Privacy-preserving photo sharing framework cross different social network

被引:0
作者
Li F. [1 ,2 ,3 ]
Sun Z. [1 ,2 ]
Niu B. [1 ]
Cao J. [3 ]
Li H. [3 ]
机构
[1] Institute of Information Engineering, Chinese Academy of Sciences, Beijing
[2] School of Cyber Security, University of Chinese Academy of Sciences, Beijing
[3] School of Cyber Engineering, Xidian University, Xi'an
来源
Tongxin Xuebao/Journal on Communications | 2019年 / 40卷 / 07期
基金
国家重点研发计划; 中国国家自然科学基金;
关键词
Extended control; Photo privacy; Privacy invasion tracing; Social network;
D O I
10.11959/j.issn.1000-436x.2019107
中图分类号
学科分类号
摘要
With rapid developments of digital photography and social networks, users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns. To address this problem, a privacy-preserving photo sharing framework was proposed, which could apply to extended control and privacy invasion tracing. In extended control scheme, the following users on a dissemination chain was restrained by each user's privacy policy. Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos, so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks. On this basis, the behaviors of users were record by tracing scheme of privacy invasion, the integrality of records was protected by using nested signature algorithm. The correctness, security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations. © 2019, Editorial Board of Journal on Communications. All right reserved.
引用
收藏
页码:1 / 13
页数:12
相关论文
共 32 条
  • [1] Hu H., Ahn G.J., Jorgensen J., Multiparty access control for online social networks: model and mechanisms, IEEE Transactions on Knowledge and Data Engineering, 25, 7, pp. 1614-1627, (2013)
  • [2] Ilia P., Polakis I., Athanasopoulos E., Et al., Face/off: preventing privacy leakage from photos in social networks, The 22nd ACM SIGSAC Conference on Computer and Communications Security, pp. 781-792, (2015)
  • [3] Vishwamitra N., Li Y., Wang K., Et al., Towards PII-based multiparty access control for photo sharing in online social networks, The 22nd ACM on Symposium on Access Control Models and Technologies, pp. 155-166, (2017)
  • [4] Xu K., Guo Y., Guo L., Et al., My privacy my decision: control of photo sharing on online social networks, IEEE Transactions on Dependable and Secure Computing, 14, 2, pp. 199-210, (2017)
  • [5] Li F., Li Z., Han W., Et al., Cyberspace-oriented access control: a cyberspace characteristics based model and its policies, IEEE Internet of Things Journal, 6, 2, pp. 1471-1483, (2018)
  • [6] Li F., Sun Z., Niu B., Et al., HideMe: privacy-preserving photo sharing on social networks, The 38th IEEE International Conference on Computer Communications, pp. 154-162, (2019)
  • [7] Ra M.R., Govindan R., Ortega A., P3: toward privacy-preserving photo sharing, The 10th USENIX Symposium on Networked Systems Design and Implementation, pp. 515-528, (2013)
  • [8] Zhang L., Jung T., Liu C., Et al., Pop: privacy-preserving outsourced photo sharing and searching for mobile devices, The 35th IEEE International Conference on Distributed Computing Systems, pp. 308-317, (2015)
  • [9] He J., Liu B., Kong D., Et al., Puppies: transformation-supported personalized privacy preserving partial image sharing, The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks, pp. 359-370, (2016)
  • [10] Sun W., Zhou J., Zhu S., Et al., Robust privacy-preserving image sharing over online social networks (OSNs), ACM Transactions on Multimedia Computing, Communications, and Applications, 14, 1, (2018)