Trust-Based Privacy-Preserving Photo Sharing in Online Social Networks

被引:22
作者
Xu, Lei [1 ]
Bao, Ting [1 ]
Zhu, Liehuang [1 ]
Zhang, Yan [2 ]
机构
[1] Beijing Inst Technol, Sch Comp Sci & Technol, Beijing 100081, Peoples R China
[2] Univ Oslo, Dept Informat, N-0315 Oslo, Norway
关键词
Social trust; anonymization; privacy preserving; photo sharing; online social networks; MEDIA; SECURITY;
D O I
10.1109/TMM.2018.2887019
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
With the development of social media technologies, sharing photos in online social networks has now become a popular way for users to maintain social connections with others. However, the rich information contained in a photo makes it easier for a malicious viewer to infer sensitive information about those who appear in the photo. How to deal with the privacy disclosure problem incurred by photo sharing has attracted much attention in recent years. When sharing a photo that involves multiple users, the publisher of the photo should take into all related users' privacy into account. In this paper, we propose a trust-based privacy preserving mechanism for sharing such coowned photos. The basic idea is to anonymize the original photo so that users who may suffer a high privacy loss from the sharing of the photo cannot be identified from the anonymized photo. The privacy loss to a user depends on how much he or she trusts the receiver of the photo. And the user's trust in the publisher is affected by privacy loss. The anonymiation result of a photo is controlled by a threshold specified by the publisher. We propose a greedy method for the publisher to tune the threshold, in the purpose of balancing between the privacy preserved by anonymization and the information shared with others. Simulation results demonstrate that the trust-based photo sharing mechanism is helpful to reduce the privacy loss, and the proposed threshold tuning method can bring a good payoff to the user.
引用
收藏
页码:591 / 602
页数:12
相关论文
共 32 条
[1]  
[Anonymous], IEEE INTERNET THINGS
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Datta A., 2010, DECENTRALIZED ONLINE
[4]  
Duggan Maeve, 2013, DEMOGRAPHICS SOCIAL, V14
[5]   What (or Who) Is Public? Privacy Settings and Social Media Content Sharing [J].
Fiesler, Casey ;
Dye, Michaelanne ;
Feuston, Jessica L. ;
Hiruncharoenvate, Chaya ;
Hutto, C. J. ;
Morrison, Shannon ;
Roshan, Parisa Khanipour ;
Pavalanathan, Umashanthi ;
Bruckman, Amy S. ;
De Choudhury, Munmun ;
Gilbert, Eric .
CSCW'17: PROCEEDINGS OF THE 2017 ACM CONFERENCE ON COMPUTER SUPPORTED COOPERATIVE WORK AND SOCIAL COMPUTING, 2017, :567-580
[6]  
Gay R., 2017, FPS, P18
[7]  
Hu HX, 2011, 27TH ANNUAL COMPUTER SECURITY APPLICATIONS CONFERENCE (ACSAC 2011), P103
[8]   Face/Off: Preventing Privacy Leakage From Photos in Social Networks [J].
Ilia, Panagiotis ;
Polakis, Iasonas ;
Athanasopoulos, Elias ;
Maggi, Federico ;
Ioannidis, Sotiris .
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY, 2015, :781-792
[9]   Users of the world, unite! The challenges and opportunities of Social Media [J].
Kaplan, Andreas M. ;
Haenlein, Michael .
BUSINESS HORIZONS, 2010, 53 (01) :59-68
[10]   On Privacy and Security in Social Media - A Comprehensive Study [J].
Kumar, Senthil N. ;
Saravanakumar, K. ;
Deepa, K. .
1ST INTERNATIONAL CONFERENCE ON INFORMATION SECURITY & PRIVACY 2015, 2016, 78 :114-119