摘要(英) |
Nowadays, numerous websites embed the social plugins, such as Facebook Like button and Google “+1” button. Users interact with the websites by using social plugins. Websites utilize social plugins to improve the exposure. However, whether users trigger the social plugins or not, all web pages which they visited are tracked by social networking service. Hence, social networking service causes the user privacy issues. However, most of the users know nothing about this.
We develop a novel method for solving privacy issues on Facebook social plugins. When user browses a webpage with Facebook social plugins, our method prevents social plugins from sending information about the user privacy. Furthermore, the method enables social plugins not to identify the information of the user. Therefore, our method protects Internet user privacy. The advantage of our method is that it does not affect the user experience by which the user can still see the social plugins on the webpage. In addition, our method can effectively prevent the user from being tracked by Facebook. We implemented our methods on Chrome browser platform, called “PrivCat”. |
參考文獻 |
[1] Georgios Kontaxis, Michalis Polychronakis, Angelos D. Keromytis, and Evangelos P.Markatos, Privacy-Preserving Social Plug-ins, USENIX-SEC, 2012.
[2] Widgets Distribution. http://trends.builtwith.com/widgets
[3] Facebook Social Plugins. http://developers.facebook.com/docs/plugins/
[4] Google +1 Button. https://developers.google.com/+/web/+1button
[5] Social networking service – Wikipedia. http://en.wikipedia.org/wiki/Social_networking_service
[6] Facebook Ireland Audit Review Report, 21 Sept 2012. https://fbcdn-dragon-a.akamaihd.net/hphotos-ak-prn1/t39.2365-6/851576_193932070769264_1415834022_n.pdf
[7] Arnold Roosendaal, Facebook Tracks and Traces Everyone: Like This! http://ssrn.com/abstract=1717563
[8] Franziska Roesner, Tadayoshi Kohno, David Wetherall, Detecting and Defending Against Third-Party Tracking on the Web. In Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation (NSDI). USENIX Association, 2012.
[9] Jonathan R. Mayer and John C. Mitchell, Third-Party Web Tracking: Policy and Technology, In Proceedings of the 2012 IEEE Symposium on Security and Privacy, 2012.
[10] Gaurav Aggarwal, Elie Bursztein, Collin Jackson, Dan Boneh, An Analysis of Private Browsing Modes in Modern Browsers. In Proceedings of the 19th USENIX Security Symposium, 2010.
[11] Do Not Track - Universal Web Tracking Opt Out. http://donottrack.us/
[12] AdBlock Plus. http://chrome.google.com/webstore/detail/adblock-plus/cfhdojbkjhnklbpkdaibdccddilifddb
[13] Do Not Track extension for chrome. https://chrome.google.com/webstore/detail/do-not-track/ckdcpbflcbeillmamogkpmdhnbeggfja
[14] Do Not Track Me. http://dnt.abine.com/
[15] Disconnect. http://disconnect.me/
[16] Ghostery. http://www.ghostery.com/
[17] SaferChrome. http://chrome.google.com/webstore/detail/saferchrome/lgpkjjingioekjianemgdobchenebhek
[18] Facebook Blocker. http://webgraph.com/resources/facebookblocker/
[19] ShareMeNot. http://sharemenot.cs.washington.edu/
[20] Developer′s Guide - Google Chrome. http://developer.chrome.com/extensions/devguide
[21] Alexa - Actionable Analytics for the Web. http://www.alexa.com/
[22] Chrome Developer Tools. https://developer.chrome.com/devtools/index
[23] AddThis. http://www.addthis.com
[24] ShareThis. http://www.sharethis.com/
[25] Browser Security Handbook - Third-party cookie rules. http://code.google.com/p/browsersec/wiki/Part2#Third-party_cookie_rules
[26] Facebook fixes logout issue, explains cookies. http://nikcub.appspot.com/facebook-fixes-logout-issue-explains-cookies
[27] Facebook Like Button Count Inaccuracies. http://faso.com/fineartviews/21028/facebook-like-button-count-inaccuracies
[28] Time Magazine - One Minute on Facebook. http://www.time.com/time/video/player/0,32068,711054024001_2037229,00.html
[29] An Open Letter to Facebook CEO Mark Zuckerberg, June 2010. http://www.eff.org/files/filenode/social_networks/OpenLettertoFacebook.pdf
[30] J. Mayer. (2011, October) Tracking the trackers: Where everybody knows your username. Available: http://cyberlaw.stanford.edu/node/6740
[31] S. Stamm. (2011, November) Why we won’t enable DNT by default. Available: http://blog.mozilla.com/privacy/2011/11/09/dnt-cannot-be-default/
[32] J. Hernandez, A. Jagadeesh, and J. Mayer. (2011, August) Tracking the trackers: The AdChoices icon. Available: http://cyberlaw.stanford.edu/node/6714
[33] J. Mayer. (2011, September) Tracking the trackers: Self-help tools. Available: http://cyberlaw.stanford.edu/node/6730
[34] J. Mayer. Tracking the Trackers: Early Results, 2011. http://cyberlaw.stanford.edu/node/6694.
[35] M. Ayenson, D. J. Wambach, A. Soltani, N. Good, and C. J. Hoffnagle. Flash Cookies and Privacy II: Now with HTML5 and ETag Respawning. Social Science Research Network Working Paper Series, 2011.
[36] P. Eckersley. How unique is your web browser? In International Conference on Privacy Enhancing Technologies, 2010.
|