ABSTRACT
Recently, multimedia and internet technologies have been in rapid development. Multimedia objects, such as images, video, audio tracks and multimedia documents, have been widely used and are in remarkable growth. Almost everyone on social network publishes or has some multimedia objects stored somewhere. Although multimedia objects are of different types, they can be treated as one entity when it comes to privacy which is our concern in this paper. Many researchers tried to apply some security on multimedia objects. In this work we aim to provide a model to protect multimedia objects from being accessed or altered by unwanted personnel.
- Jackson, D. 2002. D. Jackson. Alloy: a lightweight object modeling notation. ACM Transaction on Software Engineering and Methodology (TOSEM), 11(2):256--290. Google ScholarDigital Library
- Aïmeur, E., Gambs, S., & Ho, A. 2009. UPP: user privacy policy for social networking sites. In Proceedings of the IEEE Fourth International Conference Internet and Web Applications and Services, (ICIW '09), 267-- 272. Montreal, QC, 267--272. Google ScholarDigital Library
- Al Bouna, B., Raad, E. j., Elia, C., Chbeir, R., & Haraty, R. 2013. de-Linkability: a privacy-preserving constraint for safely outsourcing multimedia documents. In Proceedings of the International ACM Conference on Management of Emergent Digital EcoSystems (MEDES 2013). Neumunster Abbey, Luxembourg. Google ScholarDigital Library
- Joshi, J., Aref, W., Ghafoor, A., & Spafford, E. 2001. Security models for web-based applications. Communications of the ACM, (Feb. 2001), 38--44. Google ScholarDigital Library
- Joshi, J. B., Kevin Li, Z., Fahmi, H., Shafiq, B., & Ghafoor, A. 2002. A model for secure multimedia document database system in a distributed environment. IEEE Transactions on Multimedia, volume 4, issue 2, 215--234. Google ScholarDigital Library
- Kodali, N., Farkas, C., & Wijesekera, D. 2004. An authorization model for multimedia digital libraries. International Journal on Digital Libraries, 4: / Digital Object Identifier (DOI) 10.1007/s00799-004-0080-1, 139--155. Google ScholarDigital Library
- Hangzai Luo, J. F., Hacid, M., & Bertino, E. 2005. A novel approach for privacy-preserving video sharing. In Proceedings of the CIKM Confernece, Bremen, Germany, 609--616. Google ScholarDigital Library
- Lian, S., Kanellopoulos, D., & Ruffo, G. 2009. Recent advances in multimedia information system security. Informatica 33, 3--24.Google Scholar
- Ridzon, R., & Levicky, D. 2009. Multimedia security and multimedia content protection. In Proceedings of the International Symposium ELMAR, Zadar, Croatia, 104--109.Google Scholar
- Al Bouna, B., Chbeir, R., & Marrara, S. 2009. Enforcing role based access control model with multimedia signatures. Journal of Systems Architecture, volume 55, issue 4, 264--274. Google ScholarDigital Library
- Al Bouna, B., Chbeir, R., & Gabillon, A. 2011. The image protector: a flexible security rule specification toolkit. In Proceedings of the International Conference on Security and Cryptography. Seville, Spain.Google Scholar
- Saad, S., Al Bouna, B., & Chbeir, R. 2011. Privacy preserving via tree augmented naive Bayesian classifier in multimedia databases. In Proceedings of the ACM Conference on Management of Emergent Digital EcoSystems (MEDES 2011), San Francisco, USA, 297--204. Google ScholarDigital Library
- Ben Dhia, I., Abdessalem, T., & Sozio, M. 2012. Primates: A privacy management system for social networks. In Proceedings of the ACM CIKM'12 Conference, Maui, HI, USA, 2746--2749. Google ScholarDigital Library
- Zhuo, L., Diao, M., Zhang, J., & Li, Z. 2013. Hierarchical privacy preservation for personalized image retrieval. In Proceedings of the ACM ICIMCS Conference, Huangshan, Anhui, China, 291--295. Google ScholarDigital Library
- Netscape. (1998, June 5). DMOZ. Retrieved April 20, 2014, from wikipedia: http://en.wikipedia.org/wiki/DMOZ.Google Scholar
- Panda, B., Perrizo, W., & Haraty, R. A. 1994. Secure transaction management and query processing in multilevel secure database systems. In Proceedings of the ACM Symposium on Applied Computing. Phoenix, AZ, USA, 363--368. Google ScholarDigital Library
- Haraty, R. A., & Massalkhy, S. 2013. UPP+: A flexible user privacy policy for social networking services. Security and Privacy Preserving in Social Networks. Springer-Verlag Wien. ISBN 978-3-7091-0893-2.Google Scholar
- Haraty, R. A., Naous, M., & Mourad, A. 2014. Assuring Consistency in Mixed Models. Journal of Computational Science. ISSN: 1877 - 7503. 10.1016/j.jocs.2014.02.009, 653--663.Google Scholar
Index Terms
- MOP: A Privacy Preserving Model for Multimedia Objects
Recommendations
Data Protection in Healthcare Social Networks
Healthcare social networking sites (HSNSs) provide users with tools and services to easily establish contact with each other around shared problems and utilize the wisdom of crowds to attack disease. The increasing popularity of HSNSs has led to concern ...
Anti-cloning protocol suitable to EPCglobal Class-1 Generation-2 RFID systems
Radio frequency Identification (RFID) systems are used to identify remote objects equipped with RFID tags by wireless scanning without manual intervention. Recently, EPCglobal proposed the Electronic Product Code (EPC) that is a coding scheme considered ...
Graph publication when the protection algorithm is available
With the popularity of social networks, the privacy issues related with social network data become more and more important. The connection information between users, as well as their sensitive attributes, should be protected. There are some proposals ...
Comments