Cryptology ePrint Archive: Report 2018/285

Collateral Damage of Facebook Applications: a Comprehensive Study

Iraklis Symeonidis and Gergely Biczók and Fatemeh Shirazi and Cristina Pérez-Solŕ and Jessica Schroers and Bart Preneel

Abstract: Third-party applications on Facebook can collect personal data of the users who install them, but also of their friends. This raises serious privacy issues as these friends are not notified by the applications nor by Facebook, and they have not given consent. This paper presents a detailed multi-faceted study of the collateral information collection of the applications on Facebook. To investigate the views of the users, we designed a questionnaire and collected the responses of 114 participants. The results show that participants are concerned about the collateral information collection and in particular about the lack of notification and of mechanisms to control the data collection. Based on real data, we compute the likelihood of collateral information collection affecting users: we show that the probability is significant and greater than 80% for popular applications such as TripAdvisor. We also demonstrate that a substantial amount of profile data can be collected by applications, which enables application providers to profile users. To investigate whether collateral information collection is an issue to users’ privacy we analysed the legal framework in light of the new General Data Protection Regulation. We provide a detailed analysis of the entities involved and investigate which entity is accountable for the collateral information collection. To provide countermeasures, we propose a privacy dashboard extension that implements privacy scoring computations to enhance transparency towards collateral information collection. Furthermore, we discuss alternative solutions highlighting other countermeasures such as notification and access control mechanisms, cryptographic solutions and application auditing. To the best of our knowledge, this is the first work that provides a detailed multi-faceted study of this problem and that analyses the threat of user profiling by application providers.

Category / Keywords:

Date: received 23 Mar 2018, last revised 23 Mar 2018

Contact author: iraklis symeonidis at esat kuleuven be

Available format(s): PDF | BibTeX Citation

Version: 20180323:102235 (All versions of this report)

Short URL: ia.cr/2018/285


[ Cryptology ePrint archive ]