Abstract
A continually increasing number of pictures and videos is shared in online social networks. Current sharing platforms however only offer limited options to define who has access to the content. Users may either share it with individuals or groups from their social graph, or make it available to the general public. Sharing content with users to which no social ties exist, even if they were physically close to the places where content was created and witnessed the same event, is however not supported by most existing platforms. We thus propose a novel approach to share content with such users based on so-called privacy bubbles. Privacy bubbles metaphorically represent the private sphere of the users and automatically confine the access to the content generated by the bubble creator to people within the bubble. Bubbles extend in both time and space, centered around the collection time and place, and their size can be adapted to the user’s preferences. We confirm the user acceptance of our concept through a user study with 175 participants, and a prototype implementation shows the technical feasibility of our scheme.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
A Snapshot of Facebook in 2010, http://www.facebook.com (accessed in January 2012)
AllJoyn Peer-to-Peer, http://developer.qualcomm.com (accessed in January 2012)
Color Application, http://www.color.com (accessed in September 2011)
YouTube Statistics, http://www.youtube.com/t/press_statistics (accessed in January 2012)
Domingo-Ferrer, J., Mateo-Sanz, J.: Practical Data-oriented Microaggregation for Statistical Disclosure Control. IEEE Transactions on Knowledge and Data Engineering 14(1), 189–201 (2002)
Huang, K.L., Kanhere, S.S., Hu, W.: Preserving Privacy in Participatory Sensing Systems. Computer Communications 33(11), 1266–1280 (2010)
Joshi, J., Bertino, E., Latif, U., Ghafoor, A.: A Generalized Temporal Role-based Access Control Model. IEEE Transactions on Knowledge and Data Engineering, 4–23 (2005)
Kulkarni, D., Tripathi, A.: Context-aware Role-based Access Control in Pervasive Computing Systems. In: Proceedings of the 13th ACM Symposium on Access Control Models and Technologies (SACMAT), pp. 113–122 (2008)
Leung, D.: Introducing Geofences on Flickr! http://blog.flickr.net (accessed in January 2012)
Luo, W., Hengartner, U.: Proving Your Location Without Giving up Your Privacy. In: Proceedings of the 11th Workshop on Mobile Computing Systems and Applications (HotMobile), pp. 7–12 (2010)
Sweeney, L.: K-anonymity: A Model for Protecting Privacy. International Journal of Uncertainty, Fuzziness, and Knowledge-Based Systems 10(5), 557–570 (2002)
Upbin, B.: Color, a Twitter for Photo and Video, Launches with $41 Million, http://www.forbes.com (accessed in January 2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2012 IFIP International Federation for Information Processing
About this paper
Cite this paper
Christin, D., Sánchez López, P., Reinhardt, A., Hollick, M., Kauer, M. (2012). Privacy Bubbles: User-Centered Privacy Control for Mobile Content Sharing Applications. In: Askoxylakis, I., Pöhls, H.C., Posegga, J. (eds) Information Security Theory and Practice. Security, Privacy and Trust in Computing Systems and Ambient Intelligent Ecosystems. WISTP 2012. Lecture Notes in Computer Science, vol 7322. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-30955-7_8
Download citation
DOI: https://doi.org/10.1007/978-3-642-30955-7_8
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-30954-0
Online ISBN: 978-3-642-30955-7
eBook Packages: Computer ScienceComputer Science (R0)