Conflict Detection Techniques for Preserving Privacy in Social Media

Authors

  • Fulpagare Priya K.  Department of Computer Engineering, R. C. Patel Institute of Technology, Shirpur, Maharashtra, India
  • Prof. Dr. Nitin N. Patil  Department of Computer Engineering, R. C. Patel Institute of Technology, Shirpur, Maharashtra, India

DOI:

https://doi.org//10.32628/CSEIT183827

Keywords:

Social Media; Content Sharing Sites, Privacy, Conflicts, Meta Data, CSS, A3P.

Abstract

Social Network is an emerging e-service for Content Sharing Sites (CSS). It is an emerging service which provides reliable communication. Some users over CSS affect user’s privacy on their personal contents, where some users keep on sending annoying comments and messages by taking advantage of the user’s inherent trust in their relationship network. Integration of multiple user’s privacy preferences is very difficult task, because privacy preferences may create conflict. The techniques to resolve conflicts are essentially required. Moreover, these methods need to consider how users would actually reach an agreement about a solution to the conflict in order to offer solutions acceptable by all of the concerned users. The first mechanism to resolve conflicts for multi-party privacy management in social media that is able to adapt to different situations by displaying the enterprises that users make to reach a result to the conflicts. Billions of items that are uploaded to social media are co-owned by multiple users. Only the user that uploads the item is allowed to set its privacy settings (i.e. who can access the item). This is a critical problem as users’ privacy preferences for co-owned items can conflict. Multi-party privacy management is therefore of crucial importance for users to appropriately reserve their privacy in social media.

References

  1. Squicciarini, S. Sundareswaran, D. Lin, and J. Weed. “A3P: adaptive policy prediction for shared images over popular content sharing sites.” In Proceedings of the 22nd ACM conference on Hypertext and hypermedia, pages 261–270. ACM, 2011.
  2. J. Yu, D. Joshi, and J. Luo, “Connecting people in photo- sharing sites by photo content and user annotations,” in Proc. IEEE Int.Conf. Multimedia Expo, 2009, pp.1464–1467.
  3. J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,” in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining, pp. 249–254, 2009.
  4. A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,” in Proc. Symp. Usable Privacy Security, 2008.
  5. C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, “Providing access control to online photo albums based on tags and linked data,” in Proc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14.
  6. A. Mazzia, K. LeFevre, and A. E., “The PViz comprehension tool for social network privacy settings,” in Proc. Symp. Usable Privacy Security, 2012.
  7. K. Strater and H. Lipford, “Strategies and struggles with privacy in an online social networking community,” in Proc. Brit. Comput. Soc. Conf. Human-Comput. Interact., 2008, pp.111–119.
  8. H. Sundaram, L. Xie, M. De Choudhury, Y. Lin, and A. Natsev, “Multimedia semantics: Interactions between content and community,” Proc. IEEE, vol. 100, no. 9, pp. 2737–2758, Sep. 2012.
  9. C.-H. Yeh, Y.-C. Ho, B. A. Barsky, and M. Ouhyoung, “Personalized photograph ranking and selection system,” in Proc.Int. Conf. Multimedia, 2010, pp. 211–220.
  10. A. Squicciarini, M. Shehab, and F. Paci, “Collective privacy management in social networks,” in WWW. ACM, 2009, pp. 521–530.
  11. P. Fong, M. Anwar, and Z. Zhao, “A privacy preservation model for facebook-style social network systems,” in Proceedings of the 14th European conference on Research in computer security, pages 303–320. Springer-Verlag, 2009.
  12. Hongxin Hu, Member, IEEE, Gail-Joon Ahn, Senior Member, IEEE, and Jan Jorgensen, “Multiparty Access Control for Online Social Networks: Model and Mechanisms,” IEEE transactions on knowledge and data engineering, vol. 25, no. 7, july 2013.
  13. Emiliano De Cristofaro PARC, Claudio Soriente ETH Zurich , Gene Tsudik Andrew Williams UC Irvine UC Irvine 2012 IEEE Symposium on Security and Privacy “Hummingbird: Privacy at the time of Twitter”.
  14. Li Weng, Member, IEEE, Laurent Amsaleg, April Morton, and Stéphane Marchand-Maillet, “A Privacy-Preserving Framework for Large-Scale Content-Based Information Retrieval”- IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 10, NO. 1, JANUARY 2015.

Downloads

Published

2018-11-30

Issue

Section

Research Articles

How to Cite

[1]
Fulpagare Priya K., Prof. Dr. Nitin N. Patil, " Conflict Detection Techniques for Preserving Privacy in Social Media, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 3, Issue 8, pp.78-85, November-December-2018. Available at doi : https://doi.org/10.32628/CSEIT183827