FaceCloak: An Architecture for User Privacy on Social Networking Sites

[PDF]

FaceCloak: An Architecture for User Privacy on Social

• We present FaceCloak, an architecture that enforces user privacy on social networking sites by shielding a user’s personal information from the site and from other users that were not explicitly authorized by the user. At the same time, the services and the user interface provided by the site continue to function as before.

Published in: computational science and engineering · 2009Authors: Wanying Luo · Qi Xie · Urs HengartnerAffiliation: University of WaterlooAbout: Information privacy · Server · Cryptography · Data mining

FaceCloak: An Architecture for User Privacy on Social

As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. We propose FaceCloak, an architecture that protects user privacy on a social networking site by shielding a user’s personal information from the site and from other users that were not explicitly authorized by the user. At the …

FaceCloak: An Architecture for User Privacy on Social

We propose FaceCloak, an architecture that protects user privacy on a social networking site by shielding a user’s personal information from the site and from other users that were not explicitly

FaceCloak – Cryptography, Security, and Privacy (CrySP)

Users of social networking sites, such as Facebook or MySpace, need to trust a site to properly deal with their personal information. Unfortunately, this trust is not always justified. FaceCloak is a Firefox extension that replaces your personal information with fake information before sending it …

Facecloak: An architecture for user privacy on social

To make a privacy protection solution usable to all the Both existing and new users of a social networking site users regardless of their skills, the solution should be can benefit from FaceCloak. Existing users, who have already self-contained, not rely on users to install additional sent their profile information to the site, can use FaceCloak software, and require minimal configuration.

Facecloak: An architecture for user privacy on social

As users are enjoying this new style of networking, privacy concerns are also attracting increasing public attention due to reports about privacy breaches on social networking sites. We propose FaceCloak, an architecture that protects user privacy on asocialnetworkingsitebyshieldingauser’spersonalinformation from the site and from other users that were not explicitly authorized by the user.

Published in: computational science and engineering · 2009Authors: Wanying Luo · Qi Xie · Urs HengartnerAffiliation: University of WaterlooAbout: Information privacy · Server · Cryptography · Data mining

FaceCloak: An Architecture for User Privacy on Social

We propose FaceCloak, an architecture that protects user privacy on a social networking site by shielding a user’s personal information from the site and from other users that were not explicitly authorized by the user. At the same time, FaceCloak seamlessly maintains usability of the site’s services. FaceCloak achieves these goals by providing fake information to the social networking site and by storing …

Published in: computational science and engineering · 2009Authors: Wanying Luo · Qi Xie · Urs HengartnerAffiliation: University of WaterlooAbout: Information privacy · Server · Cryptography · Data mining

(PDF) Cloud-based online social network – ResearchGate

We propose FaceCloak, an architecture that protects user privacy on a social networking site by shielding a user’s personal information from the site and from other users that were not explicitly

[PDF]

Security and privacy issues: Does association has role to

Hengartner, 2009) proposed FaceCloak, an architecture that protects user privacy on a social networking site by shielding a user’s personal information from the site and from other users that were not explicitly authorized by the user. At the same time, FaceCloak seamlessly …

[PDF]

EncryptPost: A Framework for User Privacy on Social

It enforces user privacy on social networking sites by shielding a user’s personal post from other users that were not explicitly authorized by the user. At the same time, the services and the user interface provided by the site continue to function as before. More specifically, users are given the option to express what information

Preserving the User’s Privacy in Social Networking Sites

cell phone, tablet, notebook, etc. The user wishes to .. elimination which takes time O(s3), although, as mentioned above, specific methods like [7] exist for.