Journal on Communications ›› 2019, Vol. 40 ›› Issue (7): 1-13.doi: 10.11959/j.issn.1000-436x.2019107
• Papers • Next Articles
Fenghua LI1,2,3,Zhe SUN1,2,Ben NIU1(),Jin CAO3,Hui LI3
Revised:
2019-04-04
Online:
2019-07-25
Published:
2019-07-30
Supported by:
CLC Number:
Fenghua LI,Zhe SUN,Ben NIU,Jin CAO,Hui LI. Privacy-preserving photo sharing framework cross different social network[J]. Journal on Communications, 2019, 40(7): 1-13.
"
图片大小 | 低强度 | 中强度 | 高强度 |
200像素×150像素 | 117.79 ms | 125.88 ms | 142.68 ms |
700像素×525像素 | 148.23 ms | 158.31 ms | 174.53 ms |
1 200像素×900 像素 | 247.37 ms | 264.13 ms | 299.61 ms |
1 700像素×1 275 像素 | 2.92 s | 3.14 s | 3.54 s |
2 400像素×1 800 像素 | 4.90 s | 5.24 s | 5.87 s |
2 800像素×2 100 像素 | 8.66 s | 9.27 s | 10.57 s |
3 200像素×2 400 像素 | 12.52 s | 14.32 s | 16.23 s |
4 032像素×3 024 像素 | 23.87 s | 25.71 s | 29.20 s |
[1] | HU H , AHN G J , JORGENSEN J . Multiparty access control for online social networks:model and mechanisms[J]. IEEE Transactions on Knowledge and Data Engineering, 2013,25(7): 1614-1627. |
[2] | ILIA P , POLAKIS I , ATHANASOPOULOS E ,et al. Face/off:preventing privacy leakage from photos in social networks[C]// The 22nd ACM SIGSAC Conference on Computer and Communications Security. 2015: 781-792. |
[3] | VISHWAMITRA N , LI Y , WANG K ,et al. Towards PII-based multiparty access control for photo sharing in online social networks[C]// The 22nd ACM on Symposium on Access Control Models and Technologies. 2017: 155-166. |
[4] | XU K , GUO Y , GUO L ,et al. My privacy my decision:control of photo sharing on online social networks[J]. IEEE Transactions on Dependable and Secure Computing, 2017,14(2): 199-210. |
[5] | LI F , LI Z , HAN W ,et al. Cyberspace-oriented access control:a cyberspace characteristics based model and its policies[J]. IEEE Internet of Things Journal, 2018,6(2): 1471-1483. |
[6] | LI F , SUN Z , NIU B ,et al. HideMe:privacy-preserving photo sharing on social networks[C]// The 38th IEEE International Conference on Computer Communications. 2019: 154-162. |
[7] | RA M R , GOVINDAN R , ORTEGA A . P3:toward privacy-preserving photo sharing[C]// The 10th USENIX Symposium on Networked Systems Design and Implementation. USENIX, 2013: 515-528. |
[8] | ZHANG L , JUNG T , LIU C ,et al. Pop:privacy-preserving outsourced photo sharing and searching for mobile devices[C]// The 35th IEEE International Conference on Distributed Computing Systems. 2015: 308-317. |
[9] | HE J , LIU B , KONG D ,et al. Puppies:transformation-supported personalized privacy preserving partial image sharing[C]// The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks. 2016: 359-370. |
[10] | SUN W , ZHOU J , ZHU S ,et al. Robust privacy-preserving image sharing over online social networks (OSNs)[J]. ACM Transactions on Multimedia Computing,Communications,and Applications, 2018,14(1):14. |
[11] | 李晖 . 隐私计算—面向隐私保护的新型计算[J]. 信息通信技术, 2018,12(6): 4-6. |
LI H . Privacy computing:a new computing model for privacy preserving[J]. Information and Communications Technologies, 2018,12(6): 4-6. | |
[12] | KARJOTH G , SCHUNTER M , WAIDNER M . Platform for enterprise privacy practices:privacy-enabled management of customer data[C]// Springer International Workshop on Privacy Enhancing Technologies. 2002: 69-84. |
[13] | 薛见新, 申德荣, 寇月 ,等. 面向数据融合的半环溯源计算方法[J]. 计算机研究与发展, 2016,53(2): 316-325. |
XUE J X , SHEN D R , KOU Y ,et al. Semiring provenance for data fusion[J]. Journal of Computer Research and Development, 2016,53(2): 316-325. | |
[14] | 王梁, 周光焱, 王黎维 ,等. 不确定关系数据属性级溯源表示与概率计算[J]. 软件学报, 2014,25(4): 863-879. |
WANG L , ZHOU G Y , WANG L W ,et al. Attribute level lineage and probabilistic computation of uncertain data[J]. Journal of Software, 2014,25(4): 863-879. | |
[15] | SUN L , PARK J , NGUYEN D ,et al. A provenance-aware access control framework with typed provenance[J]. IEEE Transactions on Dependable and Secure Computing, 2016,13(4): 411-423. |
[16] | 张聿博, 张锡哲, 张斌 . 面向社交网络信息源定位的观察点部署方法[J]. 软件学报, 2014,25(12): 2837-2851. |
ZHANG Y B , ZHANG X Z , ZHANG B . Observer deployment method for locating the information source in social network[J]. Journal of Software, 2014,25(12): 2837-2851. | |
[17] | 付安民, 秦宁元, 宋建业 ,等. 云端多管理者群组共享数据中具有隐私保护的公开审计方案[J]. 计算机研究与发展, 2015,52(10): 2353-2362. |
FU A M , QIN N Y , SONG J Y ,et al. Privacy-preserving public auditing for multiple managers shared data in the cloud[J]. Journal of Computer Research and Development, 2015,52(10): 2353-2362. | |
[18] | SUCH J M , CRIADO N . Resolving multi-party privacy conflicts in social media[J]. IEEE Transactions on Knowledge and Data Engineering, 2016,28(7): 1851-1863. |
[19] | XU Y , PRICE T , FRAHM J M ,et al. Virtual U:defeating face liveness detection by building virtual models from your public photos[C]// The 25th USENIX Security Symposium. 2016: 497-512. |
[20] | FOGUES R L , MURUKANNAIAH P K , SUCH J M ,et al. Sharing policies in multiuser privacy scenarios:Incorporating context,preferences,and arguments in decision making[J]. ACM Transactions on Computer-Human Interaction, 2017,24(1):5. |
[21] | LI F , SUN Z , NIU B ,et al. SRIM scheme:an impression-management scheme for privacy-aware photo-sharing users[J]. Engineering, 2018,4(1): 85-93. |
[22] | YUAN X , WANG X , WANG C ,et al. Enabling privacy-preserving image-centric social discovery[C]// The 34th IEEE International Conference on Distributed Computing Systems. IEEE, 2014: 198-207. |
[23] | HE J , LIU B , BAO X ,et al. On privacy preserving partial image sharing[C]// The 35th IEEE International Conference on.Distributed Computing Systems. IEEE, 2015: 758-759. |
[24] | FERREIRA B , RODRIGUES J , LEITAO J ,et al. Privacy-preserving content-based image retrieval in the cloud[C]// The 34th IEEE Symposium on Reliable Distributed Systems. IEEE, 2015: 11-20. |
[25] | YUAN L , KORSHUNOV P , EBRAHIMI T . Secure JPEG scrambling enabling privacy in photo sharing[C]// The 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition. IEEE, 2015,4: 1-6. |
[26] | NOURIAN A , MAHESWARAN M . Privacy aware image template matching in clouds using ambient data[J]. The Journal of Supercomputing, 2013,66(2): 1049-1070. |
[27] | PEARSON S , MONT M C , KOUNGA G . Enhancing accountability in the cloud via sticky policies[C]// Springer FTRA International Conference on Secure and Trust Computing,Data Management,and Application. 2011: 146-155. |
[28] | SPYRA G , BUCHANAN W J , EKONOMOU E . Sticky policies approach within cloud computing[J]. Elsevier Computers & Security, 2017,70: 366-375. |
[29] | PARK J , NGUYEN D , SANDHU R . A provenance-based access control model[C]// The 10th Annual International Conference on Privacy,Security and Trust. 2012: 137-144. |
[30] | BATES A M , TIAN D , BUTLER K R B ,et al. Trustworthy whole-system provenance for the Linux kernel[C]// The 24th USENIX security symposium. USENIX, 2015: 319-334. |
[31] | 李彪 . 微博中热点话题的内容特质及传播机制研究——基于新浪微博 6025 条高转发微博的数据挖掘分析[J]. 中国人民大学学报, 2013,27(5): 10-17. |
LI B . Research on content characteristics and communication mechanism of hot topics in weibo--data mining and analysis based on sina weibo 6025 highly retweeted microblogs[J]. Journal of Renmin University of China, 2013,27(5): 10-17. | |
[32] | ZHANG L , BO C , HOU J ,et al. Kaleido:you can watch it but cannot record it[C]// The 21st ACM Annual International Conference on Mobile Computing and Networking . 2015: 372-385. |
[1] | Xuan WANG, Yu ZHANG, Junfeng ZHOU, Ziyang CHEN. Influence maximization algorithm based on social network [J]. Journal on Communications, 2022, 43(8): 151-163. |
[2] | Tao PENG, Wentao ZHONG, Guojun WANG, Entao LUO, Jinbo XIONG, Yining LIU, Wang Hao. Privacy-preserving precise profile matching in mobile social network [J]. Journal on Communications, 2022, 43(11): 90-103. |
[3] | Zhen LIU,Na’na WANG,Xiaodong WANG,Yongqi SUN. Spectral clustering and embedding-enhanced POI recommendation in location-based social network [J]. Journal on Communications, 2020, 41(3): 197-206. |
[4] | Qiuyang GU, Chunhua JU, Gongxing WU. Social network link prediction method based on subgraph evolution and improved ant colony optimization algorithm [J]. Journal on Communications, 2020, 41(12): 21-35. |
[5] | Jing CHEN,Ziyi QI. Research on social network influence maximization algorithm based on time sequential relationship [J]. Journal on Communications, 2020, 41(10): 211-221. |
[6] | Junlei BI,Zhiyuan LI. Time-variant interest community based query message routing algorithm in opportunity social network [J]. Journal on Communications, 2019, 40(9): 86-94. |
[7] | Haiping HUANG,Kai WANG,Xiong TANG,Dongjun ZHANG. Differential privacy protection scheme based on edge betweenness model [J]. Journal on Communications, 2019, 40(5): 88-97. |
[8] | Xiaomeng WANG, Binxing FANG, Hongli ZHANG, Xing WANG. TSL:predicting popularity of Facebook content based on tie strength [J]. Journal on Communications, 2019, 40(10): 1-9. |
[9] | Guanghui YAN, Meng ZHANG, Hao LUO, Shikui LI, Ting LIU. Identifying vital nodes algorithm in social networks fusing higher-order information [J]. Journal on Communications, 2019, 40(10): 109-118. |
[10] | Yu FU, Yihan YU, Xiaoping WU. Differential privacy protection technology and its application in big data environment [J]. Journal on Communications, 2019, 40(10): 157-168. |
[11] | Yancui SHI,Yuan WANG,Qing ZHAO,Xiankun ZHANG. Research status of community detection based on local expansion [J]. Journal on Communications, 2019, 40(1): 149-162. |
[12] | Lu DENG,Yan JIA,Binxing FANG,Bin ZHOU,Tao ZHANG,Xin LIU. Performance analysis of topic detection algorithms in distributed environment [J]. Journal on Communications, 2018, 39(8): 176-184. |
[13] | Yong ZENG,Lingjie ZHOU,Zhongyuan JIANG,Zhihong LIU,Jianfeng MA. Security analysis of weighted network anonymity based on singular value decomposition [J]. Journal on Communications, 2018, 39(5): 23-33. |
[14] | Weihao LI,Sheng DING,Jiajie MENG,Hui LI. Spatio-temporal aware privacy-preserving scheme in LBS [J]. Journal on Communications, 2018, 39(5): 134-142. |
[15] | Lei SHI,Junping DU,Meiyu LIANG. Social network bursty topic discovery based on RNN and topic model [J]. Journal on Communications, 2018, 39(4): 189-198. |
Viewed | ||||||
Full text |
|
|||||
Abstract |
|
|||||
|