44 research outputs found

    A Survey Paper on Photo Sharing and Privacy Control Decisions

    Get PDF
    Photo sharing is an alluring component which enhances Online Social Networks. Sadly, it may release clients' security on the off chance that they are permitted to post, remark, and label a photograph openly. Westudy the situation when a client shares a photograph containing people other than her (termed co-photograph for short). We need to minimize he security beaches that happen because posting the photos of people without the awareness of people involved in photo. For this reason, we require a proficient facial acknowledgment (FR) framework that can perceive everybody in the photograph. Notwithstanding, all the more requesting security setting may restrain the photographs' quantity freely accessible to prepare the FR framework. To manage this issue, our instrument endeavors to use clients' private photographs to plan a customized FR framework particularly prepared to separate conceivable photograph co-proprietors without releasing their protection. We additionally add to a disseminated accords based system to diminish the computational many-sided quality and ensure the private preparing set. We demonstrate that our framework is better than other conceivable methodologies as far as acknowledgment proportion and effectiveness. Our instrument is executed as a proof of idea Android application on Facebook's stage.OSNs will not contaminate to true users and polluted by unauthorized users and their posting the photos in unsecure way. Hence OSNs will be secure and safest

    Photo Sharing and Privacy Control Decisions

    Get PDF
    Photo sharing is a tempting module which enhances Online Social Networks. Unfortunately, there are several security crises. All are permitted to post, comment and tag the other users. The misuse of photos can happen. We study the situation when a client shares a photograph containing people other than her (termed co-photograph for short). We need to minimize the security breaches that happen during uploading/posting the photos of people without the knowledge of people involved in photo i.e. Co-owners. As a solution for this we need a facial acknowledgement face recognition framework that can identify each user involved in the photograph. Online social network provides the attractive means of sharing information but do not provide any privacy or security policies to restrict the access to shared information. So proposed an approach to enable the security of shared information associated with multiple users in online social networks. For this concern we proposed an access control model to capture intrinsic nature of the multiparty authorization requirement along with the privacy specification scheme and a policy enforcement mechanism. We validate that our framework is better than other conceivable approaches as far as acknowledgment proportion and effectiveness. Our mechanism is executed as a proof based on prototype of Facebook's stage. Proposed application will not infect to true users and get polluted by unauthorized users and their posting the photos in unsecure way. Hence proposed social application will be secure and safest as it enforces security to shared information

    My Privacy My Decision: Control of Photo Sharing on Online Social Networks

    Get PDF
    In online social network(OSN) user?s resource may contain the privacy of other resources. Most of the social networking sites provides features that allows user to easily upload and post photos on social network. Many privacy violations occur in current online social network which becomes a serious problem. Unfortunately photos that a user is tagged in, have very few privacy control. Nowadays researchers focuses on how to integrate into co-worker?s willingness of privacy when setting access rule for resource. In this paper we study the situation when a client shares a photograph containing people other than himself/herself. We proposed a system where photo can be shared in a secure way. Proposed framework can help clients to effortlessly and appropriately design security settings. The existing system has the individual face recognition system installed with each user, which is very time-consuming. Proposed system has a centralized FR engine in charge of recognizing all users over a large OSN. Effectiveness and Flexibility is good of Proposed Solution

    Privacy Management of Multi User Environment in Online Social Networks (OSNs)

    Get PDF
    Online Social Networks (OSNs) are inherently designed to enable people to share personal and public information and make social connections with others. These OSNs provides digital social interactions and social as well as personal information sharing, but in sharing a number of security and privacy problems raised. While OSNs allow users to restrict access to shared data, they currently do not provide any mechanism to totally enforce privacy issue solver associated with multiple users. To this end, we propose an approach to enable the protection of shared data associated with multiple users in OSNs. We formulate an access control model to capture the essence of multiparty authorization requirements, along with a multiparty policy specification scheme and a policy enforcement mechanism. Besides we also implement a proof-of-concept prototype which is called as MController (multi controller) having contributor, stakeholder and disseminator controllers along with owner controller

    Collaborative Privacy Policy Authoring in a Social Networking Context.

    No full text
    Recent years have seen a significant increase in the popularity of social networking services. These online services enable users to construct groups of contacts, referred to as friends, with which they can share digital content and communicate. This sharing is actively encouraged by the social networking services, with users privacy often seen as a secondary concern. In this paper we first propose a privacy-aware social networking service and then introduce a collaborative approach to authoring privacy policies for the service. In addressing user privacy, our approach takes into account the needs of all parties affected by the disclosure of information and digital content. © 2010 Crown

    A Step towards a Solution to Information Privacy Problem on Online Social Networks

    Get PDF
    Online social networks, such as Facebook and Twitter, have gained popularity in recent years. With that popularity, come security problems, especially problems with information privacy. This paper provides an overview of information privacy issues for online social networks. One way to solve this problem is to use cryptography. However, cryptography on online social networks has not been studied exclusively. Most works have been done on access control. The main issue with cryptography is the number of keys needed to encrypt and decrypt the information. The most obvious number of keys would be to use one key for every user in our group of friends. This is not needed or entirely true as we show here. This paper, therefore, gives an attempt to show that the number of keys needed to achieve secure sharing among friends can in fact be much smaller than the number of friends. The number of keys can actually be reduced by approximately 500% on average, using the method presented here. We also provide proofs of correctness and security to confirm our claim

    Policy resolution of shared data in online social networks

    Get PDF
    Online social networks have practically a go-to source for information divulging, social exchanges and finding new friends. The popularity of such sites is so profound that they are widely used by people belonging to different age groups and various regions. Widespread use of such sites has given rise to privacy and security issues. This paper proposes a set of rules to be incorporated to safeguard the privacy policies of related users while sharing information and other forms of media online. The proposed access control network takes into account the content sensitivity and confidence level of the accessor to resolve the conflicting privacy policies of the co-owners
    corecore