Date of Publication :14th June 2017
Abstract: Social media is a platform where re sharing of post is allowed. This may lead to privacy conflict between the involved users as the post is shared without considering the actual owner’s preference. In order to address this issue, here an algorithm is used to automatically detect and resolve the conflicts that occur between the negotiating users. Also tagging permissions are used here so that no user can be able to tag any other user without that user’s permission both in textual content and photo. Face recognition system has been used here to recognize the face uploaded by user and to get permission of the user of whom the photo is uploaded. Only if that particular person gave permission then the post will be posted, otherwise it won’t get posted. Here timing constraint is one more feature that is added so that up loader can set by how much time response should be received and what action to be taken if response is not received in that time constraint. Through this work an attempt has been done to preserve the privacy of individual users of social media
Reference :
-
- Wishart, Ryan, et al. "Collaborative privacy policy authoring in a social networking context." Policies for distributed systems and networks (POLICY), 2010 IEEE international symposium on. IEEE, 2010.
- Squicciarini, Anna Cinzia, Mohamed Shehab, and Federica Paci. "Collective privacy management in social networks." Proceedings of the 18th international conference on World wide web. ACM, 2009
- Hu, Hongxin, Gail-Joon Ahn, and Jan Jorgensen. "Detecting and resolving privacy conflicts for collaborative data sharing in online social networks." Proceedings of the 27th Annual Computer Security Applications Conference. ACM, 2011.
- Carminati, Barbara, and Elena Ferrari. "Collaborative access control in on-line social networks." Collaborative computing: networking, applications and worksharing (CollaborateCom), 2011 7th international conference on. IEEE, 2011.
- Hu, Hongxin, Gail-Joon Ahn, and Jan Jorgensen. "Multiparty access control for online social networks: model and mechanisms." IEEE Transactions on Knowledge and Data Engineering 25.7 (2013): 1614-1627.
- Hu, Hongxin, et al. "Game theoretic analysis of multiparty access control in online social networks." Proceedings of the 19th ACM symposium on Access control models and technologies. ACM, 2014