Skip to main content

A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media

  • Conference paper
  • First Online:

Part of the book series: Lecture Notes in Networks and Systems ((LNNS,volume 449))

Abstract

Privacy on online social networks is a concern, specifically in relation to sharing co-owned images. Co-owned images raise a privacy conundrum, in that enforcing privacy policies impacts negatively on performance and usability. In most existing work, this issue is addressed by requiring users from the same or overlapping friendship networks to contribute privacy opinions vis-a-vis posting the co-owned image. This poses two issues: (1) privacy posting decisions cannot be made, resulting in delay; and (2) ineffective user opinion computation necessitates large amounts of image distortion, resulting in low levels of user satisfaction. In this paper, we present a multi-agent system in which an opinion formulation algorithm computes offline user opinions based on user personality and behaviour information. Our results indicate that posting decisions, for images in which all co-owners are offline, take 3.81 s on average.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   219.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   279.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

References

  1. Ali, S., Rauf, A., Islam, N., Farman, H.: A framework for secure and privacy protected collaborative contents sharing using public OSN. Cluster Comput. 22(3), 7275–7286 (2017). https://doi.org/10.1007/s10586-017-1236-2

    Article  Google Scholar 

  2. Severo, M., Feredj, A., Romele, A.: Soft data and public policy: can social media offer alternatives to official statistics in urban policymaking? J. Policy Internet 8(3), 354–372 (2016)

    Article  Google Scholar 

  3. Xu, L., Jiang, C., He, N., Han, Z., Benslimane, A.: Trust-based collaborative privacy management in online social networks. J. IEEE Trans. Inf. Forensics Secur. 14(1), 48–60 (2018)

    Article  Google Scholar 

  4. Giovannetti, E., Hamoudia, M.: Understanding the different pre and post peak adoption drivers in the process of mobile social networking diffusion, pp. 1–4. International Telecommunications Society (ITS), Seoul (2018)

    Google Scholar 

  5. Squicciarini, A.C., Shehab, M., Paci, F.: Collective privacy management in social networks. In: Proceedings of the 18th International Conference on World Wide Web, pp. 521–530 (2009)

    Google Scholar 

  6. Wishart, R., Corapi, D., Marinovic, S., Sloman, M.: Collaborative privacy policy authoring in a social networking context. In: IEEE International Symposium on Policies for Distributed Systems and Networks, pp. 1–8 (2010)

    Google Scholar 

  7. Hu, H., Ahn, G.: Multiparty authorization framework for data sharing in online social networks. In: IFIP Annual Conference on Data and Applications Security and Privacy, pp. 29–43 (2011)

    Google Scholar 

  8. Suvitha, D.: Mechanisms of multiparty access control in online social network. J. Recent Dev. Eng. Technol. 2(3), 8–13 (2014)

    Google Scholar 

  9. Joseph, N.S.: Collaborative data sharing in online social network resolving privacy risk and sharing loss. IOSR J. Comput. Eng. 16(5), 55–61 (2014)

    Article  Google Scholar 

  10. Ulusoy, O.: Collaborative privacy management in online social networks. In: Proceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems, pp. 1788–1790 (2018)

    Google Scholar 

  11. Du, J., Jiang, C., Chen, K.C., Ren, Y., Poor, H.V.: Community-structured evolutionary game for privacy protection in social networks. J. IEEE Trans. Inf. Forensics Secur. 13(3), 574–589 (2018)

    Article  Google Scholar 

  12. Akkuzu, G., Aziz, B., Adda, M.: Towards consensus-based group decision making for co-owned data sharing in online social networks. J. IEEE Access 8, 91311–91325 (2020)

    Article  Google Scholar 

  13. Kumar, A., Bezawada, R., Rishika, R., Janakiraman, R., Kannan, P.K.: From social to sale: the effects of firm-generated content in social media on customer behavior. J. Market. 80(1), 7–25 (2016)

    Article  Google Scholar 

  14. Thomas, K., Grier, C., Nicol, D.M.: unFriendly: multi-party privacy risks in social networks. In: Atallah, M.J., Hopper, N.J. (eds.) PETS 2010. LNCS, vol. 6205, pp. 236–252. Springer, Heidelberg (2010). https://doi.org/10.1007/978-3-642-14527-8_14

    Chapter  Google Scholar 

  15. Baden, R., Bender, A., Spring, N., Bhattacharjee, B., Starin, D.: Persona: an online social network with user-defined privacy. In: Proceedings of the ACM SIGCOMM 2009 Conference on Data Communication, pp. 135–146 (2009)

    Google Scholar 

  16. Dürr, M., Maier, M., Dorfmeister, F.: Vegas–a secure and privacy-preserving peer-to-peer online social network. In: International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing, pp. 868–874 (2012)

    Google Scholar 

  17. Jahid, S., Nilizadeh, S., Mittal, P., Borisov, N., Kapadia, A.: Vegas–a secure and privacy-preserving peer-to-peer online social network. In: IEEE International Conference on Pervasive Computing and Communications Workshops, pp. 326–332 (2012)

    Google Scholar 

  18. Schwittmann, L., Boelmann, C., Wander, M., Weis, T.: SoNet–privacy and replication in federated online social networks. In: IEEE 33rd International Conference on Distributed Computing Systems Workshops, pp. 51–57 (2013)

    Google Scholar 

  19. Lv, X., Mu, Y., Li, H.: Non-interactive key establishment for bundle security protocol of space DTNs. J. IEEE Trans. Inf. Forensics Secur. 9(1), 5–13 (2013)

    Article  Google Scholar 

  20. Ali, S., et al.: SGKMP: a scalable group key management protocol. J. Sustain. Cities Soc. 39, 37–42 (2018)

    Article  Google Scholar 

  21. Srilakshmi, P., Aaratee, S., Subbalakshmi, S.: Privacy my decision: control of photo sharing on online social networks. Int. J. Comput. Sci. Inf. Technol. (IJCSIT) 7(2), 780–782 (2016)

    Google Scholar 

  22. Liu, F., Pan, L., Yao, L.H.: Evolutionary Game Based Analysis for User Privacy Protection Behaviors in Social Networks. In: IEEE Third International Conference on Data Science in Cyberspace (DSC), pp. 274–279 (2018)

    Google Scholar 

  23. Tosh, D., Sengupta, S., Kamhoua, C., Kwiat, K., Martin, A.: An evolutionary game-theoretic framework for cyber-threat information sharing. In: IEEE International Conference on Communications (ICC), pp. 7341–7346 (2015)

    Google Scholar 

  24. Chen, J., Kiremire, A.R., Brust, M.R., Phoha, V.V.: Modeling online social network users’ profile attribute disclosure behavior from a game theoretic perspective. J. Comput. Commun. 49, 18–32 (2014)

    Article  Google Scholar 

  25. Squicciarini, A.C., Griffin, C.: An informed model of personal information release in social networking sites. In: International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (ICC), pp. 636–645 (2012)

    Google Scholar 

  26. Capuano, N., Chiclana, F., Fujita, H., Herrera-Viedma, E., Loia, V.: Fuzzy group decision making with incomplete information guided by social influence. J. IEEE Trans. Fuzzy Syst. 26(3), 1704–1718 (2017)

    Article  Google Scholar 

  27. Martinez-Cruz, C., Porcel, C., Bernabé-Moreno, J., Herrera-Viedma, E.: A model to represent users trust in recommender systems using ontologies and fuzzy linguistic modeling. J. Inf. Sci. 311, 102–118 (2015)

    Article  Google Scholar 

  28. Akkuzu, G., Aziz, B., Adda, M.O.: Fuzzy logic decision based collaborative privacy management framework for online social networks. In: 3rd International Workshop on FORmal Methods for Security Engineering, pp. 674–684 (2019)

    Google Scholar 

  29. Mosca, F., Such, J.: ELVIRA: an explainable agent for value and utility-driven multiuser privacy. In: International Conference on Autonomous Agents and Multiagent Systems (AAMAS), pp. 916–924 (2021)

    Google Scholar 

  30. Tunguz, B.: Big Five Personality Test Dataset (2018). https://www.kaggle.com/tunguz/big-five-personality-test/version/1. Accessed 16 Sept 2021

  31. Gangopadhyay, I., Chatterjee, A., Das, I.: Face detection and expression recognition using Haar cascade classifier and Fisherface algorithm. J. Recent Trends Sig. Image Process. 922, 1–11 (2019)

    Article  Google Scholar 

  32. Getreuer, P.: A survey of Gaussian convolution algorithms. J. Image Process. On Line 3, 286–310 (2013)

    Article  Google Scholar 

  33. Masad, D., Kazil, J.: Effective substances. In: 14th PYTHON in Science Conference, pp. 153–160 (2015)

    Google Scholar 

  34. Gallagher, A., Chen, T.: Understanding groups of images of people. In: IEEE Conference on Computer Vision and Pattern Recognition, pp. 256–263 (2009)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Farzad N. Motlagh .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG

About this paper

Check for updates. Verify currency and authenticity via CrossMark

Cite this paper

Motlagh, F.N., Kayem, A.V.D.M., Meinel, C. (2022). A Multi-agent Model to Support Privacy Preserving Co-owned Image Sharing on Social Media. In: Barolli, L., Hussain, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 449. Springer, Cham. https://doi.org/10.1007/978-3-030-99584-3_13

Download citation

Publish with us

Policies and ethics