skip to main content
10.5555/2936924.2937025acmotherconferencesArticle/Chapter ViewAbstractPublication PagesaamasConference Proceedingsconference-collections
research-article
Public Access

Constrained Social-Energy Minimization for Multi-Party Sharing in Online Social Networks

Published: 09 May 2016 Publication History

Abstract

The development of fair and practical policies for shared content online is a primary goal of the access control community. Multi-party access control, in which access control policies are determined by multiple users each with vested interest in a piece of shared content, remains an outstanding challenge. Purposeful or accidental disclosures by one user in an online social network (OSN) may have negative consequences for others, highlighting the importance of appropriate sharing mechanisms. In this work, we develop a game-theoretic framework for modeling multi-party privacy decisions for shared content. We assume that the content owner (uploader) selects an initial privacy policy that constrains the privacy settings of other users. We prove the convergence of users' access control policies assuming a multi-round consensus-building game in which all players are fully rational and investigate a variation of rational play that better describes user behavior and also leads to the rational equilibrium. Additionally, in an effort to better approximate human behavior, we study a bounded rationality model and simulate real user choices in this context. Finally, we validate model assumptions and conclusions using experimental data obtained through a study of 95 individuals in a mock-social network.

References

[1]
M. S. Ackerman, L. F. Cranor, and J. Reagle. Privacy in e-commerce: Examining user scenarios and privacy preferences. In Proceedings of the 1st ACM Conference on Electronic Commerce, EC '99, pages 1--8, New York, NY, USA, 1999. ACM.
[2]
B. An, D. Kempe, C. Kiekintveld, E. Shieh, S. Singh, M. Tambe, and Y. Vorobeychik. Security games with limited surveillance. Ann Arbor, 1001:48109, 2012.
[3]
D. Arnott and G. Pervan. Eight key issues for the decision support systems discipline. Decision Support Systems, 44(3):657--672, 2008.
[4]
L. Backstrom, D. Huttenlocher, J. Kleinberg, and X. Lan. Group formation in large social networks: membership, growth, and evolution. In Proceedings of the 12th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 44--54. ACM, 2006.
[5]
H. K. Bhargava, D. J. Power, and D. Sun. Progress in web-based decision support technologies. Decision Support Systems, 43(4):1083--1095, 2007.
[6]
B. Bhumiratana and M. Bishop. Privacy aware data sharing: balancing the usability and privacy of datasets. In Proceedings of the 2nd International Conference on PErvasive Technologies Related to Assistive Environments, page 73. ACM, 2009.
[7]
R. Böhme and S. Pötzsch. Collective exposure: Peer effects in voluntary disclosure of personal data. In Proceedings of the 15th International Conference on Financial Cryptography and Data Security, FC'11, pages 1--15, Berlin, Heidelberg, 2012. Springer-Verlag.
[8]
M. Brown, B. An, C. Kiekintveld, F. Ordóñez, and M. Tambe. An extended study on multi-objective security games. Autonomous Agents and Multi-Agent Systems, 28(1):31--71, Jan. 2014.
[9]
A. Brush, J. Krumm, and J. Scott. Exploring end user preferences for location obfuscation, location-based services, and the value of location. In Proceedings of the 12th ACM international conference on Ubiquitous computing, pages 95--104. ACM, 2010.
[10]
J. Chen, M. R. Brust, A. R. Kiremire, and V. V. Phoha. Modeling privacy settings of an online social network from a game-theoretical perspective. In Collaborative Computing: Networking, Applications and Worksharing (Collaboratecom), 2013 9th International Conference Conference on, pages 213--220. IEEE, Oct. 2013.
[11]
Y.-L. Chen, L.-C. Cheng, and C.-N. Chuang. A group recommendation system with consideration of interactions among group members. Expert systems with applications, 34(3):2082--2090, 2008.
[12]
P. C. Cheng, P. Rohatgi, C. Keser, P. A. Karger, G. M. Wagner, and A. S. Reninger. Fuzzy multi-level security: An experiment on quantified risk-adaptive access control. In IEEE Symposium on Security and Privacy., pages 222--230. IEEE, 2007.
[13]
L. F. Cranor, J. Reagle, and M. S. Ackerman. Beyond concern: Understanding net users' attitudes about online privacy. Cambridge, MA: MIT Press, 2000.
[14]
F. Fu, C. Chen, L. Liu, and L. Wag. Social dilemmas in an online social network: The structure and evolution of cooperation. Physics Letters A, 371(1--2):58--64, 2007.
[15]
J. Gill. The use of the sequence f n(z)=f_n. . f_1(z) in computing fixed points of continued fractions, products, and series. Applied Numerical Mathematics, 8(6):469--476, 1991.
[16]
C. Griffin, A. Squicciarini, S. Rajtmajer, M. Tentilucci, and S. Li. Site-constrained privacy options for users in social networks through stackelberg games. In Proc. of Sixth ASE International Conference on Social Computing. May 2014., 2014.
[17]
C. Griffin, A. C. Squicciarini, S. Rajtmajer, M. Tentilucci, and S. Li. Site-constrained privacy options for users in social networks through stackelberg games. In Sixth ASE International Conference on Social Computing (SocialCom), 2014.
[18]
R. Gross and A. Acquisti. Information revelation and privacy in online social networks. In Proceedings of the 2005 ACM workshop on Privacy in the electronic society, WPES '05, pages 71--80, New York, NY, USA, 2005. ACM.
[19]
H. Hu, G.-J. Ahn, and J. Jorgensen. Multiparty access control for online social networks: model and mechanisms. Knowledge and Data Engineering, IEEE Transactions on, 25(7):1614--1627, 2013.
[20]
H. Hu, G.-J. Ahn, Z. Zhao, and D. Yang. Game theoretic analysis of multiparty access control in online social networks. In Proceedings of the 19th ACM Symposium on Access Control Models and Technologies, SACMAT '14, pages 93--102, New York, NY, USA, 2014. ACM.
[21]
P. Hui and S. Buchegger. Groupthink and Peer Pressure: Social Influence in Online Social Network Groups. In 2009 International Conference on Advances in Social Network Analysis and Mining (ASONAM), pages 53--59, Los Alamitos, CA, USA, July 2009. IEEE.
[22]
N. Immorlica, B. Lucier, and B. Rogers. Emergence of cooperation in anonymous social networks through social capital. In In Proceedings of the 11th ACM Conference on Electronic Commerce (EC, 2010.
[23]
D. Kahneman. Maps of bounded rationality: Psychology for behavioral economics. American Economic Review, 93(5):1449--1475, 2003.
[24]
P. A. Kirschner and A. C. Karpinski. Facebook® and academic performance. Computers in Human Behavior, 26(6):1237--1245, Nov. 2010.
[25]
J. Kleinberg and E. Tardos. Balanced outcomes in social exchange networks. In Proceedings of the 40th Annual ACM Symposium on Theory of Computing, STOC '08, pages 295--304, New York, NY, USA, 2008. ACM.
[26]
J. M. Kleinberg. Challenges in mining social network data: processes, privacy, and paradoxes. In KDD '07: Proceedings of the 13th ACM SIGKDD international conference on Knowledge discovery and data mining, pages 4--5, New York, NY, USA, 2007. ACM.
[27]
K. LeFevre, D. J. DeWitt, and R. Ramakrishnan. Mondrian multidimensional k-anonymity. In Proceedings of the 22nd International Conference on Data Engineering, ICDE'06, pages 25--25. IEEE, 2006.
[28]
K. Liu and E. Terzi. A framework for computing the privacy scores of users in online social networks. ACM Trans. Knowl. Discov. Data, 5(1):6:1--6:30, Dec. 2010.
[29]
J. Lu, G. Zhang, and D. Ruan. Multi-objective group decision making: methods, software and applications with fuzzy set techniques. Imperial College Press, 2007.
[30]
R. D. McKelvey and T. R. Palfrey. Quantal response equilibria for normal form games. Games and Economic Behavior, 10(1):6--38, 1995.
[31]
A. Muise, E. Christofides, and S. Desmarais. More Information than You Ever Wanted: Does Facebook Bring Out the Green-Eyed Monster of Jealousy? CyberPsychology & Behavior, 12(4):441--444, Aug. 2009.
[32]
H. Ohtsuki, C. Hauert, E. Lieberman, and M. A. Nowak. A simple rule for the evolution of cooperation on graphs and social networks. Nature, 441(7092):502--505, May 2006.
[33]
N. Park, K. Kee, and S. Valenzuela. Being Immersed in Social Networking Environment: Facebook Groups, Uses and Gratifications, and Social Outcomes. CyberPsychology & Behavior, 12(6):729--733, Dec. 2009.
[34]
J. Pita, M. Jain, F. Ordóñez, M. Tambe, S. Kraus, and R. Magori-Cohen. Effective solutions for real-world stackelberg games: When agents must deal with human uncertainties. In Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 1, pages 369--376. International Foundation for Autonomous Agents and Multiagent Systems, 2009.
[35]
J. Pita, M. Jain, M. Tambe, F. Ordóñez, and S. Kraus. Robust solutions to Stackelberg games: Addressing bounded rationality and limited observations in human cognition. Artificial Intelligence, 174(15):1142--1171, 2010.
[36]
J. Pita, M. Tambe, C. Kiekintveld, S. Cullen, and E. Steigerwald. Guards: game theoretic security allocation on a national scale. In The 10th International Conference on Autonomous Agents and Multiagent Systems-Volume 1, pages 37--44. International Foundation for Autonomous Agents and Multiagent Systems, 2011.
[37]
S. Rajtmajer, C. Griffin, D. Mikesell, and A. Squicciarini. An evolutionary game model for the spread of non-cooperative behavior in online social networks. In Proceedings of the 30th Annual ACM Symposium on Applied Computing, SAC '15, pages 1154--1159, New York, NY, USA, 2015. ACM.
[38]
S. M. Rajtmajer, C. Griffin, D. Mikesell, and A. Squicciarini. A cooperate-defect model for the spread of deviant behavior in social networks. CoRR, abs/1408.2770, 2014.
[39]
D. G. Rand, S. Arbesman, and N. A. Christakis. Dynamic social networks promote cooperation in experiments with humans. Proceedings of the National Academy of Sciences, 108(48):19193--19198, 2011.
[40]
A. Shamir. How to share a secret. Commun. ACM, 22(11):612--613, Nov. 1979.
[41]
Y. Sharma and D. P. Williamson. Stackelberg thresholds in network routing games or the value of altruism. Games and Economic Behavior, 67(1):174--190, 2009.
[42]
H. Simon. A behavioural model of rational choice. In H. Simon, editor, Models of man: social and rational; mathematical essays on rational human behavior in a social setting, pages 241--260. J. Wiley, New York, 1957.
[43]
D. J. Solove. Nothing to hide: The false tradeoff between privacy and security. Yale University Press, 2011.
[44]
A. Squicciarini and C. Griffin. An informed model of personal information release in social networking sites. In 2012 ASE/IEEE Conference on Privacy, Security, Risk and Trust, Amsterdam, Netherlands, September 2012.
[45]
F. Stutzman and W. Hartzog. Boundary regulation in social media. In Proceedings of the ACM 2012 conference on Computer Supported Cooperative Work, pages 769--778. ACM, 2012.
[46]
J. Suler. The Online Disinhibition Effect. Cyberpsychology & Behavior, 7(3):321--326, June 2004.
[47]
M. Tambe. Security and game theory: algorithms, deployed systems, lessons learned. Cambridge University Press, 2011.
[48]
Z.-X. Wu, Z. Rong, and H.-X. Yang. Impact of heterogeneous activity and community structure on the evolutionary success of cooperators in social networks. Phys. Rev. E, 91:012802, Jan 2015.
[49]
R. Yang, F. Fang, A. X. Jiang, K. Rajagopal, M. Tambe, and R. Maheswaran. Designing better strategies against human adversaries in network security games. In Proceedings of the 11th International Conference on Autonomous Agents and Multiagent Systems-Volume 3, pages 1299--1300. International Foundation for Autonomous Agents and Multiagent Systems, 2012.
[50]
R. Yang, C. Kiekintveld, F. Ordóñez, M. Tambe, and R. John. Improving resource allocation strategies against human adversaries in security games: An extended study. Artificial Intelligence, 195:440--469, 2013.
[51]
Z. Yin, D. Korzhyk, C. Kiekintveld, V. Conitzer, and M. Tambe. Stackelberg vs. Nash in security games: Interchangeability, equivalence, and uniqueness. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1-Volume 1, pages 1139--1146. International Foundation for Autonomous Agents and Multiagent Systems, 2010.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
AAMAS '16: Proceedings of the 2016 International Conference on Autonomous Agents & Multiagent Systems
May 2016
1580 pages
ISBN:9781450342391

Sponsors

  • IFAAMAS

In-Cooperation

Publisher

International Foundation for Autonomous Agents and Multiagent Systems

Richland, SC

Publication History

Published: 09 May 2016

Check for updates

Author Tags

  1. bounded rationality
  2. collective sharing
  3. game theory
  4. multi-party access control

Qualifiers

  • Research-article

Funding Sources

  • National Science Foundation
  • Army Research Office

Conference

AAMAS '16
Sponsor:

Acceptance Rates

AAMAS '16 Paper Acceptance Rate 137 of 550 submissions, 25%;
Overall Acceptance Rate 1,155 of 5,036 submissions, 23%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)36
  • Downloads (Last 6 weeks)2
Reflects downloads up to 24 Dec 2024

Other Metrics

Citations

Cited By

View all

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Login options

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media