Policy Prediction and Image Search on Content Sharing Sites

Authors

  • George N Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India
  • Joseph N Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India
  • James MM Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India
  • Kurian SM Department of Computer Science & Engineering, Mangalam College of Engineering, Kerala, India

DOI:

https://doi.org/10.26438/ijcse/v7i1.961965

Keywords:

CHUI, NPK, A3P, Adaptive Policy

Abstract

Client can share their own data like pictures with different clients through satisfied sharing destinations. Tragically the security of transferred pictures in satisfied sharing site become a significant issue. To conquer this issue CHUI based Privacy Policy Prediction system and NPK for protection strategy based picture search are presented . CHUI ( Closed High Utility Itemsets) based Framework decides the best protection strategy for the transferred pictures and NPK (Non-Parametric Kernel) for picture search in secure way.

References

[1] Anna Cinzia Squicciarini , Dan Lin, Smitha Sundareswaran, and Joshua Wede , ‘Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites’ , IEEE Transactions On Knowledge And Data Engineering, Vol. 27, Issue. 1,2015 .

[2] Jinfeng Zhuang and Steven C.H. Hoi , ‘Non-parametric Kernel Ranking Approach for Social Image Retrieval ‘, pp.26-33,2010

[3] Cheng-Wei Wu, Philippe Fournier-Viger, Jia-Yuan Gu and Vincent S. Tseng1 , ‘Mining Closed+ High Utility Itemsets without Candidate Generation’ , ACM international conference on Information and knowledge management ,2016

[4] J. Bonneau , J. Anderson, and L. Church , ‘Privacy suites: Shared privacy for social networks’, in Proc. Symp.Usable Privacy Security 2009.

[5] J. Bonneau, J. Anderson, and G. Danezis, ‘Prying data out of a social network’ ,in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining.,pp.249–254 ,2009

[6] Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang , ’Social circles: Tackling privacy in social networks’, in Proc. Symp. Usable Privacy Security, 2008.

[7] R. Ravichandran , M. Benisch , P. Kelley, and N. Sadeh , ‘Capturing social networking privacy preferences’ , in Proc. Symp. Usable Privacy Security,Vol. 5672, 2009.

[8] P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, ‘Tag, you can see it!: Using tags for access control in photo sharing’, in Proc. ACM Annu. Conf. Human Factors Comput. Syst., pp. 377–386, 2012

[9] Sergej Zerr, Stefan Siersdorfer, Jonathon Hare and Elena Demidova , ‘I Know What You Did Last Summer!:Privacy-Aware Image Classification and Search’ , ACM SIGIR conference on Research and development in information retrieval, 2012.

[10] H. Lipford, A. Besmer, and J. Watson, ‘Understanding privacy settings in facebook with an audience view’, in Proc. Conf. Usability, Psychol., Security, 2008.

Downloads

Published

2019-01-31
CITATION
DOI: 10.26438/ijcse/v7i1.961965
Published: 2019-01-31

How to Cite

[1]
N. George, N. Joseph, M. M. James, and S. M. Kurian, “Policy Prediction and Image Search on Content Sharing Sites”, Int. J. Comp. Sci. Eng., vol. 7, no. 1, pp. 961–965, Jan. 2019.

Issue

Section

Research Article