MetaPriv: Acting in Favor of Privacy on Social Media Platforms

Cantaragiu, R., Michalas, A., Frimpong, E. and Bakas, A. 2023. MetaPriv: Acting in Favor of Privacy on Social Media Platforms. 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’22). Kansas City, United States 17 - 19 Oct 2022 Springer. https://doi.org/10.1007/978-3-031-25538-0_36

TitleMetaPriv: Acting in Favor of Privacy on Social Media Platforms
AuthorsCantaragiu, R., Michalas, A., Frimpong, E. and Bakas, A.
TypeConference paper
Abstract

Social networks such as Facebook (Since October 2021 is also known as META) (FB) and Instagram are known for tracking user online behaviour for commercial gain. To this day, there is practically no other way of achieving privacy in said platforms other than renouncing their use. However, many users are reluctant in doing so because of convenience or social and professional reasons. In this work, we propose a means of balancing convenience and privacy on FB through obfuscation. We have created MetaPriv, a tool based on simulating user interaction with FB. MetaPriv allows users to add noise interactions to their account so as to lead FB’s profiling algorithms astray, and make them draw inaccurate profiles in relation to their interests and habits. To prove our tool’s effectiveness, we ran extensive experiments on a dummy account and two existing user accounts. Our results showed that, by using our tool, users can achieve a higher degree of privacy in just a couple of weeks. We believe that MetaPriv can be further developed to accommodate other social media platforms and help users regain their privacy, while maintaining a reasonable level of convenience. To support open science and reproducible research, our source code is publicly available online.

KeywordsMetaverse
Obfuscation
Online Profiling
Privacy
Social Networks
Recommendation Systems
Year2023
Conference18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’22)
PublisherSpringer
Accepted author manuscript
File Access Level
Open (open metadata and files)
Publication dates
Published04 Feb 2023
JournalLecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering
Journal citation462, pp. 692-709
Book titleSecureComm 2022: Security and Privacy in Communication Networks
ISBN9783031255373
9783031255380
Digital Object Identifier (DOI)https://doi.org/10.1007/978-3-031-25538-0_36

Related outputs

Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives
Bakas, A., Frimpong, E. and Michalas, A. 2023. Symmetrical Disguise: Realizing Homomorphic Encryption Services from Symmetric Primitives. 18th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’22). Kansas City, United States 17 - 19 Oct 2022 Springer. https://doi.org/10.1007/978-3-031-25538-0_19

Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption
Khan, T., Nguyen, K., Michalas, A. and Bakas, A. 2023. Love or Hate? Share or Split? Privacy-Preserving Training Using Split Learning and Homomorphic Encryption. 20th Annual International Conference on Privacy, Security & Trust (PST'23). Copenhagen, Denmark 21 - 23 Aug 2023 Springer.

stoRNA: Stateless Transparent Proofs of Storage-time
Rabaninejad, R., Abdolmaleki, B., Malavolta, G., Michalas, A. and Nabizadeh, A. 2023. stoRNA: Stateless Transparent Proofs of Storage-time. 28th European Symposium on Research in Computer Security (ESORICS’23). The Hague, the Netherlands 25 - 29 Sep 2023 Springer.

Split Without a Leak: Reducing Privacy Leakage in Split Learning
Nguyen, K., Khan, T. and Michalas, A. 2023. Split Without a Leak: Reducing Privacy Leakage in Split Learning. 19th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’23). Hong Kong SAR, Hong Kong 19 - 21 Oct 2023 Springer.

Cryptographic Role-Based Access Control, Reconsidered
Liu, B., Michalas, A. and Warinschi, B. 2022. Cryptographic Role-Based Access Control, Reconsidered. 16th International Conference on Provable and Practical Security (ProvSec’22). Nanjing, China 11 - 12 Nov 2022 Springer. https://doi.org/10.1007/978-3-031-20917-8_19

Footsteps in the fog: Certificateless fog-based access control
Frimpong, E., Michalas, A. and Ullah, A. 2022. Footsteps in the fog: Certificateless fog-based access control. Computers and Security. 121 102866. https://doi.org/10.1016/j.cose.2022.102866

Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support
Bakas, A. and Michalas, A. 2020. Power Range: Forward Private Multi-Client Symmetric Searchable Encryption with Range Queries Support. The 25th IEEE International Conference on Communications (ISCC’20). Rennes, France (switched to virtual due to the pandemic) 07 - 10 Jul 2020 IEEE . https://doi.org/10.1109/ISCC50000.2020.9219739

Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments
Michalas, A. and Kiss, T. 2020. Charlie and the CryptoFactory: Towards Secure and Trusted Manufacturing Environments. IEEE MELECON 2020. Palermo, Italy 16 - 18 Jun 2020 IEEE . https://doi.org/10.1109/MELECON48756.2020.9140712

Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX
Bakas, A. and Michalas, A. 2019. Modern Family: A Revocable Hybrid Encryption Scheme Based on Attribute-Based Encryption, Symmetric Searchable Encryption and SGX. 15th EAI International Conference on Security and Privacy in Communication Networks (SecureComm’19). Orlando, United States 25 Jul - 23 Oct 2019 Springer. https://doi.org/10.1007/978-3-030-37231-6_28

The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing
Michalas, A. 2019. The Lord of the Shares: Combining Attribute-Based Encryption and Searchable Encryption for Flexible Data Sharing. 34th ACM/SIGAPP Symposium on Applied Computing (SAC'19). Limassol, Cyprus 08 - 12 Apr 2019 ACM. https://doi.org/10.1145/3297280.3297297

Towards Secure Cloud Orchestration for Multi-Cloud Deployments
Paladi, N., Michalas, A. and Dang, H. 2018. Towards Secure Cloud Orchestration for Multi-Cloud Deployments. The 5th Workshop on CrossCloud Infrastructures & Platforms. Porto, Portugal 23 - 26 Apr 2018 ACM.

MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility
Michalas, A. and Murray, R. 2017. MemTri: A Memory Forensics Triage Tool using Bayesian Network and Volatility. The 9th ACM CCS International Workshop on Managing Insider Security Threats (MIST’17) in Conjunction with ACM CCS 2017. Dallas, TX, USA 30 Oct - 03 Nov 2017 ACM. https://doi.org/10.1145/3139923.3139926

A Survey on Design and Implementation of Protected Searchable Data in the Cloud
Dowsley, R., Michalas, A., Nagel, M. and Paladi, N. 2017. A Survey on Design and Implementation of Protected Searchable Data in the Cloud. Computer Science Review. 26, pp. 17-30. https://doi.org/10.1016/j.cosrev.2017.08.001

Middle Man: An Efficient Two-Factor Authentication Framework
Costa, J. and Michalas, A. 2017. Middle Man: An Efficient Two-Factor Authentication Framework. 3rd IEEE International Conference On Computing, Communication, Control And Automation. Pune, India 17 - 18 Aug 2017 IEEE . https://doi.org/10.1109/ICCUBEA.2017.8463686

HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds
Michalas, A. and Weingarten, N. 2017. HealthShare: Using Attribute-Based Encryption for Secure Data Sharing Between Multiple Clouds. Proceedings of the 30th IEEE International Symposium on Computer-Based Medical Systems (CBMS’17). Thessaloniki, Greece 22 - 24 Jun 2017 IEEE . https://doi.org/10.1109/CBMS.017.30

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services
Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G. and Paraskakis, I. 2017. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. Journal of Grid Computing. 15 (2), pp. 219-234. https://doi.org/10.1007/s10723-017-9394-2

Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation
Yigzaw, KY., Michalas, A. and Bellika, J.G. 2017. Secure and scalable deduplication of horizontally partitioned health data for privacy-preserving distributed statistical computation. BMC Medical Informatics and Decision Making. 17 1 (2017). https://doi.org/10.1186/s12911-016-0389-x

Providing User Security Guarantees in Public Infrastructure Clouds
Paladi, N., Gehrmann, C. and Michalas, A. 2017. Providing User Security Guarantees in Public Infrastructure Clouds. IEEE Transactions on Cloud Computing. 5 (3), pp. 405-419. https://doi.org/10.1109/TCC.2016.2525991

Mem Tri: Memory Forensics Triage Tool
Michalas, A. and Murray, R 2016. Mem Tri: Memory Forensics Triage Tool. Cyber Security Group, University of Westminster.

LocLess: Do You Really Care Where Your Cloud Files Are?
Michalas, A. and Yigzaw, K.Y. 2016. LocLess: Do You Really Care Where Your Cloud Files Are? Cloud Security and Data Privacy by Design (CloudSPD’16), Workshop co-located with the 9th IEEE/ACM International Conference on Utility and Cloud Computing. Luxembourg 12 - 15 Dec 2016 IEEE . https://doi.org/10.1109/CloudCom.2016.0090

Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud
Michalas, A. 2016. Sharing in the Rain: Secure and Efficient Data Sharing for the Cloud. 11th International Conference for Internet Technology and Secured Transactions (ICITST-2016). Barcelona 05 - 07 Dec 2016 IEEE . https://doi.org/10.1109/ICITST.2016.7856693

Secure and Scalable Statistical Computation of Questionnaire Data in R
Yigzaw, K.Y., Michalas, A. and Bellika, J. 2016. Secure and Scalable Statistical Computation of Questionnaire Data in R. IEEE Access. 4, pp. 4635-4645. https://doi.org/10.1109/ACCESS.2016.2599851

The Data of Things: Strategies, Patterns and Practice of Cloud-based Participatory Sensing
Michalas, A. and Giannetsos, T. 2016. The Data of Things: Strategies, Patterns and Practice of Cloud-based Participatory Sensing. International Conference on Innovations in InfoBusiness and Technology (ICIIT). Colombo, Sri Lanka 04 Mar 2016

PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services
Verginadis, Y., Michalas, A., Gouvas, P., Schiefer, G., Hübsch, G. and Paraskakis, I. 2015. PaaSword: A Holistic Data Privacy and Security by Design Framework for Cloud Services. 5th International Conference on Cloud Computing and Services Science (CLOSER'15). Lisbon, Portugal 20 May 2015 SCITEPRESS. https://doi.org/10.5220/0005489302060213

"One of our hosts in another country": Challenges of data geolocation in cloud storage
Paladi, N. and Michalas, A. 2014. "One of our hosts in another country": Challenges of data geolocation in cloud storage. The 6th IEEE Conference on Wireless Communication, Vehicular Technology, Information Theory and Aerospace & Electronic Systems Technology (Wireless VITAE). Aalborg, Denmark 11 May 2014 IEEE . https://doi.org/10.1109/VITAE.2014.6934507

The lord of the sense: A privacy preserving reputation system for participatory sensing applications
Michalas, A. and Komninos, N. 2014. The lord of the sense: A privacy preserving reputation system for participatory sensing applications. The 19th IEEE International Conference on Communications (ISCC'2014). Madeira, Portugal 23 Jun 2014 IEEE . https://doi.org/10.1109/ISCC.2014.6912480

Domain Based Storage Protection with Secure Access Control for the Cloud
Paladi, N., Michalas, A. and Gehrmann, C. 2014. Domain Based Storage Protection with Secure Access Control for the Cloud. The 2014 International Workshop on Security in Cloud Computing, held in conjunction with the 9th ACM Symposium on Information, Computer and Communications Security (ASIACCS). Kyoto, Japan 04 Jun 2014 ACM. https://doi.org/10.1145/2600075.2600082

Security aspects of e-health systems migration to the cloud
Michalas, A., Paladi, N. and Gehrmann, C. 2014. Security aspects of e-health systems migration to the cloud. 16th IEEE International Conference on E-health Networking, Application & Services (Healthcom). Natal, Brazil 15 Oct 2014 IEEE . https://doi.org/10.1109/HealthCom.2014.7001843

Multi-party trust computation in decentralized environments in the presence of malicious adversaries
Dimitriou, T. and Michalas, A. 2013. Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Networks . 15 (2014), pp. 53-66. https://doi.org/10.1016/j.adhoc.2013.04.013

Multi-Party Trust Computation in Decentralized Environments
Dimitriou, T. and Michalas, A. 2012. Multi-Party Trust Computation in Decentralized Environments. International Conference on New Technologies, Mobility and Security (NTMS). Istanbul 07 - 10 May 2012 IEEE . https://doi.org/10.1109/NTMS.2012.6208686

Secure & Trusted Communication in Emergency Situations
Michalas, A., Bakopoulos, M., Komninos, N. and Prasad Neeli, R. 2012. Secure & Trusted Communication in Emergency Situations. Sarnoff Symposium (SARNOFF). Newark, NJ 21 - 22 May 2012 IEEE . https://doi.org/10.1109/SARNOF.2012.6222751

SecGOD - Google Docs: Now I Feel Safer!
Michalas, A. and Bakopoulos, M. 2012. SecGOD - Google Docs: Now I Feel Safer! The 7th IEEE International Conference for Internet Technology and Secured Transactions (ICITST-2012). London, UK 10 Dec 2012 IEEE .

Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes
Michalas, A., Dimitriou, T., Giannetsos, T., Komninos, N. and Prasad Neeli, R. 2012. Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes. Wireless Personal Communications. 66 (3), pp. 559-575. https://doi.org/10.1007/s11277-012-0734-z

Mitigate DoS and DDoS Attack in Ad Hoc Networks
Michalas, A., Komninos, N. and Prasad Neeli, R. 2011. Mitigate DoS and DDoS Attack in Ad Hoc Networks. International Journal of Digital Crime and Forensics (IJDCF). 3 (1), pp. 14-36. https://doi.org/10.4018/jdcf.2011010102

Permalink - https://westminsterresearch.westminster.ac.uk/item/w6x0w/metapriv-acting-in-favor-of-privacy-on-social-media-platforms


Share this

Usage statistics

50 total views
43 total downloads
These values cover views and downloads from WestminsterResearch and are for the period from September 2nd 2018, when this repository was created.