skip to main content
10.1145/2668260.2668280acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
tutorial

MOP: A Privacy Preserving Model for Multimedia Objects

Authors Info & Claims
Published:15 September 2014Publication History

ABSTRACT

Recently, multimedia and internet technologies have been in rapid development. Multimedia objects, such as images, video, audio tracks and multimedia documents, have been widely used and are in remarkable growth. Almost everyone on social network publishes or has some multimedia objects stored somewhere. Although multimedia objects are of different types, they can be treated as one entity when it comes to privacy which is our concern in this paper. Many researchers tried to apply some security on multimedia objects. In this work we aim to provide a model to protect multimedia objects from being accessed or altered by unwanted personnel.

References

  1. Jackson, D. 2002. D. Jackson. Alloy: a lightweight object modeling notation. ACM Transaction on Software Engineering and Methodology (TOSEM), 11(2):256--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Aïmeur, E., Gambs, S., & Ho, A. 2009. UPP: user privacy policy for social networking sites. In Proceedings of the IEEE Fourth International Conference Internet and Web Applications and Services, (ICIW '09), 267-- 272. Montreal, QC, 267--272. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Al Bouna, B., Raad, E. j., Elia, C., Chbeir, R., & Haraty, R. 2013. de-Linkability: a privacy-preserving constraint for safely outsourcing multimedia documents. In Proceedings of the International ACM Conference on Management of Emergent Digital EcoSystems (MEDES 2013). Neumunster Abbey, Luxembourg. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Joshi, J., Aref, W., Ghafoor, A., & Spafford, E. 2001. Security models for web-based applications. Communications of the ACM, (Feb. 2001), 38--44. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Joshi, J. B., Kevin Li, Z., Fahmi, H., Shafiq, B., & Ghafoor, A. 2002. A model for secure multimedia document database system in a distributed environment. IEEE Transactions on Multimedia, volume 4, issue 2, 215--234. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Kodali, N., Farkas, C., & Wijesekera, D. 2004. An authorization model for multimedia digital libraries. International Journal on Digital Libraries, 4: / Digital Object Identifier (DOI) 10.1007/s00799-004-0080-1, 139--155. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Hangzai Luo, J. F., Hacid, M., & Bertino, E. 2005. A novel approach for privacy-preserving video sharing. In Proceedings of the CIKM Confernece, Bremen, Germany, 609--616. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Lian, S., Kanellopoulos, D., & Ruffo, G. 2009. Recent advances in multimedia information system security. Informatica 33, 3--24.Google ScholarGoogle Scholar
  9. Ridzon, R., & Levicky, D. 2009. Multimedia security and multimedia content protection. In Proceedings of the International Symposium ELMAR, Zadar, Croatia, 104--109.Google ScholarGoogle Scholar
  10. Al Bouna, B., Chbeir, R., & Marrara, S. 2009. Enforcing role based access control model with multimedia signatures. Journal of Systems Architecture, volume 55, issue 4, 264--274. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Al Bouna, B., Chbeir, R., & Gabillon, A. 2011. The image protector: a flexible security rule specification toolkit. In Proceedings of the International Conference on Security and Cryptography. Seville, Spain.Google ScholarGoogle Scholar
  12. Saad, S., Al Bouna, B., & Chbeir, R. 2011. Privacy preserving via tree augmented naive Bayesian classifier in multimedia databases. In Proceedings of the ACM Conference on Management of Emergent Digital EcoSystems (MEDES 2011), San Francisco, USA, 297--204. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Ben Dhia, I., Abdessalem, T., & Sozio, M. 2012. Primates: A privacy management system for social networks. In Proceedings of the ACM CIKM'12 Conference, Maui, HI, USA, 2746--2749. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Zhuo, L., Diao, M., Zhang, J., & Li, Z. 2013. Hierarchical privacy preservation for personalized image retrieval. In Proceedings of the ACM ICIMCS Conference, Huangshan, Anhui, China, 291--295. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. Netscape. (1998, June 5). DMOZ. Retrieved April 20, 2014, from wikipedia: http://en.wikipedia.org/wiki/DMOZ.Google ScholarGoogle Scholar
  16. Panda, B., Perrizo, W., & Haraty, R. A. 1994. Secure transaction management and query processing in multilevel secure database systems. In Proceedings of the ACM Symposium on Applied Computing. Phoenix, AZ, USA, 363--368. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Haraty, R. A., & Massalkhy, S. 2013. UPP+: A flexible user privacy policy for social networking services. Security and Privacy Preserving in Social Networks. Springer-Verlag Wien. ISBN 978-3-7091-0893-2.Google ScholarGoogle Scholar
  18. Haraty, R. A., Naous, M., & Mourad, A. 2014. Assuring Consistency in Mixed Models. Journal of Computational Science. ISSN: 1877 - 7503. 10.1016/j.jocs.2014.02.009, 653--663.Google ScholarGoogle Scholar

Index Terms

  1. MOP: A Privacy Preserving Model for Multimedia Objects

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      MEDES '14: Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems
      September 2014
      225 pages
      ISBN:9781450327671
      DOI:10.1145/2668260

      Copyright © 2014 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 15 September 2014

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • tutorial
      • Research
      • Refereed limited

      Acceptance Rates

      Overall Acceptance Rate267of682submissions,39%
    • Article Metrics

      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0

      Other Metrics

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader