Using Adaptive Privacy Policy Prediction (A3P) for improved Privacy of User Data and Images on Content Sharing

P. Harika, Addanki Kavitha

Abstract


A number of researchers have studied the social uses and privacy issues of online photo sharing or content sharing sites , but less have explored the privacy issues of photo sharing in social networks. Users of social-networking services share abundant information with numerous “friends.†This improved technology causes to privacy violation where the users are sharing the enormous volumes of images across more number of peoples. This privacy need to be taken care in order to make better the user satisfaction level. Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. Social networking sites such as Facebook, LinkedIn,etc give opportunities to share large amount of personal information. People upload their photos to these sites to gain public attention for social purposes, and thus many public consumer photographs are available online. The proliferation of personal data leads to privacy violation .Risks such as identify theft, embarrassment, and blackmail are faced by user’s .In order to overcome these risks flexible privacy mechanisms need to be considered. The main aim of this survey is to provide a review on different privacy policy approaches to enhance the security of personal information shared in the online social networking sites.


References


H. Sundaram, L. Xie, M. De Choudhury, Y. Lin, and A. Natsev, “Multimedia semantics: Interactions between content andcommunity,†Proc. IEEE, vol. 100, no. 9, pp. 2737–2758, Sep. 2012.

J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,†in Proc. Symp. Usable Privacy Security,2009.

C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, “Providing access control to online photo albums based on tags and linked data,†in Proc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14.

J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,†in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining.,2009, pp.249–254.

A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,†in Proc. Symp. Usable Privacy Security, 2008.

A. Mazzia, K. LeFevre, and A. E.,, “The PViz comprehension tool for social network privacy settings,†in Proc. Symp. Usable Privacy Security, 2012.

P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,†in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386.


Full Text: PDF [Full Text]

Refbacks

  • There are currently no refbacks.


Copyright © 2013, All rights reserved.| ijseat.com

Creative Commons License
International Journal of Science Engineering and Advance Technology is licensed under a Creative Commons Attribution 3.0 Unported License.Based on a work at IJSEat , Permissions beyond the scope of this license may be available at http://creativecommons.org/licenses/by/3.0/deed.en_GB.

Â