You are on page 1of 6

Scientific Journal of Impact Factor (SJIF): 3.

134

E-ISSN (O): 2348-4470


P-ISSN (P): 2348-6406

International Journal of Advance Engineering and Research


Development
Volume 2,Issue 12,December -2015

Secure Photo Sharing on OSN


Nilesh Babu Maske1, Sainath Tukaram Zariwad2, Vijay Udhavrao Jogdand3, Prof. Kiran Somase4
1,2,3,4

Department Of Computer Engineering,Dr.D.Y.PatilCollege Of Engineering,Pimpari,Pune,

Abstract With the expanding volume of pictures clients offer through social locales, keeping up security has turned
into a noteworthy issue, as exhibited by a late flood of announced episodes where clients accidentally shared individual
data. In light of these episodes, the need of instruments to assist clients with controlling access to their common
substance is evident. Toward tending to this need, we propose an Adaptive Privacy Policy Prediction (A3P) framework to
assist clients with forming protection settings for their pictures. We inspect the part of social connection, picture
substance, and metadata as could be allowed pointers of clients' security inclinations. We propose a two-level system
which as per the client's accessible history on the site, decides the best accessible security arrangement for the client's
pictures being transferred. Our answer depends on a picture arrangement structure for picture classes which may be
connected with comparable strategies, furthermore, on a strategy expectation calculation to consequently create an
arrangement for each recently transferred picture, additionally as per clients' social components. After some time, the
created approaches will take after the development of clients' security mentality. We give the aftereffects of our broad
assessment more than 5,000 approaches, which show the adequacy of our framework, with forecast exactnesses more
than 90 percent.
Keywords- Online information services, web-based services,A3P,
I.

INTRODUCTION

Pictures are presently one of the key empowering influences of clients' network. Sharing happens both among
already settled gatherings of known individuals or social circles (e. g., Google+, Flickr or Picasa), furthermore
progressively with individuals outside the clients social circles, for purposes of social revelation to assist them with
recognizing new associates and find out about companions hobbies and social environment. Be that as it may,
semantically rich pictures may uncover content sensitive data. Consider a photograph of an under studies 2012
graduation ceremony, for instance. It could be shared inside of a Google+ circle or Flickr bunch, yet might superfluously
uncover the students BA pos family members and different companions. Sharing pictures inside online substance sharing
sites, therefore, may rapidly lead to undesirable exposure and protection violations,[1][2]. Further, the determined way of
online media makes it workable for different clients to gather rich totaled data about the proprietor of the distributed
substance and the subjects in the distributed substance.[3] The totaled data can bring about unforeseen introduction of
one's social surroundings and lead to manhandle of one's close to home data.
Most substance sharing sites permit clients to enter their protection inclinations. Shockingly, late studies have
demonstrated that clients battle to set up and keep up such protection settings.[4][5][6][7] One of the primary reasons
gave is that given the measure of shared data this procedure can be dreary and slip inclined. In this way, numerous have
recognized the need of arrangement proposal frameworks which can help clients to effortlessly and appropriately design
security settings [8][9][10][11] . In any case, existing proposition for robotizing security settings give off an impression
of being deficient to address the exceptional protection needs of pictures because of the measure of data certainly
conveyed inside of pictures[5][41], and their association with the online environment wherein they are uncovered.
II.

LITERATURE REVIEW

1. Imagined communities: Awareness, Information sharing, and privacy on the facebook


AUTHORS: A. Acquisti and R. Gross
Online social networks such as Friendster, MySpace, or the Facebook have experienced exponential growth in
membership in recent years. These networks offer attractive means for interaction and communication, but also raise
privacy and security concerns. In this study we survey a representative sample of the members of the Facebook (a social
network for colleges and high schools) at a US academic institution, and compare the survey data to information
retrieved from the network itself. We look for underlying demographic or behavioral differences between the
communities of the networks members and non-members; we analyze the impact of privacy concerns on members
behavior; we compare members stated attitudes with actual behavior; and we document the changes in behavior
subsequent to privacy-related information exposure. We find that an individuals privacy concerns are only a weak
@IJAERD-2015, All rights Reserved

14

International Journal of Advance Engineering and Research Development (IJAERD)


Volume 2,Issue 12,December -2015,e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
predictor of his membership to the network. Also privacy concerned individuals join the network and reveal great
amounts of personal information. Some manage their privacy concerns by trusting their ability to control the information
they provide and the external access to it. However, we also find evidence of members misconceptions about the online
communitys actual size and composition, and about the visibility of members profiles.
2. Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing.
AUTHORS: S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair,
As sharing personal media online becomes easier and widely spread, new privacy concerns emerge - especially when the
persistent nature of the media and associated context reveals details about the physical and social context in which the
media items were created. In a first-of-its-kind study, we use context-aware camerephone devices to examine privacy
decisions in mobile and online photo sharing. Through data analysis on a corpus of privacy decisions and associated
context data from a real-world system, we identify relationships between location of photo capture and photo privacy
settings. Our data analysis leads to further questions which we investigate through a set of interviews with 15 users. The
interviews reveal common themes in privacy considerations: security, social disclosure, identity and convenience.
Finally, we highlight several implications and opportunities for design of media sharing applications, including using past
privacy patterns to prevent oversights and errors.
3. Why we tag: Motivations for annotation in mobile and online media
AUTHORS:M. Ames and M. Naaman,
Why do people tag? Users have mostly avoided annotating media such as photos -- both in desktop and mobile
environments -- despite the many potential uses for annotations, including recall and retrieval. We investigate the
incentives for annotation in Flickr, a popular web-based photo-sharing system, and ZoneTag, a cameraphone photo
capture and annotation tool that uploads images to Flickr. In Flickr, annotation (as textual tags) serves both personal and
social purposes, increasing incentives for tagging and resulting in a relatively high number of annotations. ZoneTag, in
turn, makes it easier to tag camera phone photos that are uploaded to Flickr by allowing annotation and suggesting
relevant tags immediately after capture .A qualitative study of Zone Tag /Flickr users exposed various tagging patterns
and emerging motivations for photo annotation. We offer a taxonomy of motivations for annotation in this system along
two dimensions (sociality and function), and explore the various factors that people consider when tagging their photos.
Our findings suggest implications for the design of digital photo organization and sharing applications, as well as other
applications that incorporate user-based annotation.

4. Tagged photos: Concerns, perceptions, and protections


AUTHORS:A. Besmer and H. Lipford.
Photo sharing has become a popular feature of many online social networking sites. Many of the photo sharing
applications on these sites, allow users to annotate photos with those who are in them. A number of researchers have
examined the social uses and privacy issues of online photo sharing sites, but few have explored the privacy issues of
photo sharing in social networks. In this paper, we begin by examining some of our findings from a series of focus
groups on photo privacy in the social networking domain. We then devise a new mechanism to enhance photo privacy
based on these findings.

5.Prying data out of asocial network


AUTHORS:J. Bonneau, J. Anderson, and G. Danezis.
Preventing adversaries from compiling significant amounts of user data is a major challenge for social network operators.
We examine the difficulty of collecting profile and graph information from the popular social networking Website
Facebook and report two major findings. First, we describe several novel ways in which data can be extracted by third
parties. Second, we demonstrate the efficiency of these methods on crawled data. Our findings highlight how the current
protection of personal data is inconsistent with user's expectations of privacy.

III.

@IJAERD-2015, All rights Reserved

SURVEY OF PROPOSED SYSTEM

15

International Journal of Advance Engineering and Research Development (IJAERD)


Volume 2,Issue 12,December -2015,e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
We have presented a decentralized access control technique with anonymous authentication, which provides
user revocation and prevents replay attacks. The cloud does not know the identity of the user who stores information, but
only verifies the users credentials. Key distribution is done in a decentralized way.

IV Mathematical Model
Let S is the Whole System Consist of
S= {I, P, O}
I = Input.
I = {U, Q, D, IMG}
U = User
U = {u1,u2.un}
Q = Query Entered by user
Q = {q1, q2, q3qn}
D = Dataset.
IMG = Images
IMG = {img1, img2....imgn}
P = Process:
P = {A3P-CORE,CBC, MBC, APP,}
CBC = Content-Based Classification
MBC = Metadata-Based Classification
APP = Adaptive Policy Prediction
Step1: User enters the Query(Image).
Step2: A3P-Core(Classification and Adaptive policy prediction)
Step3: Content Based Classification.
Step4: Metadata Based Classification.
Step5: Policy mining
Step6: Policy prediction
Step7: Social Context modelling.
Step8: Pivotal user selection.
A3P-CORE
There are two major components in A3P-core:
(i) Image classification and (ii) Adaptive policy prediction.
For each user ,his/her images are first classified based on content and metadata. Then, privacy policies of each
category of images are analyzed for the policy prediction.
Content-Based Classification
Our approach to content-based classification is based on an efficient and yet accurate image similarity approach.
Specifically, our classification algorithm compares image signatures defined based on quantified and sanitized
version of Haar wav elet transformation.
Metadata-Based Classification
The metadata-based classification groups images into subcategories under aforementioned baseline categories.
The process consists of three main steps.
The first step is to extract keywords from the metadata associated with an image.
The second step is to derive a representative hypernym(denoted as h) from each metadata vector.
The third step is to find a subcategory that an image belongs to. This is an incremental procedure. At the
beginning, the first image forms a subcategory as itself and the representative hypernyms of the image becomes
the subcategorys
Representative hypernyms.
Output: Predicted Result.
V SYSTEM ARCHITECTURE

@IJAERD-2015, All rights Reserved

16

International Journal of Advance Engineering and Research Development (IJAERD)


Volume 2,Issue 12,December -2015,e-ISSN: 2348 - 4470 , print-ISSN:2348-6406

.
VI CONCLUSION AND FUTURE WORK
We have proposed an Adaptive Privacy Policy Prediction (A3P) framework that assists clients with computerizing the
security arrangement settings for their transferred images. The A3P system gives a comprehensive structure to infer
protection inclinations taking into account the data accessible for a given client. We additionally viably handled the issue
of icy begin, utilizing social setting data. Our exploratory study demonstrates that our A3P is a tool that offers significant
improvements over current approaches to privacy.

ACKNOWLEDGMENT
We might want to thank the analysts and also distributers for making their assets accessible. We additionally appreciative
to commentator for their significant recommendations furthermore thank the school powers for giving the obliged base
and backing.
REFERENCES
[1] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, Over-exposed?: Privacy patterns and
considerations in online and mobile photo sharing, in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 357366.
[2] Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove, Analyzing facebook privacy settings: User expectations
vs. reality, in Proc. ACMSIGCOMMConf. Internet Meas. Conf., 2011, pp. 6170.
[3] P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, Tag, you
can see it!: Using tags for access control in photo sharing, in Proc. ACM Annu. Conf. Human Factors Comput. Syst.,
2012, pp. 377386.
[4] A. Acquisti and R. Gross, Imagined communities: Awareness, information sharing, and privacy on the facebook, in
Proc. 6th Int. Conf. Privacy Enhancing Technol. Workshop, 2006, pp. 3658.
[5] L. Church, J. Anderson, J. Bonneau, and F. Stajano, Privacy stories: Confidence on privacy behaviors through end
user programming, in Proc. 5th Symp. Usable Privacy Security, 2009.
[6] H. Lipford, A. Besmer, and J. Watson, Understanding privacy settings in facebook with an audience view, in Proc.
Conf. Usability, Psychol., Security, 2008.

@IJAERD-2015, All rights Reserved

17

International Journal of Advance Engineering and Research Development (IJAERD)


Volume 2,Issue 12,December -2015,e-ISSN: 2348 - 4470 , print-ISSN:2348-6406
[7] J. Bonneau, J. Anderson, and L. Church, Privacy suites: Shared privacy for social networks, in Proc. Symp. Usable
Privacy Security, 2009.
[8] H. Lipford, A. Besmer, and J. Watson, Understanding privacy settings in facebook with an audience view, in Proc.
Conf. Usability, Psychol., Security, 2008.
[9] A. Mazzia, K. LeFevre, and A. E.,, The PViz comprehension tool for social network privacy settings, in Proc.
Symp. Usable Privacy Security, 2012.
[10] R. Ravichandran, M. Benisch, P. Kelley, and N. Sadeh, Capturing social networking privacy preferences, in Proc.
Symp. Usable Privacy Security, 2009.
[11] A. Besmer and H. Lipford, Tagged photos: Concerns, perceptions, and protections, in Proc. 27th Int. Conf.
Extended Abstracts Human Factors Comput. Syst., 2009, pp. 45854590.
[12] K. Strater and H. Lipford, Strategies and struggles with privacy in an online social networking community, in
Proc. Brit. Comput. Soc. Conf. Human-Comput. Interact., 2008, pp.111119.
[13] C. A. Yeung, L. Kagal, N. Gibbins, and N. Shad bolt, Providing access control to online photo albums based on
tags and linked data, in Proc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 914.

AUTHORS

Nilesh Babu Maske, pursuing the B.E degree in Computer Engineering at Dr. D. Y. Patil College Of
Engineering, Pimpari, Pune.

Sainath Tukaram Zariwad, pursuing the B.E degree in Computer Engineering at Dr. D. Y. Patil
College Of Engineering, Pimpari, Pune.

Vijay Udhavrao Jogdand, pursuing the B.E degree in Computer Engineering at Dr. D. Y. Patil
College Of Engineering, Pimpari, Pune.

@IJAERD-2015, All rights Reserved

18

International Journal of Advance Engineering and Research Development (IJAERD)


Volume 2,Issue 12,December -2015,e-ISSN: 2348 - 4470 , print-ISSN:2348-6406

Prof. Kiran Somase, Assistant Professor in Computer Engineering at Dr. D. Y. Patil College Of
Engineering, Pimpari, Pune.

@IJAERD-2015, All rights Reserved

19

You might also like