Skip to main content

A Flexible Image-Based Access Control Model for Social Networks

  • Chapter
  • First Online:
Security and Privacy Preserving in Social Networks

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

Nowadays, social network are tremendously spreading their tentacles over the web community providing appropriate and well adapted tools for sharing images. A fundamental glitch to consider is their ability to provide suitable techniques to preserve individuals’ privacy. Indeed, there is an urgent need to guarantee privacy by making available to end-users, tools to enforce their privacy constraints. This cannot be done over images as simple as it has been designed so far for textual data. In fact, images, as all other multimedia objects are of complex structure due to the gap between their raw data and their actual semantic descriptions. Without these descriptions, protecting their content is a difficult matter which outlines the premise of our work. In this chapter, we present a novel security model for image content protection. In our model, we provide dynamic security rules based on first order logic to express constraints that can be applied to contextual information as well as low level features of images. We finally discuss a set of experiments and studies carried out to evaluate the proposed approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Works in photo editing, montage, and publishing.

  2. 2.

    http://www.exif.org.

  3. 3.

    When an image belongs to an album or a folder.

  4. 4.

    DC is an XML/RDF-based syntax used to describe textual as well as audiovisual documents (see http://dublincore.org/).

  5. 5.

    http://www.bnowack.de/w3photo/pages/image_vocabs.

  6. 6.

    The first match strategy is particularly used in firewalls where security rules are read sequentially. The first rule which matches the packet applies whether it is a positive or a negative rule.

  7. 7.

    An online demonstration of the prototype is provided at http://www.upa.edu.lb/ImageProtector/.

  8. 8.

    The user who logs into FaceBook.

  9. 9.

    We invite the reader to consult [5] for more details regarding aggregation functions.

  10. 10.

    http://sigappfr.acm.org/rulessurvey/.

References

  1. Abou El Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy’03), June 2003

    Google Scholar 

  2. Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: Content-based authorization model for digital libraries. IEEE Trans. Knowl. Data Eng. 14(2), 296–315 (2002)

    Article  Google Scholar 

  3. Al Bouna, B., Chbeir, R.: Content-based policy specification for multimedia authorization and access control model. In: Cyber Warfare and Cyber Terrorism, pp. 345–357. Idea Group Reference, 2007

    Google Scholar 

  4. Al Bouna, B., Chbeir, R., Gabillon, A.: The image protector - a flexible security rule specification toolkit. In: SECRYPT, pp. 345–350, 2011

    Google Scholar 

  5. Al Bouna, B., Chbeir, R., Miteran, J.: Mca2cm: Multimedia context-aware access control model. In: Intelligence and Security Informatics, pp. 115–123. IEEE, New Brunswick, New Jersey (2007)

    Google Scholar 

  6. Androutsos, D., Plataniotis, K.N., Venetsanopoulos, A.N.: A novel vector-based approach to color image retrieval using a vector angular-based distance measure. Comput. Vis. Image Understand. 75, 46–58 (1999)

    Article  Google Scholar 

  7. Atluri, V., Ae Chun, S.: An authorization model for geospatial data. IEEE Trans. Dependable Sec. Comput. 1(4), 238–254 (2004)

    Article  Google Scholar 

  8. Bertino, E., Fan, J., Ferrari, E., Hacid, M.-S., Elmagarmid, K.A., Zhu, X.: A hierarchical access control model for video database systems. ACM Trans. Inf. Syst. 155–191 (2003)

    Google Scholar 

  9. Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K.: Access control model for video databases. In: 9th International Conference on Information Knowledge Management, CIKM, pp. 336–343, 2000

    Google Scholar 

  10. Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: CSCW, pp. 1–10. ACM, Philadelphia, Pennsylvania (2000)

    Google Scholar 

  11. Chen, T.-Y.: Knowledge sharing in virtual enterprises via an ontology-based access control approach. Comput. Ind. 59(5), 502–519 (2008)

    Article  Google Scholar 

  12. Egenhofer, M.J., Frank, A.U., Jackson, J.P.: A topological data model for spatial databases. In: SSD, pp. 271–286, 1989

    Google Scholar 

  13. Fan, J., Luo, H., Hacid, M.-S., Bertino, E.: A novel approach for privacy-preserving video sharing. In: CIKM, pp. 609–616. ACM, Bremen, Germany (2005)

    Google Scholar 

  14. Gabillon, A., Capolsini, P.: Rule-based policy enforcement point for map services. In: ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. ACM, San Jose, CA (2010)

    Google Scholar 

  15. Gabillon, A., Capolsini, P.: Security mechanisms for geographic data. In: International Conference on Management of Emergent Digital EcoSystems (MEDES), pp. 297–302, Bangkok, Thailand (2010)

    Google Scholar 

  16. Gabillon, A., Capolsini, P.: Enforcing protection mechanisms for geographic data (to appear). In: International Symposium on Web and Wireless Geographical Information Systems (W2GIS). Naples, Italy (2012)

    Google Scholar 

  17. Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean, M.: Swrl: A semantic web rule language combining owl and ruleml, 07 2010

    Google Scholar 

  18. Joshi, J.B.D., Li, K., Fahmi, H., Shafiq, B., Ghafoor, A.: A model for secure multimedia document database system in a distributed environment. IEEE Trans. Multimed. Special Issue Multimedia Databases 215–234 (2002)

    Google Scholar 

  19. Li, N., Mitchell, J.C.: Understanding spki/sdsi using first-order logic. In: CSFW, pp. 89, 2003

    Google Scholar 

  20. Masoumzadeh, A., Joshi, J.B.D.: Osnac: An ontology-based access control model for social networking systems. In: SocialCom/PASSAT, pp. 751–759, 2010

    Google Scholar 

  21. Pan, L., Zhang, C.N.: A web-based multilayer access control model for multimedia applications in mpeg-7. Int. J. Netw. Secur. 4(2), 155–165 (2007)

    MathSciNet  Google Scholar 

  22. Pan, L., Zhang, C.N.: A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. ACM Trans. Multimed. Comput. Comm. Appl. 5 17:1–17:29 (2008)

    Google Scholar 

  23. Raad, E., Chbeir, R., Dipanda, A.: User profile matching in social networks. In: NBiS, pp. 297–304, 2010

    Google Scholar 

  24. Sharma, L.K., Vyas, O.P., Tiwary, U.S., Vyas, R.: A novel approach of multilevel positive and negative association rule mining for spatial databases. In: MLDM, pp. 620–629, 2005

    Google Scholar 

  25. Thuraisingham, B.M.: Security and privacy for multimedia database management systems. Multimed. Tool Appl. (33), 13–29 (2007)

    Article  Google Scholar 

  26. Thuraisingham, B.M., Lavee, G., Bertino, E., Fan, J., Khan, L.: Access control, confidentiality and privacy for video surveillance databases. In: SACMAT, pp. 1–10. ACM, California, USA (2006)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bechara Al Bouna .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag GmbH Wien

About this chapter

Cite this chapter

Bouna, B.A., Chbeir, R., Gabillon, A., Capolsini, P. (2013). A Flexible Image-Based Access Control Model for Social Networks. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_11

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0894-9_11

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0893-2

  • Online ISBN: 978-3-7091-0894-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics