5,259 research outputs found
Privacy Intelligence: A Survey on Image Sharing on Online Social Networks
Image sharing on online social networks (OSNs) has become an indispensable
part of daily social activities, but it has also led to an increased risk of
privacy invasion. The recent image leaks from popular OSN services and the
abuse of personal photos using advanced algorithms (e.g. DeepFake) have
prompted the public to rethink individual privacy needs when sharing images on
OSNs. However, OSN image sharing itself is relatively complicated, and systems
currently in place to manage privacy in practice are labor-intensive yet fail
to provide personalized, accurate and flexible privacy protection. As a result,
an more intelligent environment for privacy-friendly OSN image sharing is in
demand. To fill the gap, we contribute a systematic survey of 'privacy
intelligence' solutions that target modern privacy issues related to OSN image
sharing. Specifically, we present a high-level analysis framework based on the
entire lifecycle of OSN image sharing to address the various privacy issues and
solutions facing this interdisciplinary field. The framework is divided into
three main stages: local management, online management and social experience.
At each stage, we identify typical sharing-related user behaviors, the privacy
issues generated by those behaviors, and review representative intelligent
solutions. The resulting analysis describes an intelligent privacy-enhancing
chain for closed-loop privacy management. We also discuss the challenges and
future directions existing at each stage, as well as in publicly available
datasets.Comment: 32 pages, 9 figures. Under revie
Analysis and Extraction of Tempo-Spatial Events in an Efficient Archival CDN with Emphasis on Telegram
This paper presents an efficient archival framework for exploring and
tracking cyberspace large-scale data called Tempo-Spatial Content Delivery
Network (TS-CDN). Social media data streams are renewing in time and spatial
dimensions. Various types of websites and social networks (i.e., channels,
groups, pages, etc.) are considered spatial in cyberspace. Accurate analysis
entails encompassing the bulk of data. In TS-CDN by applying the hash function
on big data an efficient content delivery network is created. Using hash
function rebuffs data redundancy and leads to conclude unique data archive in
large-scale. This framework based on entered query allows for apparent
monitoring and exploring data in tempo-spatial dimension based on TF-IDF score.
Also by conformance from i18n standard, the Unicode problem has been dissolved.
For evaluation of TS-CDN framework, a dataset from Telegram news channels from
March 23, 2020 (1399-01-01), to September 21, 2020 (1399-06-31) on topics
including Coronavirus (COVID-19), vaccine, school reopening, flood, earthquake,
justice shares, petroleum, and quarantine exploited. By applying hash on
Telegram dataset in the mentioned time interval, a significant reduction in
media files such as 39.8% for videos (from 79.5 GB to 47.8 GB), and 10% for
images (from 4 GB to 3.6 GB) occurred. TS-CDN infrastructure in a web-based
approach has been presented as a service-oriented system. Experiments conducted
on enormous time series data, including different spatial dimensions (i.e.,
Khabare Fouri, Khabarhaye Fouri, Akhbare Rouze Iran, and Akhbare Rasmi Telegram
news channels), demonstrate the efficiency and applicability of the implemented
TS-CDN framework
Cyber Security Concerns in Social Networking Service
Today’s world is unimaginable without online social networks. Nowadays, millions of people connect with their friends and families by sharing their personal information with the help of different forms of social media. Sometimes, individuals face different types of issues while maintaining the multimedia contents like, audios, videos, photos because it is difficult to maintain the security and privacy of these multimedia contents uploaded on a daily basis. In fact, sometimes personal or sensitive information could get viral if that leaks out even unintentionally. Any leaked out content can be shared and made a topic of popular talk all over the world within few seconds with the help of the social networking sites. In the setting of Internet of Things (IoT) that would connect millions of devices, such contents could be shared from anywhere anytime. Considering such a setting, in this work, we investigate the key security and privacy concerns faced by individuals who use different social networking sites differently for different reasons. We also discuss the current state-of-the-art defense mechanisms that can bring somewhat long-term solutions to tackling these threats
Privacy-Protecting Techniques for Behavioral Data: A Survey
Our behavior (the way we talk, walk, or think) is unique and can be used as a biometric trait. It also correlates with sensitive attributes like emotions. Hence, techniques to protect individuals privacy against unwanted inferences are required. To consolidate knowledge in this area, we systematically reviewed applicable anonymization techniques. We taxonomize and compare existing solutions regarding privacy goals, conceptual operation, advantages, and limitations. Our analysis shows that some behavioral traits (e.g., voice) have received much attention, while others (e.g., eye-gaze, brainwaves) are mostly neglected. We also find that the evaluation methodology of behavioral anonymization techniques can be further improved
- …