SlideShare a Scribd company logo
1 of 4
Download to read offline
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 655
My Privacy My decision: Control of Photo Sharing on Online Social
Networks
Prashant Abhang1, S. B. Rathod2
1Student,Dept. of computer engineering, Sinhgad Academy of Engineering, pune.
2Professor, Dept. of computer engineering, Sinhgad Academy of Engineering, pune.
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Photo sharing refers tothetransferorpublishing
of a user’s digital photos online and the website which
provides such acquaintances over services such as hosting,
uploading, sharing and managing of photos through online
system. This function provides the upload and display of
images through both websites and applications. The photo
sharing term can be set up and managed by individual users
for the usage of online photo galleries includingphotoblogs. It
means that other users can view but not essentially download
the photos, users being able to select different copy-right
options for their photos. Unfortunately, it may reveal users
privacy if they are permitted to post, comment, and tag a
photo liberally. To address this problem, this project proposes
an efficient facial recognition system that can recognize
everyone in the photo. Online photo sharing applicationshave
become popular as it provides users various new and
innovative alternatives to share photoswitharangeofpeople.
The photo sharing feature is incorporated in many social
networking sites which allow users to post photo for their
loving ones, families and friends. For users of social
networking sites such as Facebook, this system focuses on the
privacy concerns and needs of the users, at the same time
explores ideas for privacy protection mechanisms. By
considering users current concernsand behaviors, thetoolcan
be designed as per the user’s desire which they can adopt and
then can be motivated to use.
Key Words: Online Social Network, privacy preserving,
photo sharing, FR system, face detection, feature
extraction
1. INTRODUCTION
With the huge popularity of sharing and the vast usage of
social networking sites users unknowingly reveal certain
kinds of personal information. Social-networking usersmay
or may not have the idea of getting their personal
information will be leaked or could pro t the malicious
attackers and may perpetrate significant privacy breaches.
The rest decade of 21st century has seen the extreme
popularization of Internet and the growth of web services
which facilitate participatory information sharing and
collaboration. Social Networking Sites(SNSs)havebecomea
boundless communication media to keep in touch beyond
boundaries. SNSs are a part of human culturethanjusta web
application. Use of SNSs has out spacedinalmosteveryfields
as news agencies, big and small companies, governments,
and famous personalities etc. to interact with each other.
With the adoration of sharing, Facebook has stood outasthe
most renown SNSs in the world where people hangout for
hours. With the extravagancy of technology and services
sharing of news, photos, personal tasteandinformationwith
friends and family has led to an ease. Butalongwiththisuser
privacy should also be taken into consideration. An issue
related to privacy with facebook users has been constantly
appearing on international press either because of the
companies privacy policy or because of users unaware-ness
of content sharing consequences. As a research says the
simple disclosure of date and place of birth of a pro le in
Facebook can be used to predict the Social Security Number
(SSN) of a citizen in the U.S. Many a times just by simply
publishing their friends list, users might be revealing a large
amount of information. For example, through the use of
prediction algorithms it is possible to infer private
information that was previously undisclosed. Sometimes
sensitive information even comes embedded in the photo as
metadata and may identify people on the photo by
accompanying more informationthatcouldbeexploited,like
captions, comments and photo tags; marked regions. Evenif
the individuals in a photo are not explicitly identified by
photo tags, the combinationofpubliclyavailableinformation
and face recognition software can be used to infersomeones
identity. These kinds of problems are defined as collateral
damage: users unintentionally put theirownprivacyortheir
friends privacy at risk when performingeventsonSNSssuch
as Facebook.
2. LITERATURE SURVEY
In 2006, Barbara Carminati, Elena Ferrari, and Andrea
Perego [3], presents a sys-tem that consists of policies in the
form of constraints on the type, depth and trust level of the
relationship that are existing on the accesscontrol model for
Web-based social networks(WBSNs).Theauthenticityto the
relationships are presented in the form of certificates and
rule based approach is used on the client side enforcement
to provide access control where the user requesting for
access has the entire rights to it. The system doesn’t use the
relationship among users to provide access as the
relationship might not be a strong point of consideration.
Instead the trust factor and the depth of relationship among
users are very important and based on that the access is
provided. A rule-based access control model is proposed for
WBSNs, which allows the requirement of access rules for
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 656
online resources where the relationship be-tween
authorized users in the network is denoted in terms of the
relationship type, depth, and trust level. In this system, the
certificates which are specified by the users are stored and
managed by the central node of the network, whereas
storing of access control and performing access control is
done by a set of peripheral nodes.
In 2009, Jonathan Anderson proposed a paradigm called
Privacy Suites [7] which allows users to easily choose
suites of privacy settings that can be created by an expert
using privacy programming or can be created through
exporting them to the abstract format or through existing
configuration UIs. A Privacy suite can be verified by a good
practice, a high level language and motivated users which
then can be then distributed to the members of the social
sites through existing distribution channels.
In 2011, Barbara Carminati, Elena Ferrari , Raymond
Heatherly, Murat Kantar-cioglub, Bhavani Thuraisingham
[11], address that security and privacy concerns need to be
addressed for creating applicationsofonlinesocial networks
that include person specific information. So a primeconcern
is given towards improving social network access control
systems. But the current OSNs provide very basic access
control system to the users suchasmarkinga particularitem
as public, private or accessible by their direct contacts but
they lack exibility as they do not specify the access control
requirements. So a ne-grained OSN access control model
based on semantic web technologies is proposed in [11]
which encode social network-related information by means
of ontology. Semantic Web Rule Language (SWRL) can be
used to set the security policies in the form of rules which
are expressed in ontology and this canbeenforced bysimply
querying the authorizations. In 2013, Kambiz Ghazinour
proposed a recommender system known as Your Privacy
Protector [17] that assists by understanding the behavior of
privacy setting andrecommendsreasonableprivacyoptions.
The personal pro le of the user is constructed based on the
parameters such as users interests, users privacy settings
and users personal pro le on photo albums and basedonthis
pro le of users it assigns the privacy options. The user is
granted permission to see their current privacy settings
which will be monitored by the system and if any risk is
detected it adopts the necessary privacy settings.
In 2015, Anna Cinzia Squicciarini developed an
Adaptive Privacy Policy Pre-diction (A3P) [18] system, that
automatically generates personalized policies as it is a free
privacy settings system. Based on the images content,
persons personal characteristics and metadata, the user
uploaded image can be handled by A3P system. It consists of
two components: A3P Core and A3P Social. The A3P core
receives the image uploaded by the user, which it classifies
and decides whether there is a need to call upon the A3P-
social. If the metadata is unavailable or if it is created
manually then it may cause inaccurate classification,
violation policy and even may cause inaccurate privacy
policy generation.
3. SYSTEM ARCHITECTURE
A mechanism has been designed to make users aware of the
posting activity and make them actively take part in the
photo posting and decision making paradigm for which a
facial recognition (FR) system is recommended which can
recognize everyone present in the photo. If more privacy
setting is done then it may limit the number of photos which
will be utilized as the training set for FR system. In order to
overcome this problem and for training setforFRsystem we
would utilize the private photos of users which would
differentiate the photo co-owners without affecting their
privacy. A distributed consensus based methodisdeveloped
which would protect theprivatetrainingsetandeven reduce
the computational complexity.
Our contributions to this work when compared with
previous work are mentioned below:
1. We can find the potential owners of shared photos
automatically even when the use of generated tags is kept as
an option in our paper.
2. Private photos in a privacy-preserving manner and
social contexts to derive a personal FR engine for any
particular user is proposed in our paper.
3. We propose a consensus-based method to achieve
privacy and efficiency.
A privacy-preserving FR system is used to identify
individuals in a co-photo. The owners present in the shared
photos can be automatically recognized and identified with
or without user-generated tags. The FR engine is derived
from the private photos and social contexts. The privacy is
protected by providing users facility to restrict others from
seeing their photos. Each user is able to de ne his/her policy
which are privacy policy and exposure policy. Computation
cost is very low. FR system provides privacy by notifyingthe
subject about the posting activity and thus leading the other
subjects to take active part in it. To prevent possible privacy
leakage of a photo, we design a mechanism to enable each
individual present in a photo be aware of thepostingactivity
and participate in the decision making on the photo posting.
For this purpose, an efficient facial recognition (FR) system
is needed which recognizes everyone in thephoto.However,
if more privacy settings are done then it may bind the
number of photos necessary to train the FR system. So in
order to solve this problem, private photos of users is
utilized to train the FR system and thus prevent the leakage
of the privacy of the individuals.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 657
Fig -1: System Architecture
A. Steps in project:
1. User needs to register his account.
2. Login to the home page of the application.
3. Enter OTP which will be sent to an
authorized user.
4. Upload train images where the faces will
be detected and cropped.
5. Search for friendsifanyorelsesendfriend
request to other users.
6. Request can be accepted if any user has
sent any request.
7. Upload or add photo on the home page.
8. OTP will be sent to the registered mail id
of an authorized user.
9. Face recognition algorithm is used to
recognize the faces present in the uploaded photo
10. If faces are recognized then notification
is sent to the co-owner about posting activity.
11. Finally, if permission is given by the co-
owner then photo will be uploaded.
4. RESULT
The proposed scheme is very useful in protecting users'
privacy in photo/image sharing over onlinesocial networks.
However, there always exist trade-o between privacy and
utility. Preserving user privacy and making them actively
participate in the photo posting activity is a very prime
concern in OSNs. The co-photo can be posted only with the
permission of the co-owner and if the privacy and exposure
policy gets satis es. To make the system more secured the
noti cation is sent to the co-owner and only with his/her
acceptance the photo is posted. In addition random OTP is
generated while uploading photo to verify the user who is
posting it as someone may access hisaccount to upload
photos which are in actual not to be posted bytheconcerned
account holder.The result of the system is shown with the
help of the comparison table where it re ects the di erence
between the existing system and the system proposed. The
result of the system depends on the number of the train
images. As the number of train images increases the
recognition of the ownersandco-ownersphotoisdonemore
easily and quickly.
5. CONCLUSION
Photo sharing is the process of publishing or transfer of a
user's digital photos on-line. Individuals in a co-photo are
identified by the proposed FR system. The system reveals
the detailed description of our system. Generally speaking,
the consensus resultcouldbeachievedbyiterativelyrefining
the local training result. Various websites o er services such
as uploading, hosting, and managing for photo-sharing
(publicly or privately).These functionsprovided bywebsites
and applications facilitate the upload and display of images.
The term may even be useful for online photo galleries that
are positioned up and managed by individual users,
including photo blogs. The system used a toy system with
two users to demonstrate the principle of the design. The
system that is built has proven that how to build a general
personal FR with more than two users. The system can
reduce the privacy leakage by usingthisdesignasitprovides
intimation to the co-owners and even to the ownersthrough
random OTP generation.
REFERENCES
[1] Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang,
Xiaolin Li, ”My Privacy My Decision: Control of Photo
Sharing on OnlineSocial Networks”,IEEETransactionon
Dependable and Secure Computing, Volume: PP , Issue:
99, pp-1-1, 2015
[2] Z. Stone, T. Zickler, and T. Darrell, ”Autotagging
facebook: Social network context improves photo
annotation”, IEEE Computer Society Conference on
Computer Vision and Pattern Recognition Workshops,
pp. 1-8, 2008.
[3] A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P.
Tsang, ”Social circles: Tackling privacy in social
networks”, in Proc. Sympsable Privacy Security, 2008.
[4] J. Bonneau, J. Anderson, and L. Church, ”Privacy suites:
Shared privacy for social networks”, in Proc. Symp.
Usable Privacy Security, 2009.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056
Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072
© 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 658
[5] C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, ”Pro-
viding access control to online photo albums based on
tags and linked data”, pp. 9-14, 2009.
[6] A. Besmer and H. Richter Lipford. Moving beyonduntag-
ging: photo privacy in a tagged world. In Proceedings of
the SIGCHI Conference on Human Factors in Computing
Systems, pp. 1563-1572, 2010.
[7] Barbara Carminati, Elena Ferrari, Raymond Heatherly,
Mu-rat Kantarcioglu, BhavaniThuraisingham,”Semantic
web-based social network access control”, pp. 108-115,
2011.
[8] Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, Elena
Demi-dova , ”I Know What You Did Last
Summer!:Privacy-AwareImageClassificationandSearch
”, Proceedings of the 35th international ACM SIGIR
conference on Researchanddevelopmentininformation
retrieval, 2012.
[9] Kambiz Ghazinour, Stan Matwin and Marina Sokolova,
”Yourprivacyprotector:ARecommenderSystemFor Pri-
vacy Settings In Social Networks”, International Journal
of Security, PrivacyandTrustManagement(IJSPTM),Vol
2, No 4, August 2013.
[10] Barbara Carminati, Elena Ferrari,RaymondHeatherly,
Murat Kantar-cioglu, Bhavani Thuraisingham, Semantic
web-based social network access control, 2011.
[11] J. Y. Choi, W. De Neve, K. Plataniotis, and Y.M. Ro.,
Collaborative face recognition for improved face
annotation in personal photo collections shared on
online social networks, Multimedia, IEEE Transactions
on, 2011.
[12] Anna Cinzia Squicciarini, Privacy Policy Inference of
User-Uploaded Im-ages on Content Sharing Sites, IEEE
Transactions On Knowledge And Data Engineering, vol.
27, no. 1, January 2015.

More Related Content

What's hot

Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images oniaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images onIaetsd Iaetsd
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Eswar Publications
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSMaurice Dawson
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image PrivacyIOSR Journals
 
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media FeedsVisual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media FeedsIRJET Journal
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...Maurice Dawson
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networkseditorjournal
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network AnalysisMarc Smith
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...IOSR Journals
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...IJASRD Journal
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET Journal
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloningIJNSA Journal
 

What's hot (19)

Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Threats_Report_2013
Threats_Report_2013Threats_Report_2013
Threats_Report_2013
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
204
204204
204
 
iaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images oniaetsd Adaptive privacy policy prediction for user uploaded images on
iaetsd Adaptive privacy policy prediction for user uploaded images on
 
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
Deterring Sybil Attack in Online Communication System via Peer-to-peer Audio ...
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
OSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETSOSINT EXPLOITATION OF UNIVERSITY TWEETS
OSINT EXPLOITATION OF UNIVERSITY TWEETS
 
Online Social Networking Site
Online Social Networking SiteOnline Social Networking Site
Online Social Networking Site
 
Social Networking Websites and Image Privacy
Social Networking Websites and Image PrivacySocial Networking Websites and Image Privacy
Social Networking Websites and Image Privacy
 
Visual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media FeedsVisual Relation Identification Using BoFT Labels in Social Media Feeds
Visual Relation Identification Using BoFT Labels in Social Media Feeds
 
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
MOBILE DEVICES: THE CASE FOR CYBER SECURITY HARDENED SYSTEMS AND METHODS TO ...
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
 
2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis2010 Catalyst Conference - Trends in Social Network Analysis
2010 Catalyst Conference - Trends in Social Network Analysis
 
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
An Automated Model to Detect Fake Profiles and botnets in Online Social Netwo...
 
social networking site
social networking sitesocial networking site
social networking site
 
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 
IRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat ApplicationIRJET- Cyber Bullying Detection in Web Chat Application
IRJET- Cyber Bullying Detection in Web Chat Application
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 

Similar to My Privacy My decision: Control of Photo Sharing on Online Social Networks

Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijripublishers Ijri
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social NetworksIRJET Journal
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network siteijcsit
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkeSAT Publishing House
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET Journal
 
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesPrivacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesIRJET Journal
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesIRJET Journal
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...IRJET Journal
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2IAEME Publication
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking SitesIRJET Journal
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...IRJET Journal
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHijmpict
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IJITE
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...IRJET Journal
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...IRJET Journal
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSIJCI JOURNAL
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...IRJET Journal
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET Journal
 

Similar to My Privacy My decision: Control of Photo Sharing on Online Social Networks (20)

Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
 
Privacy Protection Using Formal Logics in Onlne Social Networks
Privacy Protection Using   Formal Logics in Onlne Social NetworksPrivacy Protection Using   Formal Logics in Onlne Social Networks
Privacy Protection Using Formal Logics in Onlne Social Networks
 
Intelligent access control policies for Social network site
Intelligent access control policies for Social network siteIntelligent access control policies for Social network site
Intelligent access control policies for Social network site
 
Authorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social networkAuthorization mechanism for multiparty data sharing in social network
Authorization mechanism for multiparty data sharing in social network
 
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
 
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing SitesPrivacy Recommendations and Ranking of User Images on Content Sharing Sites
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
 
A Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking WebsitesA Survey on Privacy in Social Networking Websites
A Survey on Privacy in Social Networking Websites
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
 
Posn private information protection in online social networks 2
Posn private information protection in online social networks 2Posn private information protection in online social networks 2
Posn private information protection in online social networks 2
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
 
USER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCHUSER PROFILE BASED PERSONALIZED WEB SEARCH
USER PROFILE BASED PERSONALIZED WEB SEARCH
 
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
IDENTITY DISCLOSURE PROTECTION IN DYNAMIC NETWORKS USING K W – STRUCTURAL DIV...
 
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...IRJET-  	  Recognizing User Portrait for Fraudulent Identification on Online ...
IRJET- Recognizing User Portrait for Fraudulent Identification on Online ...
 
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
Social Media Privacy Protection for Blockchain with Cyber Security Prediction...
 
4 newmain doc
4 newmain doc4 newmain doc
4 newmain doc
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
 
IRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social NetworkIRJET - Detecting Spiteful Accounts in Social Network
IRJET - Detecting Spiteful Accounts in Social Network
 

More from IRJET Journal

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...IRJET Journal
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTUREIRJET Journal
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...IRJET Journal
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsIRJET Journal
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...IRJET Journal
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...IRJET Journal
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...IRJET Journal
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...IRJET Journal
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASIRJET Journal
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...IRJET Journal
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProIRJET Journal
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...IRJET Journal
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemIRJET Journal
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesIRJET Journal
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web applicationIRJET Journal
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...IRJET Journal
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.IRJET Journal
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...IRJET Journal
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignIRJET Journal
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...IRJET Journal
 

More from IRJET Journal (20)

TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
TUNNELING IN HIMALAYAS WITH NATM METHOD: A SPECIAL REFERENCES TO SUNGAL TUNNE...
 
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURESTUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
STUDY THE EFFECT OF RESPONSE REDUCTION FACTOR ON RC FRAMED STRUCTURE
 
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
A COMPARATIVE ANALYSIS OF RCC ELEMENT OF SLAB WITH STARK STEEL (HYSD STEEL) A...
 
Effect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil CharacteristicsEffect of Camber and Angles of Attack on Airfoil Characteristics
Effect of Camber and Angles of Attack on Airfoil Characteristics
 
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
A Review on the Progress and Challenges of Aluminum-Based Metal Matrix Compos...
 
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
Dynamic Urban Transit Optimization: A Graph Neural Network Approach for Real-...
 
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
Structural Analysis and Design of Multi-Storey Symmetric and Asymmetric Shape...
 
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
A Review of “Seismic Response of RC Structures Having Plan and Vertical Irreg...
 
A REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADASA REVIEW ON MACHINE LEARNING IN ADAS
A REVIEW ON MACHINE LEARNING IN ADAS
 
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
Long Term Trend Analysis of Precipitation and Temperature for Asosa district,...
 
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD ProP.E.B. Framed Structure Design and Analysis Using STAAD Pro
P.E.B. Framed Structure Design and Analysis Using STAAD Pro
 
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
A Review on Innovative Fiber Integration for Enhanced Reinforcement of Concre...
 
Survey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare SystemSurvey Paper on Cloud-Based Secured Healthcare System
Survey Paper on Cloud-Based Secured Healthcare System
 
Review on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridgesReview on studies and research on widening of existing concrete bridges
Review on studies and research on widening of existing concrete bridges
 
React based fullstack edtech web application
React based fullstack edtech web applicationReact based fullstack edtech web application
React based fullstack edtech web application
 
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
A Comprehensive Review of Integrating IoT and Blockchain Technologies in the ...
 
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
A REVIEW ON THE PERFORMANCE OF COCONUT FIBRE REINFORCED CONCRETE.
 
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
Optimizing Business Management Process Workflows: The Dynamic Influence of Mi...
 
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic DesignMultistoried and Multi Bay Steel Building Frame by using Seismic Design
Multistoried and Multi Bay Steel Building Frame by using Seismic Design
 
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
Cost Optimization of Construction Using Plastic Waste as a Sustainable Constr...
 

Recently uploaded

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escortsranjana rawat
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSRajkumarAkumalla
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...Soham Mondal
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxupamatechverse
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxJoão Esperancinha
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝soniya singh
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Serviceranjana rawat
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxhumanexperienceaaa
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidNikhilNagaraju
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCall Girls in Nagpur High Profile
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSCAESB
 

Recently uploaded (20)

(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
(MEERA) Dapodi Call Girls Just Call 7001035870 [ Cash on Delivery ] Pune Escorts
 
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICSHARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
HARDNESS, FRACTURE TOUGHNESS AND STRENGTH OF CERAMICS
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
OSVC_Meta-Data based Simulation Automation to overcome Verification Challenge...
 
Introduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptxIntroduction and different types of Ethernet.pptx
Introduction and different types of Ethernet.pptx
 
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANJALI) Dange Chowk Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
9953056974 Call Girls In South Ex, Escorts (Delhi) NCR.pdf
 
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(PRIYA) Rajgurunagar Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur EscortsCall Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
Call Girls Service Nagpur Tanvi Call 7001035870 Meet With Nagpur Escorts
 
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptxDecoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
Decoding Kotlin - Your guide to solving the mysterious in Kotlin.pptx
 
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
Model Call Girl in Narela Delhi reach out to us at 🔝8264348440🔝
 
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptxExploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
Exploring_Network_Security_with_JA3_by_Rakesh Seal.pptx
 
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
(RIA) Call Girls Bhosari ( 7001035870 ) HI-Fi Pune Escorts Service
 
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptxthe ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
the ladakh protest in leh ladakh 2024 sonam wangchuk.pptx
 
main PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfidmain PPT.pptx of girls hostel security using rfid
main PPT.pptx of girls hostel security using rfid
 
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
★ CALL US 9953330565 ( HOT Young Call Girls In Badarpur delhi NCR
 
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCRCall Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
Call Us -/9953056974- Call Girls In Vikaspuri-/- Delhi NCR
 
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service NashikCollege Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
College Call Girls Nashik Nehal 7001305949 Independent Escort Service Nashik
 
GDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentationGDSC ASEB Gen AI study jams presentation
GDSC ASEB Gen AI study jams presentation
 

My Privacy My decision: Control of Photo Sharing on Online Social Networks

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 655 My Privacy My decision: Control of Photo Sharing on Online Social Networks Prashant Abhang1, S. B. Rathod2 1Student,Dept. of computer engineering, Sinhgad Academy of Engineering, pune. 2Professor, Dept. of computer engineering, Sinhgad Academy of Engineering, pune. ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Photo sharing refers tothetransferorpublishing of a user’s digital photos online and the website which provides such acquaintances over services such as hosting, uploading, sharing and managing of photos through online system. This function provides the upload and display of images through both websites and applications. The photo sharing term can be set up and managed by individual users for the usage of online photo galleries includingphotoblogs. It means that other users can view but not essentially download the photos, users being able to select different copy-right options for their photos. Unfortunately, it may reveal users privacy if they are permitted to post, comment, and tag a photo liberally. To address this problem, this project proposes an efficient facial recognition system that can recognize everyone in the photo. Online photo sharing applicationshave become popular as it provides users various new and innovative alternatives to share photoswitharangeofpeople. The photo sharing feature is incorporated in many social networking sites which allow users to post photo for their loving ones, families and friends. For users of social networking sites such as Facebook, this system focuses on the privacy concerns and needs of the users, at the same time explores ideas for privacy protection mechanisms. By considering users current concernsand behaviors, thetoolcan be designed as per the user’s desire which they can adopt and then can be motivated to use. Key Words: Online Social Network, privacy preserving, photo sharing, FR system, face detection, feature extraction 1. INTRODUCTION With the huge popularity of sharing and the vast usage of social networking sites users unknowingly reveal certain kinds of personal information. Social-networking usersmay or may not have the idea of getting their personal information will be leaked or could pro t the malicious attackers and may perpetrate significant privacy breaches. The rest decade of 21st century has seen the extreme popularization of Internet and the growth of web services which facilitate participatory information sharing and collaboration. Social Networking Sites(SNSs)havebecomea boundless communication media to keep in touch beyond boundaries. SNSs are a part of human culturethanjusta web application. Use of SNSs has out spacedinalmosteveryfields as news agencies, big and small companies, governments, and famous personalities etc. to interact with each other. With the adoration of sharing, Facebook has stood outasthe most renown SNSs in the world where people hangout for hours. With the extravagancy of technology and services sharing of news, photos, personal tasteandinformationwith friends and family has led to an ease. Butalongwiththisuser privacy should also be taken into consideration. An issue related to privacy with facebook users has been constantly appearing on international press either because of the companies privacy policy or because of users unaware-ness of content sharing consequences. As a research says the simple disclosure of date and place of birth of a pro le in Facebook can be used to predict the Social Security Number (SSN) of a citizen in the U.S. Many a times just by simply publishing their friends list, users might be revealing a large amount of information. For example, through the use of prediction algorithms it is possible to infer private information that was previously undisclosed. Sometimes sensitive information even comes embedded in the photo as metadata and may identify people on the photo by accompanying more informationthatcouldbeexploited,like captions, comments and photo tags; marked regions. Evenif the individuals in a photo are not explicitly identified by photo tags, the combinationofpubliclyavailableinformation and face recognition software can be used to infersomeones identity. These kinds of problems are defined as collateral damage: users unintentionally put theirownprivacyortheir friends privacy at risk when performingeventsonSNSssuch as Facebook. 2. LITERATURE SURVEY In 2006, Barbara Carminati, Elena Ferrari, and Andrea Perego [3], presents a sys-tem that consists of policies in the form of constraints on the type, depth and trust level of the relationship that are existing on the accesscontrol model for Web-based social networks(WBSNs).Theauthenticityto the relationships are presented in the form of certificates and rule based approach is used on the client side enforcement to provide access control where the user requesting for access has the entire rights to it. The system doesn’t use the relationship among users to provide access as the relationship might not be a strong point of consideration. Instead the trust factor and the depth of relationship among users are very important and based on that the access is provided. A rule-based access control model is proposed for WBSNs, which allows the requirement of access rules for
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 656 online resources where the relationship be-tween authorized users in the network is denoted in terms of the relationship type, depth, and trust level. In this system, the certificates which are specified by the users are stored and managed by the central node of the network, whereas storing of access control and performing access control is done by a set of peripheral nodes. In 2009, Jonathan Anderson proposed a paradigm called Privacy Suites [7] which allows users to easily choose suites of privacy settings that can be created by an expert using privacy programming or can be created through exporting them to the abstract format or through existing configuration UIs. A Privacy suite can be verified by a good practice, a high level language and motivated users which then can be then distributed to the members of the social sites through existing distribution channels. In 2011, Barbara Carminati, Elena Ferrari , Raymond Heatherly, Murat Kantar-cioglub, Bhavani Thuraisingham [11], address that security and privacy concerns need to be addressed for creating applicationsofonlinesocial networks that include person specific information. So a primeconcern is given towards improving social network access control systems. But the current OSNs provide very basic access control system to the users suchasmarkinga particularitem as public, private or accessible by their direct contacts but they lack exibility as they do not specify the access control requirements. So a ne-grained OSN access control model based on semantic web technologies is proposed in [11] which encode social network-related information by means of ontology. Semantic Web Rule Language (SWRL) can be used to set the security policies in the form of rules which are expressed in ontology and this canbeenforced bysimply querying the authorizations. In 2013, Kambiz Ghazinour proposed a recommender system known as Your Privacy Protector [17] that assists by understanding the behavior of privacy setting andrecommendsreasonableprivacyoptions. The personal pro le of the user is constructed based on the parameters such as users interests, users privacy settings and users personal pro le on photo albums and basedonthis pro le of users it assigns the privacy options. The user is granted permission to see their current privacy settings which will be monitored by the system and if any risk is detected it adopts the necessary privacy settings. In 2015, Anna Cinzia Squicciarini developed an Adaptive Privacy Policy Pre-diction (A3P) [18] system, that automatically generates personalized policies as it is a free privacy settings system. Based on the images content, persons personal characteristics and metadata, the user uploaded image can be handled by A3P system. It consists of two components: A3P Core and A3P Social. The A3P core receives the image uploaded by the user, which it classifies and decides whether there is a need to call upon the A3P- social. If the metadata is unavailable or if it is created manually then it may cause inaccurate classification, violation policy and even may cause inaccurate privacy policy generation. 3. SYSTEM ARCHITECTURE A mechanism has been designed to make users aware of the posting activity and make them actively take part in the photo posting and decision making paradigm for which a facial recognition (FR) system is recommended which can recognize everyone present in the photo. If more privacy setting is done then it may limit the number of photos which will be utilized as the training set for FR system. In order to overcome this problem and for training setforFRsystem we would utilize the private photos of users which would differentiate the photo co-owners without affecting their privacy. A distributed consensus based methodisdeveloped which would protect theprivatetrainingsetandeven reduce the computational complexity. Our contributions to this work when compared with previous work are mentioned below: 1. We can find the potential owners of shared photos automatically even when the use of generated tags is kept as an option in our paper. 2. Private photos in a privacy-preserving manner and social contexts to derive a personal FR engine for any particular user is proposed in our paper. 3. We propose a consensus-based method to achieve privacy and efficiency. A privacy-preserving FR system is used to identify individuals in a co-photo. The owners present in the shared photos can be automatically recognized and identified with or without user-generated tags. The FR engine is derived from the private photos and social contexts. The privacy is protected by providing users facility to restrict others from seeing their photos. Each user is able to de ne his/her policy which are privacy policy and exposure policy. Computation cost is very low. FR system provides privacy by notifyingthe subject about the posting activity and thus leading the other subjects to take active part in it. To prevent possible privacy leakage of a photo, we design a mechanism to enable each individual present in a photo be aware of thepostingactivity and participate in the decision making on the photo posting. For this purpose, an efficient facial recognition (FR) system is needed which recognizes everyone in thephoto.However, if more privacy settings are done then it may bind the number of photos necessary to train the FR system. So in order to solve this problem, private photos of users is utilized to train the FR system and thus prevent the leakage of the privacy of the individuals.
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 657 Fig -1: System Architecture A. Steps in project: 1. User needs to register his account. 2. Login to the home page of the application. 3. Enter OTP which will be sent to an authorized user. 4. Upload train images where the faces will be detected and cropped. 5. Search for friendsifanyorelsesendfriend request to other users. 6. Request can be accepted if any user has sent any request. 7. Upload or add photo on the home page. 8. OTP will be sent to the registered mail id of an authorized user. 9. Face recognition algorithm is used to recognize the faces present in the uploaded photo 10. If faces are recognized then notification is sent to the co-owner about posting activity. 11. Finally, if permission is given by the co- owner then photo will be uploaded. 4. RESULT The proposed scheme is very useful in protecting users' privacy in photo/image sharing over onlinesocial networks. However, there always exist trade-o between privacy and utility. Preserving user privacy and making them actively participate in the photo posting activity is a very prime concern in OSNs. The co-photo can be posted only with the permission of the co-owner and if the privacy and exposure policy gets satis es. To make the system more secured the noti cation is sent to the co-owner and only with his/her acceptance the photo is posted. In addition random OTP is generated while uploading photo to verify the user who is posting it as someone may access hisaccount to upload photos which are in actual not to be posted bytheconcerned account holder.The result of the system is shown with the help of the comparison table where it re ects the di erence between the existing system and the system proposed. The result of the system depends on the number of the train images. As the number of train images increases the recognition of the ownersandco-ownersphotoisdonemore easily and quickly. 5. CONCLUSION Photo sharing is the process of publishing or transfer of a user's digital photos on-line. Individuals in a co-photo are identified by the proposed FR system. The system reveals the detailed description of our system. Generally speaking, the consensus resultcouldbeachievedbyiterativelyrefining the local training result. Various websites o er services such as uploading, hosting, and managing for photo-sharing (publicly or privately).These functionsprovided bywebsites and applications facilitate the upload and display of images. The term may even be useful for online photo galleries that are positioned up and managed by individual users, including photo blogs. The system used a toy system with two users to demonstrate the principle of the design. The system that is built has proven that how to build a general personal FR with more than two users. The system can reduce the privacy leakage by usingthisdesignasitprovides intimation to the co-owners and even to the ownersthrough random OTP generation. REFERENCES [1] Kaihe Xu, Yuanxiong Guo, Linke Guo, Yuguang Fang, Xiaolin Li, ”My Privacy My Decision: Control of Photo Sharing on OnlineSocial Networks”,IEEETransactionon Dependable and Secure Computing, Volume: PP , Issue: 99, pp-1-1, 2015 [2] Z. Stone, T. Zickler, and T. Darrell, ”Autotagging facebook: Social network context improves photo annotation”, IEEE Computer Society Conference on Computer Vision and Pattern Recognition Workshops, pp. 1-8, 2008. [3] A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, ”Social circles: Tackling privacy in social networks”, in Proc. Sympsable Privacy Security, 2008. [4] J. Bonneau, J. Anderson, and L. Church, ”Privacy suites: Shared privacy for social networks”, in Proc. Symp. Usable Privacy Security, 2009.
  • 4. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395-0056 Volume: 04 Issue: 07 | July -2017 www.irjet.net p-ISSN: 2395-0072 © 2017, IRJET | Impact Factor value: 5.181 | ISO 9001:2008 Certified Journal | Page 658 [5] C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, ”Pro- viding access control to online photo albums based on tags and linked data”, pp. 9-14, 2009. [6] A. Besmer and H. Richter Lipford. Moving beyonduntag- ging: photo privacy in a tagged world. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1563-1572, 2010. [7] Barbara Carminati, Elena Ferrari, Raymond Heatherly, Mu-rat Kantarcioglu, BhavaniThuraisingham,”Semantic web-based social network access control”, pp. 108-115, 2011. [8] Sergej Zerr, Stefan Siersdorfer, Jonathon Hare, Elena Demi-dova , ”I Know What You Did Last Summer!:Privacy-AwareImageClassificationandSearch ”, Proceedings of the 35th international ACM SIGIR conference on Researchanddevelopmentininformation retrieval, 2012. [9] Kambiz Ghazinour, Stan Matwin and Marina Sokolova, ”Yourprivacyprotector:ARecommenderSystemFor Pri- vacy Settings In Social Networks”, International Journal of Security, PrivacyandTrustManagement(IJSPTM),Vol 2, No 4, August 2013. [10] Barbara Carminati, Elena Ferrari,RaymondHeatherly, Murat Kantar-cioglu, Bhavani Thuraisingham, Semantic web-based social network access control, 2011. [11] J. Y. Choi, W. De Neve, K. Plataniotis, and Y.M. Ro., Collaborative face recognition for improved face annotation in personal photo collections shared on online social networks, Multimedia, IEEE Transactions on, 2011. [12] Anna Cinzia Squicciarini, Privacy Policy Inference of User-Uploaded Im-ages on Content Sharing Sites, IEEE Transactions On Knowledge And Data Engineering, vol. 27, no. 1, January 2015.