community
information. Users in a whole community who are willing to share
private data become vertices in the network while the trust relation-
ship between each other becomes edges. The strength of the trust
relationship becomes private date permission value which denotes
the edge weight in the trust network. Since the trust relationship
is asymmetric, the whole trust network is a directed graph. When
there is a private data query, the problem becomes the checking
of whether there is a path from a vertex (PDO) to another vertex
(PDR) in a directed graph.
   After the permission value is obtained, the Obfuscation Manager
blurs the private data according to the value and still returns some
information to the PDR (unless the permission value is zero, indi-
cating that the PDR is forbidden from accessing the data). Context
data can often be represented in many ways and forms. For ex-
ample, the location context can be represented at a particular point
geographically, or in regions of various sizes which contain that
point. Alice’s location, in the previous example, could be repre-
sented as ,                         (a) Random Permission Value Assignment
showing that Alice’s location information at a certain time is one of
Cross Harbor Tunnel, Hong Kong and China depending on the per-
mission value. The Obfuscation Manager returns different results
for different queries based on the relationship between the PDO
and the PDR.
   The transitive relationship and obfuscation rules break the cur-
rent binary private data access characteristic and make context shar-
ing easier. We modify the Web calendar component, JEvent, and
build the Privacy Management Framework for it as shown in Figure
1. Figure 1(a) is the original JEvent service. Users are allowed to
check all the detailed calendar information by clicking on the event.
With the privacy management as shown in Figure 1(b) only the reg-
istered users can check the calendar and the “Family activities” is
not available based on the data category the calendar owner (PDO)
has defined. The successful hacking of the code for JEvent shows
that the transitive trust relationship does work in a real application.
   This framework is not specially defined for the Web calendar;
other applications can also connect to the Privacy Server through                 (b) Assign High Permission value for Relationship
an HTTP connection for the current CGI version.
                                                                                      Figure 6: Transitive Network Efficiency
6. EXPERIMENT
6.1 General Characteristics of the Trust Net-                             than random assignments in the range of [0,1). By changing the
    work                                                                  range to [0.6,1), the results are shown in Figure 6(b). Compare
                                                                          Figure 6(a) and Figure 6(b), we see that the colors in Figure 6(b)
   Our study is focused on the “trust network” where edge (u, v)
                                                                          are darker, which means that the permission values are higher after
means u trusts v with a labeled permission value. There are lots of
                                                                          trust propagation when higher permission values are assigned ini-
online communities available currently, such as MSN, Facebook,
                                                                          tially. Therefore the permission values defined by PDOs are indeed
Blogger, etc. We picked MSN due to its popularity to test the imple-
                                                                          affecting the private data propagation process.
mentation of permission value assignment scheme. Starting from
one of the authors’ friends who posts her friends list on the Web1 ,
we used a crawler to trace the friends lists. We visited 187 users
                                                                          6.2    Control Factors
who are connected with the friend within four hops and obtained              Figure 6 demonstrates that it is possible to construct a trust net-
other 1,181 related users. None is more than four hops away from          work from an existing social network for managed data sharing,
the friend. Since there was no permission value currently supported       if the social network supports the setting of permission levels. We
by MSN, we randomly assigned different permission values for ev-          then explore how a PDO can control the transitive relationship with
ery relationship.                                                         partial trust.
   Figure 6 contains the trust propagation results after we randomly         The maximum number of hops hopmax can be set by a PDO
assigned permission values using Math.random (range [0,1)). The           in order to control how far the private data can be forwarded. We
permission values became very small after four hops as shown in           again use the MSN social network as a test base. We randomly
Figure 6(a), since most peripheral nodes are in light color. If these     assigned permission values to every trust relationship and then kept
peripheral nodes wish to see the central node’s information, their        this directed graph unchanged in the following experiment.
requests will not be successful. Since friend lists on MSN are de-           When no transitive relationship was allowed (hopmax = 0),
fined by the users manually, the trust relationships should be higher     1,350 queries got no permission during data sharing in Figure 7(a).
                                                                          When the transitive relationship was allowed, the non-empty query
1
    MSN URL:http://rp20040619.spaces.live/friends                         number was dramatically increased when hopmax = 3. This is
because there are few users on the first one or two hops of the trust                                       ⇀ Unknown3. However, Unknown3 is directly defined in Alice’s
network. The bigger hopmax was, the more detailed result could                                              trust tree with permission value 0.4 (green line). There is now a
be obtained. Moreover, we noted that blanket permission was not                                             conflict between the direct trust and trust derived from transitive
granted since only a small number of queries could get access to                                            relationships. Since trust based on multiple recommendations from
the private data. We can also see that even if the friend has only                                          a single source should not be higher than that from independent
defined three close friends, if she allows three hops of data sharing,                                      sources, if the PDR is one of the directly-connected vertices with
then around 700 users can see her obfuscated data.                                                          the PDO then the permission for this PDR cannot be higher than
                                                                                                            the permission value originally assigned by the PDO.
                             1400
                                                                                   permission=0
                             1200                                                  permission=0.2
                                                                                   permission=0.4
                                                                                   permission=0.6
                             1000
                                                                                   permission=0.8
          Number of Users




                                                                                   permission=1
                             800


                             600


                             400


                             200


                               0
                                          0             1            2             3                4
                                                    Maximum Trust Propatation Hops


                              (a) Max Hop Number Affects Permission
                             1400
                                                                                           permission=0
                                                                                           permission=0.2
                             1200                                                          permission=0.4
                                                                                           permission=0.6
                                                                                                                    Figure 8: Trust Priority: Directed vs. Transitive
                             1000                                                          permission=0.8
                                                                                           permission=1
           Number of Users




                              800


                              600
                                                                                                            7.2    Standardized Private Data Levels
                                                                                                               It is often hard for users to assign accurate decimal permission
                              400
                                                                                                            values to others. Therefore, we should provide a visualization of
                              200
                                                                                                            the data. The user can directly select the data level they would like
                                0
                                    0   0.1   0.2    0.3   0.4   0.5   0.6   0.7     0.8    0.9     1.0     to share and the program can easily convert the level into a decimal
                                                            Damping Factor
                                                                                                            number.
                               (b) Damping Factor Affects Permission

                                        Figure 7: Control Factors

   Figure 7(b) demonstrates how the damping factor discussed in
section 4.4 affected the permission value. If the damping factor
̟ is zero, it meant that there was no transitive relationship. If
̟ is very small (e.g., 0.1 or 0.2), it strongly restricted the access                                          The levels of a private data item are either defined by a PDO
permission of private data. Even when ̟ became 0.6, most users                                              or by a public ontology. Then different PDOs might have different
got permission value less than 0.2. When ̟ became bigger, the                                               data levels in real applications. For example, Alice defines her loca-
influence of ̟ significantly affected the permission value to access                                        tion in 5 levels, such as “Room 4208, Floor 4, HKUST, Hong Kong,
private data.                                                                                               China". Her secretary only uses “HKUST, Hong Kong, China”.
   We understand that the number of users who get permission might                                          When the secretary grants Bob with permission value 0.67, Bob
be different due to different social network topologies. For exam-                                          can only know “Hong Kong”. If Alice gives a 0.8 permission value
ple, if the PDO defines a lot of close friends, there will be a num-                                        to her secretary, then with the transitive relationship Bob gets 0.67
ber of users who get permission to access private data even when                                            (the maximum of 0.8 and 0.67) permission value and consequently
hopmax = 0,. The selection of ̟ and hopmax will indeed affect                                               a more specific area name (HKUST) of Alice’s location. This could
the topology of the trust network. But the trend of trust propagation                                       be a big privacy hole.
will not change too much. In practice the damping factor should be                                             A possible solution is that for each category a standardized pri-
used with maximum hop number together in order to achieve the                                               vate context data level is set up and shared by all PDOs through a
desired access control. Moreover, the PDO can set up different                                              separate central information directory which provides all kinds of
damping factors to different groups or specific users if he wishes.                                         information level descriptions. The PDO Preference Manager con-
                                                                                                            nects to that directory and automatically helps users to search what
                                                                                                            other preferences the PDO has defined. Initially, there are only a
7. DISCUSSIONS                                                                                              few default levels for the data. When a PDO wants to have more
                                                                                                            specific context levels, he can insert a level himself and record the
7.1 Trust Priority                                                                                          new level in the central information directory. For example, if Al-
   In a trust network, it is possible that a PDR may obtain more                                            ice wants to identify the current building as a new context level,
private data through transitive relationships. For example Figure 8                                         she finds that this information is between the floor information and
is the result after running Algorithm 1. The gray line represents                                           the area name. Alice can then insert the building name between
the trust propagation path when Unknown3 queries Alice’s infor-                                             them and set the permission value for this new context level to be
mation. Through a full transitive relationship, Unknown3 can get                                            ( 0.6+0.8
                                                                                                                 2
                                                                                                                       = 0.7). When other PDOs define their location informa-
0.6 permission value through the path: Alice ⇀ Donald ⇀ Edward                                              tion, this new level can also be used by them. Since the permission
value is a decimal number between 0 and 1, an infinite number of             the Fourth Workshop on Deception, Fraud and Trust in Agent
context levels can be supported. Another advantage of using stan-            Societies 2001, pages 27–34, 2001.
dard levels is that a PDO can see and directly choose the informa-       [7] D. F. Ferraiolo, J. F. Barkley, and D. R. Kuhn. A role-based
tion level he wishes to share with other users instead of assigning a        access control model and reference implementation within a
                                                                             corporate intranet. ACM Transactions on Information and
permission value which may not be meaningful to the PDO.                     System Security, 2(1):34–64, 1999.
                                                                         [8] L. Garton, C. Haythornthwaite, and B. Wellman. Studying
7.3 Other Applications                                                       online social networks. Journal of Computer-Mediated
   With the development of ubiquitous computing, more and more               Communication, 3(1), June 1997.
private data is available to the public either on the Web or through     [9] Google. Google calendar. www.google.com/calendar.
other applications. For example, a mobile service provider has al-      [10] R. Guha, R. Kumar, P. Raghavan, and A. Tomkins.
ready started friend location service. Users can dial a special num-         Propagation of trust and distrust. In WWW ’04: Proceedings
ber to trace friends’ location. Users might lose privacy control in          of the 13th international conference on World Wide Web,
                                                                             pages 403–412, New York, NY, USA, 2004. ACM Press.
that situation because he may not know what information about
                                                                        [11] A. Y. Halevy, A. Rajaraman, and J. J. Ordille. Data
him is shared, compared with the social network situation that the           integration: The teenage years. In VLDB, pages 9–16, 2006.
user is the publisher of his own data on the Web. It is possible that   [12] D. Hong, M. Yuan, and V. Y. Shen. Dynamic privacy
through such a service, a thief can find out a user’s regular sched-         management: a plug-in service for the middleware in
ule, such as the time to go home, by tracking the user’s location for        pervasive computing. In MobileHCI 2005, pages 1–8,
a period of time before breaking into his home when he is not there.         Salzburg, Austria, September 2005. ACM.
The convenience of ubiquitous computing applications will not be        [13] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The
enjoyed unless users can control what private data to share with             eigentrust algorithm for reputation management in p2p
                                                                             networks. In WWW ’03: Proceedings of the 12th
whom at what time. Our privacy server framework can be helpful               international conference on World Wide Web, pages
in these applications.                                                       640–651, New York, NY, USA, 2003. ACM Press.
                                                                        [14] Y. Katz and J. Golbeck. Using social network-based trust for
8. CONCLUSIONS AND FUTURE WORK                                               default reasoning on the web. Submitted to Journal of Web
                                                                             Semantics, 2007.
   In this paper we propose a transitive trust network for private      [15] P. Kolari, L. Ding, S. G. A. Joshi, T. Finin, and L. Kagal.
data sharing in social networks. Private information can be shared           Enhancing web privacy protection through declarative
through the trust network. We use a Web calendar application to              policies. In POLICY ’05: Proceedings of the Sixth IEEE
show the process of using trust network algorithms to share data.            International Workshop on Policies for Distributed Systems
We finally demonstrate the feasibility of constructing the trust net-        and Networks (POLICY’05), pages 57–66, Washington, DC,
                                                                             USA, 2005. IEEE Computer Society.
work from an existing social network. The characteristics of such
                                                                        [16] R. Matthew, R. Agrawal, and P. Domingos. Trust
a trust network are analyzed which may be applied to data shar-              management for the semantic web. In Proceedings of the
ing in ubiquitous computing environments. We plan to launch the              Second International Semantic Web Conference, 2003.
Web calendar service with trust network and collect data for further    [17] M. F. Mokbel, C.-Y. Chow, and W. G. Aref. The new casper:
development. We shall also develop plug-ins and propose to own-              Query processing for location services without
ers of social networks that users be allowed to use them to assign           compromising privacy. In VLDB, pages 763–774, 2006.
permission values to their contacts.                                    [18] L. Sweeney. k-anonymity: a model for protecting privacy.
                                                                             International Journal on Uncertainty, Fuzziness and
                                                                             Knowledge-based Systems, 10(5):557–570, 2002.
Acknowledgement                                                         [19] Technorati. State of the blogosphere / state of the live web.
This research is supported in part by Hong Kong Research Grant               http://www.sifry.com/stateoftheliveweb/, 2007.
Council Project 619507.                                                 [20] W3C. A p3p preference exchange language 1.0 (appel1.0).
                                                                             http://www.w3.org/TR/P3P-preferences/.
                                                                        [21] W3C. Platform for privacy preferences (p3p) project.
9. REFERENCES                                                                http://www.w3.org/TR/P3P/, April 2002.
 [1] N. R. Adam and J. C. Worthmann. Security-control methods           [22] S. Wasserman and K. Faust. Social Network Analysis :
     for statistical databases: a comparative study. ACM                     Methods and Applications (Structural Analysis in the Social
     Computing Survey, 21(4):515–556, 1989.                                  Sciences). Cambridge University Press, 1994.
 [2] D. Brickley and L. Miller. Foaf project.                           [23] C.-N. Ziegler and G. Lausen. Analyzing correlation between
     http://www.foaf-project.org/, 2007.                                     trust and user similarity in online communities. In C. Jensen,
 [3] S. Brin and L. Page. The anatomy of a large-scale                       S. Poslad, and T. Dimitrakos, editors, Proceedings of the 2nd
     hypertextual web search engine. In WWW7: Proceedings of                 International Conference on Trust Management, volume
     the seventh international conference on World Wide Web 7,               2995 of LNCS, pages 251–265, Oxford, UK, March 2004.
     pages 107–117, Amsterdam, The Netherlands, The                          Springer-Verlag.
     Netherlands, 1998. Elsevier Science Publishers B. V.               [24] C.-N. Ziegler and G. Lausen. Spreading activation models
 [4] J.-W. Byun, E. Bertino, and N. Li. Purpose based access                 for trust propagation. In EEE ’04: Proceedings of the 2004
     control of complex data for privacy protection. In SACMAT               IEEE International Conference on e-Technology,
     ’05: Proceedings of the tenth ACM symposium on Access                   e-Commerce and e-Service (EEE’04), pages 83–97,
     control models and technologies, pages 102–110, New York,               Washington, DC, USA, 2004. IEEE Computer Society.
     NY, USA, 2005. ACM Press.                                          [25] C.-N. Ziegler and G. Lausen. Spreading activation models
 [5] M. Conrad, T. French, W. Huang, and C. Maple. A                         for trust propagation. In EEE ’04: Proceedings of the 2004
     lightweight model of trust propagation in a multi-client                IEEE International Conference on e-Technology,
     network environment: To what extent does experience                     e-Commerce and e-Service (EEE’04), pages 83–97,
     matter? In ARES ’06: Proceedings of the First International             Washington, DC, USA, 2004. IEEE Computer Society.
     Conference on Availability, Reliability and Security
     (ARES’06), pages 482–487. IEEE Computer Society, 2006.
 [6] B. Esfandiari and S. Chandrasekharan. On how agents make
     friends: mechanisms for trust acquisition. In Proceedings of