Intelligent Reactive Access Control for Moving User Data Yang Wang , Armen Aghasaryan , Arvind Shrihari , David Pergament , Guy-Bertrand Kamga , St´ ephane Betg´ e-Brezetz School of Computer Science Carnegie Mellon University Pittsburgh, PA 15213 Email: [wang, arvinds]@cs.cmu.edu Service Infrastructure Research Domain Alcatel-Lucent Bell Labs France 91620 Nozay, France Email: name.surname@alcatel-lucent.com Abstract—With the boom of social media, it has become increasingly easier for ordinary people to not only post their own content but share other people’s content on the Internet. In this paper, we conceptualize a growing problem of moving user data once a user posts some content on the Internet, the data is largely out of her control; the content can be forwarded to or shared with other people, applications or websites, potentially causing various privacy issues. We present a technical solution that aims to provide users flexible fine-grained control over their moving data. Our system builds upon the ideas of data envelope with sticky policy, reactive access control, and privacy scores. Users can specify and enforce sticky policies of their data through our data envelope plug-ins. Our reactive access control mechanism allows users to grant access to their data on the fly, extending the pre-defined sticky policies to better fit with the dynamic nature of people’s sharing practices. Finally, the privacy score helps users make decisions about data requests by providing relevant privacy risk assessment information about the requesters. I. I NTRODUCTION With the rise of user-generated content and social media, it becomes increasingly easier for ordinary people to post their own content and share other people’s content on the Inter- net. There is a trend that websites particularly social media sites such as Facebook and Twitter publish their Application Programming Interfaces (APIs). These open APIs allow third parties to develop applications that enable users to access their content on these sites and to share the content to other sites. We conceptualize this phenomena as moving user data – users’ data can be easily moved from one person to another, from one website to another, or from one communication channel (e.g., web) to another (e.g., email). Once a user generates some content on the Internet, the data is largely out of her control. The practices of moving user data can have considerable privacy implications. For instance, a recent study found over 4.4 million protected tweets (tweets that are only accessible by one’s followers on Twitter) were re-tweeted as public tweets, rendering these originally private tweets public and thus violating the privacy of the authors of the original tweets [1]. This telling example illustrates this growing challenge faced by Internet users how can they control their moving data on the Internet? Our research aims to address this challenge. We present a framework that allows end users to control their moving data. Our framework builds upon the ideas of data envelopes with sticky policies, reactive access control and privacy scores. We use data envelopes as a means to encrypt and decrypt user data, and to allow data owners to specify a sticky policy containing access control rules that moves with the data. This sticky policy can be enforced as the data envelope moves [2]. Traditional access control requires users to make access control policies before data sharing. It has been shown that this ex-ante approach is too rigid to fit with the dynamic nature of people’s actual sharing behavior [3]. This is where reactive access control (RAC) comes to play. Under RAC, the data owner can answer incoming data requests as they come, creating a more flexible access control model [3]. While our approach can in principle apply to any moving data on the Internet across different application environments (such as email, social network sites, and blogs), we focus on email and social network service in this paper because they are most common among Internet activities. Imagine a friend of friend wants to see a picture you posted on Facebook, should you grant this person to see your picture? You barely know this person. It would be useful if one can provide some relevant information about this requester to help you make the access control decisions “on the spot”. We designed a privacy score mechanism to provide that information. The privacy score is a quantitative measure of the extent to which allowing this requester to see this protected content would (or would not) compromise your privacy. The main contributions of our work are: (1) flexible reactive access control policy management, (2) enforcement of access control policies across multiple application domains, and (3) decision support for end user access control decisions. In addition, we implemented a prototype system. The rest of this paper is organized as follows. In section II 2011 IEEE International Conference on Privacy, Security, Risk, and Trust, and IEEE International Conference on Social Computing 978-0-7695-4578-3/11 $26.00 © 2011 IEEE DOI 942