Journal on Communications ›› 2019, Vol. 40 ›› Issue (7): 1-13.doi: 10.11959/j.issn.1000-436x.2019107

• Papers •     Next Articles

Privacy-preserving photo sharing framework cross different social network

Fenghua LI1,2,3,Zhe SUN1,2,Ben NIU1(),Jin CAO3,Hui LI3   

  1. 1 Institute of Information Engineering,Chinese Academy of Sciences,Beijing 100093,China
    2 School of Cyber Security,University of Chinese Academy of Sciences,Beijing 100049,China
    3 School of Cyber Engineering,Xidian University,Xi’an 710071,China
  • Revised:2019-04-04 Online:2019-07-25 Published:2019-07-30
  • Supported by:
    The National Key Research and Development Program of China(2017YFB0802203);The National Natural Science Foundation of China(U1401251);The National Natural Science Foundation of China(61672515);The National Natural Science Foundation of China(61872441);2018 Industrial Internet Innovation and Development Project of China - “Technical Standard Formulation and Verification of Identifier Data Management for Identification and Resolution System;Youth Innovation Promotion Association CAS(2018196)

Abstract:

With rapid developments of digital photography and social networks,users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem,a privacy-preserving photo sharing framework was proposed,which could apply to extended control and privacy invasion tracing.In extended control scheme,the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos,so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis,the behaviors of users were record by tracing scheme of privacy invasion,the integrality of records was protected by using nested signature algorithm.The correctness,security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.

Key words: photo privacy, extended control, privacy invasion tracing, social network

CLC Number: 

No Suggested Reading articles found!