SlideShare a Scribd company logo
1 of 12
PRIVACY POLICY INFERENCE OF USER-UPLOADED
IMAGES ON CONTENT SHARING SITES
Abstract—With the increasing volume of images users share through social sites,
maintaining privacy has become a major problem, as demonstrated by a recent
wave of publicized incidents where users inadvertently shared personal
information. In light of these incidents, the need of tools to help users control
access to their shared content is apparent. Toward addressing this need, we propose
an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy
settings for their images. We examine the role of social context, image content, and
metadata as possible indicators of users’ privacy preferences. We propose a two-
level framework which according to the user’s available history on the site,
determines the best available privacy policy for the user’s images being uploaded.
Our solution relies on an image classification framework for image categories
which may be associated with similar policies, and on a policy prediction
algorithm to automatically generate a policy for each newly uploaded image, also
according to users’ social features. Over time, the generated policies will follow
the evolution of users’ privacy attitude. We provide the results of our extensive
evaluation over 5,000 policies, which demonstrate the effectiveness of our system,
with prediction accuracies over 90 percent.
EXISTING SYSTEM:
Several recent works have studied how to automate the task of privacy settings
Bonneau et al. proposed the concept of privacy suites which recommend to users a
suite of privacy settings that n“expert” users or other trusted friends have already
set, so that normal users can either directly choose a setting or only need to do
minor modification. Similarly, Danezis proposed a machine-learning based
approach to automatically extract privacy settings from the social context within
which the data is produced. Parallel to the work of Danezis, Adu-Oppong et al.
develop privacy settings based on a concept of “Social Circles” which consist of
clusters of friends formed by partitioning users’ friend lists. Ravichandran et al.
studied how to predict a user’s privacy preferences for location-based data (i.e.,
share her location or not) based on location and time of day. Fang et al. proposed a
privacy wizard to help users grant privileges to their friends. The wizard asks users
to first assign privacy labels to selected friends, and then uses this as input to
construct a classifier which classifies friends based on their profiles and
automatically assign privacy labels to the unlabeled friends. More recently,
Klemperer et al. studied whether the keywords and captions with which users tag
their photos can be used to help users more intuitively create and maintain access-
control policies. Their findings are inline with our approach: tags created for
organizational purposes can be repurposed to help create reasonably accurate
access-controlrules.
PROPOSED SYSTEM:
We propose an Adaptive Privacy Policy Prediction (A3P) system which aims to
provide users a hassle free privacy settings experience by automatically generating
personalized policies. The A3P system handles user uploaded images, and factors
in the following criteria that influence one’s privacy settings of images: The
impact of social environment and personal characteristics. Social context of users,
such as their profile information and relationships with others may provide useful
information regarding users’ privacy preferences. For example, users interested in
photography may like to share their photos with other amateur photographers.
Users who have several family members among their social contacts may share
with them pictures related to family events. However, using common policies
across all users or across users with similar traits may be too simplistic and not
satisfy individual preferences. Users may have drastically different opinions even
on the same type of images. For example, a privacy adverse person may be willing
to share all his personal images while a more conservative person may just want to
share personal images with his family members. In light of these considerations, it
is important to find the balancing point between the impact of social environment
and users’ individual characteristics in order to predict the policies that match each
individual’s needs. Moreover, individuals may change their overall attitude toward
privacy as time passes. In order to develop a personalized policy recommendation
system, such changes on privacy opinions should be carefully considered. The role
of image’s content and metadata. In general, similar images often incur similar
privacy preferences, especially when people appear in the images. For example,
one may upload several photos of his kids and specify that only his family
members are allowed to see these photos. He may upload some other photos of
landscapes which he took as a hobby and for these photos, he may set privacy
preference allowing anyone to view and comment the photos. Analyzing the visual
content may not be sufficient to capture users’ privacy preferences. Tags and other
metadata are indicative of the social context of the image, including where it was
taken and why , and also provide a synthetic description of images, complementing
the information obtained from visual content analysis.
Module 1
A3P-CORE
There are two major components in A3P-core: (i) Image classification and (ii)
Adaptive policy prediction. For each user, his/her images are first classified based
on content and metadata. Then, privacy policies of each category of images are
analyzed for the policy prediction. Adopting a two-stage approach is more suitable
for policy recommendation than applying the common one-stage data mining
approaches to mine both image features and policies together. Recall that when a
user uploads a new image, the user is waiting for a recommended policy. The two-
stage approach allows the system to employ the first stage to classify the new
image and find the candidate sets of images for the subsequent policy
recommendation. As for the one-stage mining approach, it would not be able to
locate the right class of the new image because its classification criteria needs both
image features and policies whereas the policies of the new image are not available
yet. Moreover, combining both image features and policies into a single classifier
would lead to a system which is very dependent to the specific syntax of the
policy. If a change in the supported policies were to be introduced, the whole
learning model would need to change.
Module 2
Image Classification
To obtain groups of images that may be associated with similar privacy
preferences, we propose a hierarchical image classification which classifies images
first based on their contents and then refine each category into subcategories based
on their metadata. Images that do not have metadata will be grouped only by
content. Such a hierarchical classification gives a higher priority to image content
and minimizes the influence of missing tags. Note that it is possible that some
images are included in multiple categories as long as they contain the typical
content features or metadata of those categories. The content-based classification
creates two categories: “landscape” and “kid”. Images C, D, E and F are included
in both categories as they show kids playing outdoor which satisfy the two themes:
“landscape” and “kid”. These two categories are further divided into subcategories
based on tags associated with the images. As a result, we obtain two subcategories
under each theme respectively. Notice that image G is not shown in any
subcategory as it does not have any tag; image A shows up in both subcategories
because it has tags indicating both “beach” and “wood”.
Module 3
PolicyMining
We propose a hierarchical mining approach for policy mining. Our approach
leverages association rule mining techniques to discover popular patterns in
policies. Policy mining is carried out within the same category of the new image
because images in the same category are more likely under the similar level of
privacy protection. The basic idea of the hierarchical mining is to follow a natural
order in which a user defines a policy. Given an image, a user usually first decides
who can access the image, then thinks about what specific access rights (e.g., view
only or download) should be given, and finally refine the access conditions such as
setting the expiration date. Correspondingly, the hierarchical mining first look for
popular subjects defined by the user, then look for popular actions in the policies
containing the popular subjects, and finally for popular conditions in the policies
containing bothpopular subjects and conditions.
_ Step 1: In the same category of the new image, conduct association rule mining
on the subject component of polices. Let S1, S2; . . ., denote the subjects occurring
in policies. Each resultant rule is an implication of the form X ) Y, where X, Y _
fS1, S2; . . . ; g, and X  Y ¼ ;. Among the obtained rules, we select the best rules
according to one of the interestingness measures, i.e., the generality of the rule,
defined using support and confidence as introduced in [16]. The selected rules
indicate the most popular subjects (i.e., single subject) or subject combinations
(i.e., multiple subjects) in policies. In the subsequent steps, we consider policies
which contain at least one subject in the selected rules. For clarity, we denote the
set of such policies as Gsub i corresponding to a selected rule Rsub i .
_ Step 2: In each policy set Gsub i , we now conduct association rule mining on the
action component. The result will be a set of association rules in the form of X ) Y,
where X, Y _fopen, comment, tag, downloadg, and X  Y ¼ ;. Similar to the first
step, we will select the best rules according to the generality interestingness. This
time, the selected rules indicate the most popular combination of actions in policies
with respect to each particular subject or subject combination. Policies which do
not contain any action included in the selected rules will be removed. Given a
selected rule Ract j we denote the set of remaining policies as Gact j , and note that
Gact j _ Gsub
_ Step 3: We proceed to mine the condition component in each policy set Gact j .
Let attr1, attr2, ..., attrn denote the distinct attributes in the condition component of
the policies in Gact j . The association rules are in the same format of X ) Y but
with X, Y _fattr1, attr2; . . . ; attrng. Once the rules are obtained, we again select
the best rules using the generality interestingness measure. The selected rules give
us a set of attributes which often appear in policies. Similarly, we denote the
policies containing at least one attribute in the selected rule Rcon k as Gcon k and
Gconk _ Gact j
_ Step 4: This step is to generate candidate policies. Given Gcon k _ Gact j _ Gsub
i , we consider each corresponding series of best rules: Rcon kx , Ract jy and Rsub
iz . Candidate policies are required to possess all elements in Rcon kx , Ract jy and
Rsub iz Note that candidate policies may be different from the policies as result of
Step 3. This is because Step 3 will keep policies as long as they have one of the
attributes in the selected rules.
Module 4
A3P-SOCIAL
The A3P-social employs a multi-criteria inference mechanism that generates
representative policies by leveraging key information related to the user’s social
context and his general attitude toward privacy. As mentioned earlier, A3Psocial
will be invoked by the A3P-core in two scenarios. One is when the user is a newbie
of a site, and does not have enough images stored for the A3P-core to infer
meaningful and customized policies. The other is when the system notices
significant changes of privacy trend in the user’s social circle, which may be of
interest for the user to possibly adjust his/her privacy settings accordingly. In what
follows, we first present the types of social context considered by A3P-Social, and
then present the policy recommendation process.
CONCLUSION:
We have proposed an Adaptive Privacy Policy Prediction (A3P) system that helps
users automate the privacy policy
settings for their uploaded images. The A3P system provides a comprehensive
framework to infer privacy preferences based on the information available for a
given user. We also effectively tackled the issue of cold-start, leveraging social
context information. Our experimental study proves that our A3P is a practical tool
that offers significant improvements over current approaches to privacy.
REFERENCES
[1] A. Acquisti and R. Gross, “Imagined communities: Awareness, information
sharing, and privacy on the facebook,” in Proc. 6th Int. Conf. Privacy Enhancing
Technol. Workshop, 2006, pp. 36–58.
[2] R. Agrawal and R. Srikant,“Fast algorithms for mining association rules in
large databases,” in Proc. 20th Int. Conf. Very Large Data Bases, 1994, pp. 487–
499.
[3] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, “Over-
exposed?: Privacy patterns and considerations in online and mobile photo sharing,”
in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 357–366.
[4] M. Ames and M. Naaman, “Why we tag: Motivations for annotation in mobile
and online media,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 971–
980.
[5] A. Besmer and H. Lipford, “Tagged photos: Concerns, perceptions, and
protections,” in Proc. 27th Int. Conf. Extended Abstracts Human Factors Comput.
Syst., 2009, pp. 4585–4590.
[6] D. G. Altman and J. M. Bland ,“Multiple significance tests: The bonferroni
method,” Brit. Med. J., vol. 310, no. 6973, 1995.
[7] J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for
social networks,” in Proc. Symp. Usable Privacy Security, 2009.
[8] J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,”
in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining., 2009, pp.249–254.
[9] H.-M. Chen, M.-H. Chang, P.-C. Chang, M.-C. Tien, W. H. Hsu, and J.-L. Wu,
“Sheepdog: Group and tag recommendation for flickr photos by automatic search-
based learning,” in Proc. 16th ACM Int. Conf. Multimedia, 2008, pp. 737–740.
[10] M. D. Choudhury, H. Sundaram, Y.-R. Lin, A. John, and D. D. Seligmann,
“Connecting content to community in social media via image content, user tags
and user communication,” in Proc. IEEE Int. Conf. Multimedia Expo, 2009,
pp.1238–1241.
[11] L. Church, J. Anderson, J. Bonneau, and F. Stajano, “Privacy stories:
Confidence on privacy behaviors through end user programming,” in Proc. 5th
Symp. Usable Privacy Security, 2009.
[12] R. da Silva Torres and A. Falc~ao, “Content-based image retrieval: Theory
and applications,” Revista de Inform_atica Te_orica e Aplicada, vol. 2, no. 13, pp.
161–185, 2006

More Related Content

What's hot

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites1crore projects
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESShakas Technologies
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingIOSR Journals
 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...IJMTST Journal
 
Tag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationTag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationeSAT Publishing House
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadedShakas Technologies
 
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKINGTAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKINGNexgen Technology
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)IJERD Editor
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)IOSR Journals
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED
 
FIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemFIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemIJTET Journal
 
oneslider_template_ACS [532226]
oneslider_template_ACS [532226]oneslider_template_ACS [532226]
oneslider_template_ACS [532226]Anastasia Nimets
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networkseditorjournal
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...ijsptm
 
Collaborative filtering
Collaborative filteringCollaborative filtering
Collaborative filteringNeha Kulkarni
 
Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...CloudTechnologies
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...IJMTST Journal
 
Analysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMAnalysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMIJERA Editor
 

What's hot (18)

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
 
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITESPRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
 
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust ModellingDetecting Spam Tags Against Collaborative Unfair Through Trust Modelling
Detecting Spam Tags Against Collaborative Unfair Through Trust Modelling
 
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
 
Tag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotationTag based image retrieval (tbir) using automatic image annotation
Tag based image retrieval (tbir) using automatic image annotation
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKINGTAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
TAG BASED IMAGE SEARCH BY SOCIAL RE-RANKING
 
International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)International Journal of Engineering Research and Development (IJERD)
International Journal of Engineering Research and Development (IJERD)
 
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
 
IJSRED-V2I2P09
IJSRED-V2I2P09IJSRED-V2I2P09
IJSRED-V2I2P09
 
FIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation SystemFIND MY VENUE: Content & Review Based Location Recommendation System
FIND MY VENUE: Content & Review Based Location Recommendation System
 
oneslider_template_ACS [532226]
oneslider_template_ACS [532226]oneslider_template_ACS [532226]
oneslider_template_ACS [532226]
 
Identification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social NetworksIdentification of inference attacks on private Information from Social Networks
Identification of inference attacks on private Information from Social Networks
 
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
 
Collaborative filtering
Collaborative filteringCollaborative filtering
Collaborative filtering
 
Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...Service rating prediction by exploring social mobile users’ geographical loca...
Service rating prediction by exploring social mobile users’ geographical loca...
 
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
Alluding Communities in Social Networking Websites using Enhanced Quasi-cliqu...
 
Analysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMMAnalysis on Recommended System for Web Information Retrieval Using HMM
Analysis on Recommended System for Web Information Retrieval Using HMM
 

Viewers also liked

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...Nexgen Technology
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadednexgentech15
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersLeMeniz Infotech
 
05. Барацьба з крыжацкай агрэсіяй
05. Барацьба з крыжацкай агрэсіяй05. Барацьба з крыжацкай агрэсіяй
05. Барацьба з крыжацкай агрэсіяйAnastasiyaF
 
Esquema comparativo entre windows, linux, android
Esquema comparativo entre windows, linux, androidEsquema comparativo entre windows, linux, android
Esquema comparativo entre windows, linux, androidshendry jaramillo
 
laundry catalog..compressed
laundry catalog..compressedlaundry catalog..compressed
laundry catalog..compressedBecky Jiang
 
The Best Restaurants in Denver
The Best Restaurants in DenverThe Best Restaurants in Denver
The Best Restaurants in Denver49ThingstoDo
 
عروض عيد ميلاد كارفور
عروض عيد ميلاد كارفورعروض عيد ميلاد كارفور
عروض عيد ميلاد كارفورNour Elbader
 
Discovering Key Moments from Social Media Streams
Discovering Key Moments from Social Media StreamsDiscovering Key Moments from Social Media Streams
Discovering Key Moments from Social Media StreamsCody Buntain
 

Viewers also liked (13)

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES - I...
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Privacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile usersPrivacy preserving relative location based services for mobile users
Privacy preserving relative location based services for mobile users
 
05. Барацьба з крыжацкай агрэсіяй
05. Барацьба з крыжацкай агрэсіяй05. Барацьба з крыжацкай агрэсіяй
05. Барацьба з крыжацкай агрэсіяй
 
Esquema comparativo entre windows, linux, android
Esquema comparativo entre windows, linux, androidEsquema comparativo entre windows, linux, android
Esquema comparativo entre windows, linux, android
 
كارفور
كارفوركارفور
كارفور
 
laundry catalog..compressed
laundry catalog..compressedlaundry catalog..compressed
laundry catalog..compressed
 
The Best Restaurants in Denver
The Best Restaurants in DenverThe Best Restaurants in Denver
The Best Restaurants in Denver
 
Geografía humana
Geografía humanaGeografía humana
Geografía humana
 
عروض عيد ميلاد كارفور
عروض عيد ميلاد كارفورعروض عيد ميلاد كارفور
عروض عيد ميلاد كارفور
 
Discovering Key Moments from Social Media Streams
Discovering Key Moments from Social Media StreamsDiscovering Key Moments from Social Media Streams
Discovering Key Moments from Social Media Streams
 
State life
State lifeState life
State life
 
La interfaz
La interfazLa interfaz
La interfaz
 

Similar to PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites1crore projects
 
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingAdaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingIOSR Journals
 
Image Tagging With Social Assistance
Image Tagging With Social AssistanceImage Tagging With Social Assistance
Image Tagging With Social Assistanceijtsrd
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaIRJET Journal
 
Social Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image SearchSocial Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image SearchIRJET Journal
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...rahulmonikasharma
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesIRJET Journal
 
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...IJERA Editor
 
Personalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed imagesPersonalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed imageseSAT Journals
 
Running head DEPRESSION PREDICTION DRAFT1DEPRESSION PREDICTI.docx
Running head DEPRESSION PREDICTION DRAFT1DEPRESSION PREDICTI.docxRunning head DEPRESSION PREDICTION DRAFT1DEPRESSION PREDICTI.docx
Running head DEPRESSION PREDICTION DRAFT1DEPRESSION PREDICTI.docxhealdkathaleen
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksIRJET Journal
 
Using content features to enhance the
Using content features to enhance theUsing content features to enhance the
Using content features to enhance theijaia
 
Optimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing WebsitesOptimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing Websitesijceronline
 
IRJET- Fusion Method for Image Reranking and Similarity Finding based on Topi...
IRJET- Fusion Method for Image Reranking and Similarity Finding based on Topi...IRJET- Fusion Method for Image Reranking and Similarity Finding based on Topi...
IRJET- Fusion Method for Image Reranking and Similarity Finding based on Topi...IRJET Journal
 
Using user personalized ontological profile to infer semantic knowledge for p...
Using user personalized ontological profile to infer semantic knowledge for p...Using user personalized ontological profile to infer semantic knowledge for p...
Using user personalized ontological profile to infer semantic knowledge for p...Joao Luis Tavares
 
benchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social mediabenchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social mediaVenkat Projects
 

Similar to PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES (20)

Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing SitesPrivacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
 
Adaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social NetworkingAdaptive Search Based On User Tags in Social Networking
Adaptive Search Based On User Tags in Social Networking
 
Ijetr042330
Ijetr042330Ijetr042330
Ijetr042330
 
Image Tagging With Social Assistance
Image Tagging With Social AssistanceImage Tagging With Social Assistance
Image Tagging With Social Assistance
 
Detecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social MediaDetecting and Providing Solutions to Privacy Issues in Social Media
Detecting and Providing Solutions to Privacy Issues in Social Media
 
Bn35364376
Bn35364376Bn35364376
Bn35364376
 
Social Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image SearchSocial Re-Ranking using Tag Based Image Search
Social Re-Ranking using Tag Based Image Search
 
Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...Implementation of Privacy Policy Specification System for User Uploaded Image...
Implementation of Privacy Policy Specification System for User Uploaded Image...
 
A Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social ImagesA Survey On Privacy Policy Inference for Social Images
A Survey On Privacy Policy Inference for Social Images
 
T0 numtq0njc=
T0 numtq0njc=T0 numtq0njc=
T0 numtq0njc=
 
Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...Socially Shared Images with Automated Annotation Process by Using Improved Us...
Socially Shared Images with Automated Annotation Process by Using Improved Us...
 
Personalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed imagesPersonalized geo tag recommendation for community contributed images
Personalized geo tag recommendation for community contributed images
 
Running head DEPRESSION PREDICTION DRAFT1DEPRESSION PREDICTI.docx
Running head DEPRESSION PREDICTION DRAFT1DEPRESSION PREDICTI.docxRunning head DEPRESSION PREDICTION DRAFT1DEPRESSION PREDICTI.docx
Running head DEPRESSION PREDICTION DRAFT1DEPRESSION PREDICTI.docx
 
A Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social NetworksA Survey on Multi-party Privacy Disputes in Social Networks
A Survey on Multi-party Privacy Disputes in Social Networks
 
Using content features to enhance the
Using content features to enhance theUsing content features to enhance the
Using content features to enhance the
 
Rae
RaeRae
Rae
 
Optimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing WebsitesOptimization of Image Search from Photo Sharing Websites
Optimization of Image Search from Photo Sharing Websites
 
IRJET- Fusion Method for Image Reranking and Similarity Finding based on Topi...
IRJET- Fusion Method for Image Reranking and Similarity Finding based on Topi...IRJET- Fusion Method for Image Reranking and Similarity Finding based on Topi...
IRJET- Fusion Method for Image Reranking and Similarity Finding based on Topi...
 
Using user personalized ontological profile to infer semantic knowledge for p...
Using user personalized ontological profile to infer semantic knowledge for p...Using user personalized ontological profile to infer semantic knowledge for p...
Using user personalized ontological profile to infer semantic knowledge for p...
 
benchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social mediabenchmarking image retrieval diversification techniques for social media
benchmarking image retrieval diversification techniques for social media
 

Recently uploaded

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppCeline George
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfUmakantAnnand
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxSayali Powar
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)eniolaolutunde
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesFatimaKhan178732
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Krashi Coaching
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxRoyAbrique
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3JemimahLaneBuaron
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon AUnboundStockton
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptxPoojaSen20
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptxVS Mahajan Coaching Centre
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxGaneshChakor2
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxOH TEIK BIN
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 

Recently uploaded (20)

Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
URLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website AppURLs and Routing in the Odoo 17 Website App
URLs and Routing in the Odoo 17 Website App
 
Concept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.CompdfConcept of Vouching. B.Com(Hons) /B.Compdf
Concept of Vouching. B.Com(Hons) /B.Compdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptxPOINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
POINT- BIOCHEMISTRY SEM 2 ENZYMES UNIT 5.pptx
 
Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)Software Engineering Methodologies (overview)
Software Engineering Methodologies (overview)
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Separation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and ActinidesSeparation of Lanthanides/ Lanthanides and Actinides
Separation of Lanthanides/ Lanthanides and Actinides
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
Kisan Call Centre - To harness potential of ICT in Agriculture by answer farm...
 
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptxContemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
Contemporary philippine arts from the regions_PPT_Module_12 [Autosaved] (1).pptx
 
Staff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSDStaff of Color (SOC) Retention Efforts DDSD
Staff of Color (SOC) Retention Efforts DDSD
 
Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3Q4-W6-Restating Informational Text Grade 3
Q4-W6-Restating Informational Text Grade 3
 
Crayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon ACrayon Activity Handout For the Crayon A
Crayon Activity Handout For the Crayon A
 
PSYCHIATRIC History collection FORMAT.pptx
PSYCHIATRIC   History collection FORMAT.pptxPSYCHIATRIC   History collection FORMAT.pptx
PSYCHIATRIC History collection FORMAT.pptx
 
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions  for the students and aspirants of Chemistry12th.pptxOrganic Name Reactions  for the students and aspirants of Chemistry12th.pptx
Organic Name Reactions for the students and aspirants of Chemistry12th.pptx
 
CARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptxCARE OF CHILD IN INCUBATOR..........pptx
CARE OF CHILD IN INCUBATOR..........pptx
 
Solving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptxSolving Puzzles Benefits Everyone (English).pptx
Solving Puzzles Benefits Everyone (English).pptx
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 

PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES

  • 1. PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES Abstract—With the increasing volume of images users share through social sites, maintaining privacy has become a major problem, as demonstrated by a recent wave of publicized incidents where users inadvertently shared personal information. In light of these incidents, the need of tools to help users control access to their shared content is apparent. Toward addressing this need, we propose an Adaptive Privacy Policy Prediction (A3P) system to help users compose privacy settings for their images. We examine the role of social context, image content, and metadata as possible indicators of users’ privacy preferences. We propose a two- level framework which according to the user’s available history on the site, determines the best available privacy policy for the user’s images being uploaded. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users’ social features. Over time, the generated policies will follow the evolution of users’ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent.
  • 2. EXISTING SYSTEM: Several recent works have studied how to automate the task of privacy settings Bonneau et al. proposed the concept of privacy suites which recommend to users a suite of privacy settings that n“expert” users or other trusted friends have already set, so that normal users can either directly choose a setting or only need to do minor modification. Similarly, Danezis proposed a machine-learning based approach to automatically extract privacy settings from the social context within which the data is produced. Parallel to the work of Danezis, Adu-Oppong et al. develop privacy settings based on a concept of “Social Circles” which consist of clusters of friends formed by partitioning users’ friend lists. Ravichandran et al. studied how to predict a user’s privacy preferences for location-based data (i.e., share her location or not) based on location and time of day. Fang et al. proposed a privacy wizard to help users grant privileges to their friends. The wizard asks users to first assign privacy labels to selected friends, and then uses this as input to construct a classifier which classifies friends based on their profiles and automatically assign privacy labels to the unlabeled friends. More recently, Klemperer et al. studied whether the keywords and captions with which users tag their photos can be used to help users more intuitively create and maintain access-
  • 3. control policies. Their findings are inline with our approach: tags created for organizational purposes can be repurposed to help create reasonably accurate access-controlrules. PROPOSED SYSTEM: We propose an Adaptive Privacy Policy Prediction (A3P) system which aims to provide users a hassle free privacy settings experience by automatically generating personalized policies. The A3P system handles user uploaded images, and factors in the following criteria that influence one’s privacy settings of images: The impact of social environment and personal characteristics. Social context of users, such as their profile information and relationships with others may provide useful information regarding users’ privacy preferences. For example, users interested in photography may like to share their photos with other amateur photographers. Users who have several family members among their social contacts may share with them pictures related to family events. However, using common policies across all users or across users with similar traits may be too simplistic and not satisfy individual preferences. Users may have drastically different opinions even on the same type of images. For example, a privacy adverse person may be willing to share all his personal images while a more conservative person may just want to
  • 4. share personal images with his family members. In light of these considerations, it is important to find the balancing point between the impact of social environment and users’ individual characteristics in order to predict the policies that match each individual’s needs. Moreover, individuals may change their overall attitude toward privacy as time passes. In order to develop a personalized policy recommendation system, such changes on privacy opinions should be carefully considered. The role of image’s content and metadata. In general, similar images often incur similar privacy preferences, especially when people appear in the images. For example, one may upload several photos of his kids and specify that only his family members are allowed to see these photos. He may upload some other photos of landscapes which he took as a hobby and for these photos, he may set privacy preference allowing anyone to view and comment the photos. Analyzing the visual content may not be sufficient to capture users’ privacy preferences. Tags and other metadata are indicative of the social context of the image, including where it was taken and why , and also provide a synthetic description of images, complementing the information obtained from visual content analysis.
  • 5. Module 1 A3P-CORE There are two major components in A3P-core: (i) Image classification and (ii) Adaptive policy prediction. For each user, his/her images are first classified based on content and metadata. Then, privacy policies of each category of images are analyzed for the policy prediction. Adopting a two-stage approach is more suitable for policy recommendation than applying the common one-stage data mining approaches to mine both image features and policies together. Recall that when a user uploads a new image, the user is waiting for a recommended policy. The two- stage approach allows the system to employ the first stage to classify the new image and find the candidate sets of images for the subsequent policy recommendation. As for the one-stage mining approach, it would not be able to locate the right class of the new image because its classification criteria needs both image features and policies whereas the policies of the new image are not available yet. Moreover, combining both image features and policies into a single classifier would lead to a system which is very dependent to the specific syntax of the policy. If a change in the supported policies were to be introduced, the whole learning model would need to change. Module 2
  • 6. Image Classification To obtain groups of images that may be associated with similar privacy preferences, we propose a hierarchical image classification which classifies images first based on their contents and then refine each category into subcategories based on their metadata. Images that do not have metadata will be grouped only by content. Such a hierarchical classification gives a higher priority to image content and minimizes the influence of missing tags. Note that it is possible that some images are included in multiple categories as long as they contain the typical content features or metadata of those categories. The content-based classification creates two categories: “landscape” and “kid”. Images C, D, E and F are included in both categories as they show kids playing outdoor which satisfy the two themes: “landscape” and “kid”. These two categories are further divided into subcategories based on tags associated with the images. As a result, we obtain two subcategories under each theme respectively. Notice that image G is not shown in any subcategory as it does not have any tag; image A shows up in both subcategories because it has tags indicating both “beach” and “wood”. Module 3 PolicyMining
  • 7. We propose a hierarchical mining approach for policy mining. Our approach leverages association rule mining techniques to discover popular patterns in policies. Policy mining is carried out within the same category of the new image because images in the same category are more likely under the similar level of privacy protection. The basic idea of the hierarchical mining is to follow a natural order in which a user defines a policy. Given an image, a user usually first decides who can access the image, then thinks about what specific access rights (e.g., view only or download) should be given, and finally refine the access conditions such as setting the expiration date. Correspondingly, the hierarchical mining first look for popular subjects defined by the user, then look for popular actions in the policies containing the popular subjects, and finally for popular conditions in the policies containing bothpopular subjects and conditions. _ Step 1: In the same category of the new image, conduct association rule mining on the subject component of polices. Let S1, S2; . . ., denote the subjects occurring in policies. Each resultant rule is an implication of the form X ) Y, where X, Y _ fS1, S2; . . . ; g, and X Y ¼ ;. Among the obtained rules, we select the best rules according to one of the interestingness measures, i.e., the generality of the rule, defined using support and confidence as introduced in [16]. The selected rules indicate the most popular subjects (i.e., single subject) or subject combinations (i.e., multiple subjects) in policies. In the subsequent steps, we consider policies
  • 8. which contain at least one subject in the selected rules. For clarity, we denote the set of such policies as Gsub i corresponding to a selected rule Rsub i . _ Step 2: In each policy set Gsub i , we now conduct association rule mining on the action component. The result will be a set of association rules in the form of X ) Y, where X, Y _fopen, comment, tag, downloadg, and X Y ¼ ;. Similar to the first step, we will select the best rules according to the generality interestingness. This time, the selected rules indicate the most popular combination of actions in policies with respect to each particular subject or subject combination. Policies which do not contain any action included in the selected rules will be removed. Given a selected rule Ract j we denote the set of remaining policies as Gact j , and note that Gact j _ Gsub _ Step 3: We proceed to mine the condition component in each policy set Gact j . Let attr1, attr2, ..., attrn denote the distinct attributes in the condition component of the policies in Gact j . The association rules are in the same format of X ) Y but with X, Y _fattr1, attr2; . . . ; attrng. Once the rules are obtained, we again select the best rules using the generality interestingness measure. The selected rules give us a set of attributes which often appear in policies. Similarly, we denote the policies containing at least one attribute in the selected rule Rcon k as Gcon k and Gconk _ Gact j
  • 9. _ Step 4: This step is to generate candidate policies. Given Gcon k _ Gact j _ Gsub i , we consider each corresponding series of best rules: Rcon kx , Ract jy and Rsub iz . Candidate policies are required to possess all elements in Rcon kx , Ract jy and Rsub iz Note that candidate policies may be different from the policies as result of Step 3. This is because Step 3 will keep policies as long as they have one of the attributes in the selected rules. Module 4 A3P-SOCIAL The A3P-social employs a multi-criteria inference mechanism that generates representative policies by leveraging key information related to the user’s social context and his general attitude toward privacy. As mentioned earlier, A3Psocial will be invoked by the A3P-core in two scenarios. One is when the user is a newbie of a site, and does not have enough images stored for the A3P-core to infer meaningful and customized policies. The other is when the system notices significant changes of privacy trend in the user’s social circle, which may be of interest for the user to possibly adjust his/her privacy settings accordingly. In what follows, we first present the types of social context considered by A3P-Social, and then present the policy recommendation process. CONCLUSION:
  • 10. We have proposed an Adaptive Privacy Policy Prediction (A3P) system that helps users automate the privacy policy settings for their uploaded images. The A3P system provides a comprehensive framework to infer privacy preferences based on the information available for a given user. We also effectively tackled the issue of cold-start, leveraging social context information. Our experimental study proves that our A3P is a practical tool that offers significant improvements over current approaches to privacy. REFERENCES [1] A. Acquisti and R. Gross, “Imagined communities: Awareness, information sharing, and privacy on the facebook,” in Proc. 6th Int. Conf. Privacy Enhancing Technol. Workshop, 2006, pp. 36–58. [2] R. Agrawal and R. Srikant,“Fast algorithms for mining association rules in large databases,” in Proc. 20th Int. Conf. Very Large Data Bases, 1994, pp. 487– 499.
  • 11. [3] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, “Over- exposed?: Privacy patterns and considerations in online and mobile photo sharing,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 357–366. [4] M. Ames and M. Naaman, “Why we tag: Motivations for annotation in mobile and online media,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 971– 980. [5] A. Besmer and H. Lipford, “Tagged photos: Concerns, perceptions, and protections,” in Proc. 27th Int. Conf. Extended Abstracts Human Factors Comput. Syst., 2009, pp. 4585–4590. [6] D. G. Altman and J. M. Bland ,“Multiple significance tests: The bonferroni method,” Brit. Med. J., vol. 310, no. 6973, 1995. [7] J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security, 2009. [8] J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,” in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining., 2009, pp.249–254. [9] H.-M. Chen, M.-H. Chang, P.-C. Chang, M.-C. Tien, W. H. Hsu, and J.-L. Wu, “Sheepdog: Group and tag recommendation for flickr photos by automatic search- based learning,” in Proc. 16th ACM Int. Conf. Multimedia, 2008, pp. 737–740. [10] M. D. Choudhury, H. Sundaram, Y.-R. Lin, A. John, and D. D. Seligmann, “Connecting content to community in social media via image content, user tags
  • 12. and user communication,” in Proc. IEEE Int. Conf. Multimedia Expo, 2009, pp.1238–1241. [11] L. Church, J. Anderson, J. Bonneau, and F. Stajano, “Privacy stories: Confidence on privacy behaviors through end user programming,” in Proc. 5th Symp. Usable Privacy Security, 2009. [12] R. da Silva Torres and A. Falc~ao, “Content-based image retrieval: Theory and applications,” Revista de Inform_atica Te_orica e Aplicada, vol. 2, no. 13, pp. 161–185, 2006