An A3P approach towards Image Privacy policy recommendation on content sharing sites

ثبت نشده
چکیده

Popularity of the social media like Facebook, Flickr, LinkedIn and others has increasing everyday due its various features provided. Some of the features are to collaborate with friends, good and friendly user interface to share data and multimedia content at ease. Data uploaded to Social network by the user are at high risk of vulnerability. User uploaded data on the social media does play vital role in user connectivity. Thus maintaining privacy of the user uploaded data on content distribution network is at most important. To control privacy of the uploaded data user should also provide privacy information for the uploaded data. It is observed the difficulty in setting privacy for images shared by user in social network. This requires automation privacy recommendation for the user shared images based on the image metadata. This suggested privacy inference for uploaded image should suits his satisfaction level. The necessary aspect considered are social context and image metadata for analyzing the privacy setting for the user uploaded data. Two-level framework is proposed which utilizes user’s history for recommending best policy setting for uploaded image. Solution provided in paper relies on an categorizing the image based on image metadata which may belong to similar policies and predicting the policy using apriori data mining algorithm to automatically suggest a policy for each image uploaded by the user in social network. The goal of this paper is to provide extensive method for privacy policy suggestions to improve the security of shared data in the social media sites. Keywords— Content sharing sites, Apriori data mining algorithm, Social media, privacy inference.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Shared Image Privacy Preserving Using Adaptive Prediction

Now images are one of the key enablers of user’s connectivity. With increasing volume of the images users share through social sites, maintaining privacy has become a major problem. In light of these incidents, the need of tools to help users control access to their shared content is apparent. An Adaptive Privacy Policy Prediction (A3P) system helps users to compose privacy settings for their i...

متن کامل

Recommendation Privacy Protection in Trust-based Knowledge Sharing Network

Trust can be applied to knowledge sharing on a distributed network of knowledge source agents. Each agent represents a person who trusts some other agents. Based on these trust-relationships, an agent can infer the trustworthiness of an unknown agent by asking trusted agents for recommendations. However, the person represented by an agent may not be willing to share his or her individual opinio...

متن کامل

An Advanced MP- AC Model for Collaborative Management of Social Networks

On today’s date 4 out of 5 people use the social networking sites for their social relationship buildings and be connected with their loved ones and friend circle. They use the social sites for sharing their updates. The social networking sites may provide the user’s own space to share the contents and in company with that the privacy policies also. But there is a trouble of privacy and securit...

متن کامل

Sharing of Images in Content Sharing Sites Based on User Profile Inferences

Usage of social media are increased considerably in today world it enables the user to share images with one another. Sharing the images may leads to performance violation. Web mining is use of data mining technique to discover and extract the information from the web. Web content mining is the extraction and integration of data, information and knowledge from web page. In the web, one can mine...

متن کامل

CSP AiDer: An Automated Recommendation of Content Security Policy for Web Applications

Unintended cross-domain content flows are a major security weakness of current web design. Cross Site Scripting (XSS) and Cross Site Request Forgery (CSRF) are widely recognized symptoms of this problem. In the span of just a few years, dozens of high-profile attacks against websites using Cross Site Scripting and Cross Site Request Forgery for the purposes of compromising private data, bring d...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2010