Privacy study on images uploaded in social networks

  • Authors

    • Hemalatha D
    • Almas Begum
    • Alex David S
    2018-02-05
    https://doi.org/10.14419/ijet.v7i1.7.10636
  • Online Social Structure, Social Media Users, Privacy, Images, And Sensitive Information
  • Presently, the growth of Social media is explosive among the users. Increasingly developed social websites like Flickr, Facebook, Google+, LinkedIn etc permits the users to create, share and view the post. Confidentiality is a leading factor required in Social Networks. The social users upload their photos to the social sites that intend to gain public interest for social purposes. The exposure of personal information leads to slipping process like identity stealing, morphing etc, which are against the privacy violations. Relied upon the personal characteristics of users, the privacy settings of each user should be defined. In this paper, a relational study about the privacy settings in Online Social structure is examined. Initiated by the importance of social networks among the social users and their behavior towards Online Social Networks, which is followed by the privacy techniques suggested by other researchers are explored. At last, an overview about the merits and demerits of privacy designs and schemes for the user-uploaded images are presented. The study results a new privacy system that controls the confidential information from being accessed from different devices, including mobile devices and computers.

  • References

    1. [1] White, T.; Chu, W.; Salehi-Abari, A.; “Media Monitoring Using Social Networks,†Social Computing (Social Com), 2010 IEEE conferences on Social networking sites, 2010, pp.661-668.

      [2] Rodrigues, E.M.; Milic-Frayling, N.; Fortuna, B.; “Social Tagging Behavior in Community-Driven Question Answering,†Web Intelligence and Intelligent Agent Technology, 2008, pp.112-119.

      [3] Nielsen Online Report, “ Social networks & blogs now 4th most popular online activityâ€, 2009.

      [4] C. Wilson et al., “User Interactions in Social Networks and Their Implications,†Proc. EuroSys, 2009.

      [5] F. Benevenuto et al., “Characterizing User Behavior in Online Social Networks,†Proc. IMC, 2009.

      [6] F. Schneider et al., “Understanding Online Social Network Usage from a Network Perspective,†Proc. IMC, 2009.

      [7] Campisi, P.; Maiorana, E.; Neri, A., "Privacy protection in social media networks a dream that can come true?,", 16th International Conference on Digital Signal Processing, vol., no., pp.1,5, 2009

      [8] Rosenblum, D., "What Anyone Can Know: The Privacy Risks of Social Networking Sites," Security & Privacy, IEEE,

      [9] Novak, E. & Li, Q, “A Survey of Security and Privacy in Online Social Networksâ€, College of William and Mary Computer Science Technical Report, WM-CS-2012-2

      [10] J. Bonneau, J. Anderson, and L. Church. Privacy suites: shared privacy for social networks. In Symposium on Usable Privacy and Security, 2009.

      [11] A. K. Fabeah Adu-Oppong, Casey Gardiner and P. Tsang, “Social circles: Tackling privacy in social networksâ€, In Symposium On Usable Privacy and Security, 2008.

      [12] A. C. Squicciarini, S. Sundareswaran, D. Lin, and J. Wede, “A3p: Adaptive policy prediction for shared images over popular con-tent sharing sites,†inProc. 22nd ACM Conf. Hypertext Hypermedia, 2011, pp.261–270.

      [13] K. Strater and H. Lipford, “Strategies and struggles with privacy in an online social networking community,†inProc. Brit. Comput. Soc. Conf. Human-Comput. Interact., 2008, pp.111–119.

      [14] C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, “Providing access control to online photo albums based on tags and linked data,†inProc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14.

      [15] S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova, “Privacy-aware image classification and search,†in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp. 35–44.

      [16] M. Wittie et al., “Exploiting Locality of Interest in Online Social Networks,†Proc. CoNext, 2010
  • Downloads

  • How to Cite

    D, H., Begum, A., & David S, A. (2018). Privacy study on images uploaded in social networks. International Journal of Engineering & Technology, 7(1.7), 142-145. https://doi.org/10.14419/ijet.v7i1.7.10636