Abstract
Nowadays, social network are tremendously spreading their tentacles over the web community providing appropriate and well adapted tools for sharing images. A fundamental glitch to consider is their ability to provide suitable techniques to preserve individuals’ privacy. Indeed, there is an urgent need to guarantee privacy by making available to end-users, tools to enforce their privacy constraints. This cannot be done over images as simple as it has been designed so far for textual data. In fact, images, as all other multimedia objects are of complex structure due to the gap between their raw data and their actual semantic descriptions. Without these descriptions, protecting their content is a difficult matter which outlines the premise of our work. In this chapter, we present a novel security model for image content protection. In our model, we provide dynamic security rules based on first order logic to express constraints that can be applied to contextual information as well as low level features of images. We finally discuss a set of experiments and studies carried out to evaluate the proposed approach.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
Works in photo editing, montage, and publishing.
- 2.
- 3.
When an image belongs to an album or a folder.
- 4.
DC is an XML/RDF-based syntax used to describe textual as well as audiovisual documents (see http://dublincore.org/).
- 5.
- 6.
The first match strategy is particularly used in firewalls where security rules are read sequentially. The first rule which matches the packet applies whether it is a positive or a negative rule.
- 7.
An online demonstration of the prototype is provided at http://www.upa.edu.lb/ImageProtector/.
- 8.
The user who logs into FaceBook.
- 9.
We invite the reader to consult [5] for more details regarding aggregation functions.
- 10.
References
Abou El Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy’03), June 2003
Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: Content-based authorization model for digital libraries. IEEE Trans. Knowl. Data Eng. 14(2), 296–315 (2002)
Al Bouna, B., Chbeir, R.: Content-based policy specification for multimedia authorization and access control model. In: Cyber Warfare and Cyber Terrorism, pp. 345–357. Idea Group Reference, 2007
Al Bouna, B., Chbeir, R., Gabillon, A.: The image protector - a flexible security rule specification toolkit. In: SECRYPT, pp. 345–350, 2011
Al Bouna, B., Chbeir, R., Miteran, J.: Mca2cm: Multimedia context-aware access control model. In: Intelligence and Security Informatics, pp. 115–123. IEEE, New Brunswick, New Jersey (2007)
Androutsos, D., Plataniotis, K.N., Venetsanopoulos, A.N.: A novel vector-based approach to color image retrieval using a vector angular-based distance measure. Comput. Vis. Image Understand. 75, 46–58 (1999)
Atluri, V., Ae Chun, S.: An authorization model for geospatial data. IEEE Trans. Dependable Sec. Comput. 1(4), 238–254 (2004)
Bertino, E., Fan, J., Ferrari, E., Hacid, M.-S., Elmagarmid, K.A., Zhu, X.: A hierarchical access control model for video database systems. ACM Trans. Inf. Syst. 155–191 (2003)
Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K.: Access control model for video databases. In: 9th International Conference on Information Knowledge Management, CIKM, pp. 336–343, 2000
Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: CSCW, pp. 1–10. ACM, Philadelphia, Pennsylvania (2000)
Chen, T.-Y.: Knowledge sharing in virtual enterprises via an ontology-based access control approach. Comput. Ind. 59(5), 502–519 (2008)
Egenhofer, M.J., Frank, A.U., Jackson, J.P.: A topological data model for spatial databases. In: SSD, pp. 271–286, 1989
Fan, J., Luo, H., Hacid, M.-S., Bertino, E.: A novel approach for privacy-preserving video sharing. In: CIKM, pp. 609–616. ACM, Bremen, Germany (2005)
Gabillon, A., Capolsini, P.: Rule-based policy enforcement point for map services. In: ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. ACM, San Jose, CA (2010)
Gabillon, A., Capolsini, P.: Security mechanisms for geographic data. In: International Conference on Management of Emergent Digital EcoSystems (MEDES), pp. 297–302, Bangkok, Thailand (2010)
Gabillon, A., Capolsini, P.: Enforcing protection mechanisms for geographic data (to appear). In: International Symposium on Web and Wireless Geographical Information Systems (W2GIS). Naples, Italy (2012)
Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean, M.: Swrl: A semantic web rule language combining owl and ruleml, 07 2010
Joshi, J.B.D., Li, K., Fahmi, H., Shafiq, B., Ghafoor, A.: A model for secure multimedia document database system in a distributed environment. IEEE Trans. Multimed. Special Issue Multimedia Databases 215–234 (2002)
Li, N., Mitchell, J.C.: Understanding spki/sdsi using first-order logic. In: CSFW, pp. 89, 2003
Masoumzadeh, A., Joshi, J.B.D.: Osnac: An ontology-based access control model for social networking systems. In: SocialCom/PASSAT, pp. 751–759, 2010
Pan, L., Zhang, C.N.: A web-based multilayer access control model for multimedia applications in mpeg-7. Int. J. Netw. Secur. 4(2), 155–165 (2007)
Pan, L., Zhang, C.N.: A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. ACM Trans. Multimed. Comput. Comm. Appl. 5 17:1–17:29 (2008)
Raad, E., Chbeir, R., Dipanda, A.: User profile matching in social networks. In: NBiS, pp. 297–304, 2010
Sharma, L.K., Vyas, O.P., Tiwary, U.S., Vyas, R.: A novel approach of multilevel positive and negative association rule mining for spatial databases. In: MLDM, pp. 620–629, 2005
Thuraisingham, B.M.: Security and privacy for multimedia database management systems. Multimed. Tool Appl. (33), 13–29 (2007)
Thuraisingham, B.M., Lavee, G., Bertino, E., Fan, J., Khan, L.: Access control, confidentiality and privacy for video surveillance databases. In: SACMAT, pp. 1–10. ACM, California, USA (2006)
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag GmbH Wien
About this chapter
Cite this chapter
Bouna, B.A., Chbeir, R., Gabillon, A., Capolsini, P. (2013). A Flexible Image-Based Access Control Model for Social Networks. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_11
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0894-9_11
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0893-2
Online ISBN: 978-3-7091-0894-9
eBook Packages: Computer ScienceComputer Science (R0)