5 research outputs found

    Application for JPEG privacy implementation with XACML

    Get PDF
    This project is based on the development of an application for the management of privacy and security in JPEG images through policies designed in standard XACML The privacy policies are incorporated into the metadata defined for this type of data in the JPSearch standard for the compaction of the information in a single resource. Dynamic queries (request) are generated with the purpose of obtaining permission to access an image by checking the privacy policies, where it is determined who, how and when can access. The evaluation of the request against the policy is carried out by Balana, and this return an answer (response) with the decision. There are three independent lines of work, firstly, the design and creation of privacy policies based on the XACML standard, secondly, the update of JPSearch metadata in the corresponding fields for privacy and security and, as a last part, the definition of the system for the validation of a request to an image through the Balana implementation that incorporates the architecture defined in XACML.Este proyecto muestra el desarrollo de una aplicación para la gestión de la privacidad y seguridad en imágenes JPEG a partir de políticas diseñadas en el estándar XACML. Las políticas de privacidad son incorporadas en los metadatos definidos para este tipo de datos en el estándar JPSearch para la compactación de la información en un solo recurso. Se generan consultas dinámicas (request) con la intención de conseguir el permiso de acceso a una imagen comprobando las políticas de privacidad, donde se determina quién, cómo y cuándo puede acceder. La evaluación de la request contra la política lo realiza Balana, y este nos devuelve una respuesta (response) con la decisión. Hay tres líneas de trabajo independientes, en primer lugar, el diseño y creación de políticas de privacidad a partir del estándar XACML, en segundo lugar, la actualización de los metadatos de JPSearch en los campos correspondientes para la privacidad y seguridad y como última parte la definición del sistema para la validación de una petición a una imagen a través de la implementación Balana que incorpora la arquitectura definida en XACML.Aquest projecte mostra el desenvolupament d'una aplicació per a la gestió de la privacitat i seguretat en imatges JPEG a partir de polítiques dissenyades en l'estàndard XACML. Les polítiques de privacitat estan incorporades a les metadades definides per aquest tipus de dades a l'estàndard JPSearch per a la compactació de la informació en un sol recurs. S'han generat consultes dinàmiques (request) amb la intenció d'obtenir el permís d'accés a una imatge comprovant les polítiques de privacitat, on es determina qui, com i quan pot accedir. L'avaluació de la request contra la política la realitza Balana, i aquest ens torna una resposta (response) amb la decisió. Hi han tres línies de treball independents, en primer lloc, el disseny i creació de polítiques de privacitat a partir del estàndard XACML, en segon lloc, l'actualització de les metadades de JPSearch en els camps corresponents per a la privacitat i seguretat i com a última part la definició del sistema per a la validació d'una petició a una imatge a través de la implementació Balana que incorpora l'arquitectura definida en l'estàndard XACML

    Investigating Obfuscation as a Tool to Enhance Photo Privacy on Social Networks Sites

    Get PDF
    Photos which contain rich visual information can be a source of privacy issues. Some privacy issues associated with photos include identification of people, inference attacks, location disclosure, and sensitive information leakage. However, photo privacy is often hard to achieve because the content in the photos is both what makes them valuable to viewers, and what causes privacy concerns. Photo sharing often occurs via Social Network Sites (SNSs). Photo privacy is difficult to achieve via SNSs due to two main reasons: first, SNSs seldom notify users of the sensitive content in their photos that might cause privacy leakage; second, the recipient control tools available on SNSs are not effective. The only solution that existing SNSs (e.g., Facebook, Flickr) provide is control over who receives a photo. This solution allows users to withhold the entire photo from certain viewers while sharing it with other viewers. The idea is that if viewers cannot see a photo, then privacy risk is minimized. However, withholding or self-censoring photos is not always the solution people want. In some cases, people want to be able to share photos, or parts of photos, even when they have privacy concerns about the photo. To provide better online photo privacy protection options for users, we leverage a behavioral theory of privacy that identifies and focuses on two key elements that influence privacy -- information content and information recipient. This theory provides a vocabulary for discussing key aspects of privacy and helps us organize our research to focus on the two key parameters through a series of studies. In my thesis, I describe five studies I have conducted. First, I focus on the content parameter to identify what portions of an image are considered sensitive and therefore are candidates to be obscured to increase privacy. I provide a taxonomy of content sensitivity that can help designers of photo-privacy mechanisms understand what categories of content users consider sensitive. Then, focusing on the recipient parameter, I describe how elements of the taxonomy are associated with users\u27 sharing preferences for different categories of recipients (e.g., colleagues vs. family members). Second, focusing on controlling photo content disclosure, I invented privacy-enhancing obfuscations and evaluated their effectiveness against human recognition and studied how they affect the viewing experience. Third, after discovering that avatar and inpainting are two promising obfuscation methods, I studied whether they were robust when de-identifying both familiar and unfamiliar people since viewers are likely to know the people in OSN photos. Additionally, I quantified the prevalence of self-reported photo self-censorship and discovered that privacy-preserving obfuscations might be useful for combating photo self-censorship. Gaining sufficient knowledge from the studies above, I proposed a privacy-enhanced photo-sharing interface that helps users identify the potential sensitive content and provides obfuscation options. To evaluate the interface, I compared the proposed obfuscation approach with the other two approaches – a control condition that mimics the current Facebook photo-sharing interface and an interface that provides a privacy warning about potentially sensitive content. The results show that our proposed system performs better over the other two in terms of reducing perceived privacy risks, increasing willingness to share, and enhancing usability. Overall, our research will benefit privacy researchers, online social network designers, policymakers, computer vision researchers, and anyone who has or wants to share photos online

    Technology and Democracy: Understanding the influence of online technologies on political behaviour and decision-making

    Get PDF
    Drawing from many disciplines, the report adopts a behavioural psychology perspective to argue that “social media changes people’s political behaviour”. Four pressure points are identified and analysed in detail: the attention economy; choice architectures; algorithmic content curation; and mis/disinformation. Policy implications are outlined in detail.JRC.H.1-Knowledge for Policy: Concepts and Method

    On the Awareness, Control and Privacy of Shared Photo Metadata

    No full text

    Gestion des données de recherche dans le contexte canadien (La)

    Get PDF
    Ce chapitre se concentre sur l’histoire et les itérations contemporaines de vol et d’exploitation du savoir des communautés autochtones (dans ce contexte particulier, il s’agit de collecte de connaissances autochtones sans demander la permission des partenaires au sein de la communauté ou sans les consulter). Il y est également question de la souveraineté de ces communautés en ce qui a trait à leurs propres données. L’exploration en profondeur du savoir et la souveraineté des données se croisent, car les données numériques constituent la manière la plus courante de stocker et d’archiver les connaissances qu’utilisent les membres des communautés et les chercheuses et chercheurs
    corecore