skip to main content
10.1145/2181176.2181182acmconferencesArticle/Chapter ViewAbstractPublication PageseurosysConference Proceedingsconference-collections
research-article

Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks

Published: 10 April 2012 Publication History

Abstract

The problem of usage control, which refers to the control of the data after its publication, is becoming a very challenging problem due to the exponential growth of the number of users involved in content sharing. While the best solution and unfortunately the most expensive one to cope with this particular issue would be to provide a trusted hardware environment for each user, in this paper we address this problem in a confined environment, namely online social networks (OSN), and for the particular picture sharing application. In current OSNs, the owner of an uploaded picture is the only one who can control the access to this particular content and, unfortunately, other users whose faces appear in the same picture cannot set any rule. We propose a preliminary usage control mechanism targeting decentralized peer-to-peer online social networks where control is enforced thanks to the collaboration of a sufficient number of legitimate peers. In this solution, all faces in pictures are automatically obfuscated during their upload to the system and the enforcement of the obfuscation operation is guaranteed thanks to the underlying privacy preserving multi-hop routing protocol. The disclosure of each face depends on the rules the owner of the face sets when she is informed and malicious users can never publish this content in clear even if they have access to it.

References

[1]
L. A. Cutillo, R. Molva, and T. Strufe. Safebook: a privacy preserving online social network leveraging on real-life trust. IEEE Comm. Mag., Consumer Comm. and Networking, 2009.
[2]
L. A. Cutillo, R. Molva, and M. Önen. Performance and Privacy Trade-off in Peer-to-Peer On-line Social Networks. 2010. Technical Report RR10244.
[3]
L. A. Cutillo, R. Molva, and M. Önen. Analysis of privacy in online social networks from the graph theory perspective. In IEEE Globecom 2011, Selected Areas in Communications Symposium, Social Networks Track, 2011.
[4]
A. Datta, S. Buchegger, L.-H. Vu, T. Strufe, and K. Rzadca. Decentralized online social networks. In B. Furht, editor, Handbook of Social Network Technologies and Applications. Springer US, 2010.
[5]
C. Geng and X. Jiang. Face recognition using sift features. In Proceedings of the 16th IEEE international conference on Image processing, pages 3277--3280. IEEE Press, 2009.
[6]
D. G. Lowe. Distinctive image features from scale-invariant keypoints, 2003.
[7]
A. Majumdar and R. K. Ward. Discriminative SIFT Features for Face Recognition. In Proc. of Canadian Conference on Electrical and Computer Engineering, 2009, 2009.
[8]
M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. Cambridge University Press, January 2005.
[9]
J. Park and R. Sandhu. Towards usage control models: beyond traditional access control. In SACMAT '02. ACM, 2002.
[10]
P. J. Phillips, W. T. Scruggs, A. J. O'Toole, P. J. Flynn, K. W. Bowyer, C. L. Schott, and M. Sharpe. FRVT 2006 and ICE 2006 Large-Scale Results. Technical Report NISTIR 7408.
[11]
C. Velardo and J.-L. Dugelay. Face recognition with DAISY descriptors. In MM'10 and Sec'10, ACM SIGMM Multimedia and Security Workshop, Rome, Italy, 09 2010.
[12]
P. Viola and M. J. Jones. Robust real-time face detection. Int. J. Comput. Vision, May 2004.
[13]
W. Zhao, R. Chellappa, P. J. Phillips, and A. Rosenfeld. Face recognition: A literature survey, 2000.

Cited By

View all
  • (2022)Towards Automated Content-based Photo Privacy Control in User-Centered Social NetworksProceedings of the Twelfth ACM Conference on Data and Application Security and Privacy10.1145/3508398.3511517(65-76)Online publication date: 14-Apr-2022
  • (2019)An Improved Privacy-Preserving Truth Discovery Using Radial Basis Function2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)10.1109/ICCIKE47802.2019.9004403(170-174)Online publication date: Dec-2019
  • (2019)Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social MediaIEEE Access10.1109/ACCESS.2019.29210297(75556-75567)Online publication date: 2019
  • Show More Cited By

Index Terms

  1. Privacy preserving picture sharing: enforcing usage control in distributed on-line social networks

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      SNS '12: Proceedings of the Fifth Workshop on Social Network Systems
      April 2012
      75 pages
      ISBN:9781450311649
      DOI:10.1145/2181176
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 10 April 2012

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. distributed on-line social networks
      2. picture sharing
      3. usage control

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      EuroSys '12
      Sponsor:
      EuroSys '12: Seventh EuroSys Conference 2012
      April 10, 2012
      Bern, Switzerland

      Upcoming Conference

      EuroSys '25
      Twentieth European Conference on Computer Systems
      March 30 - April 3, 2025
      Rotterdam , Netherlands

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)5
      • Downloads (Last 6 weeks)0
      Reflects downloads up to 17 Feb 2025

      Other Metrics

      Citations

      Cited By

      View all
      • (2022)Towards Automated Content-based Photo Privacy Control in User-Centered Social NetworksProceedings of the Twelfth ACM Conference on Data and Application Security and Privacy10.1145/3508398.3511517(65-76)Online publication date: 14-Apr-2022
      • (2019)An Improved Privacy-Preserving Truth Discovery Using Radial Basis Function2019 International Conference on Computational Intelligence and Knowledge Economy (ICCIKE)10.1109/ICCIKE47802.2019.9004403(170-174)Online publication date: Dec-2019
      • (2019)Faces are Protected as Privacy: An Automatic Tagging Framework Against Unpermitted Photo Sharing in Social MediaIEEE Access10.1109/ACCESS.2019.29210297(75556-75567)Online publication date: 2019
      • (2018)Robust Privacy-Preserving Image Sharing over Online Social Networks (OSNs)ACM Transactions on Multimedia Computing, Communications, and Applications10.1145/316526514:1(1-22)Online publication date: 4-Jan-2018
      • (2018)Unified Data Hiding and Scrambling Method for JPEG ImagesAdvances in Multimedia Information Processing – PCM 201810.1007/978-3-030-00764-5_34(373-383)Online publication date: 18-Sep-2018
      • (2017)Image privacy protection with secure JPEG transmorphingIET Signal Processing10.1049/iet-spr.2016.0756Online publication date: 15-Aug-2017
      • (2017)My Face is Mine: Fighting Unpermitted Tagging on Personal/Group Photos in Social MediaWeb Information Systems Engineering – WISE 201710.1007/978-3-319-68786-5_42(528-539)Online publication date: 4-Oct-2017
      • (2017)Context-Dependent Privacy-Aware Photo Sharing Based on Machine LearningICT Systems Security and Privacy Protection10.1007/978-3-319-58469-0_7(93-107)Online publication date: 4-May-2017
      • (2016)Processing-Aware Privacy-Preserving Photo Sharing over Online Social NetworksProceedings of the 24th ACM international conference on Multimedia10.1145/2964284.2967288(581-585)Online publication date: 1-Oct-2016
      • (2015)Face/OffProceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security10.1145/2810103.2813603(781-792)Online publication date: 12-Oct-2015
      • Show More Cited By

      View Options

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Figures

      Tables

      Media

      Share

      Share

      Share this Publication link

      Share on social media