International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 886
A Survey On Privacy Policy Inference for Social Images
Miss. Chaitrali A. Salunke
Student, Computer Engineering Department, V.P College of Engineering, Baramati, Maharashtra, India
---------------------------------------------------------------------***---------------------------------------------------------------------
Abstract - Social media has become one of the
ultimate important parts of our daily life as it enables
us to communicate with a many people. Creation of
social networking sites such as Facebook LinkedIn etc,
individuals are given opportunities to meet new friends
in their own and also in the other variety of
communities across the world. So that many of the
photo sharing applications or content sharing
applications on these sites allow users to annotate
photos with those who are in them. A number of
researchers have studied the social uses and privacy
issues of online photo sharing or content sharing sites ,
but less have explored the privacy issues of photo
sharing in social networks. Users of social-networking
services share abundant information with numerous
“friends.” This improved technology causes to privacy
violation where the users are sharing the enormous
volumes of images across more number of peoples. This
privacy need to be taken care in order to make better
the user satisfaction level. Towards or focusing on this
need, using Adaptive Privacy Policy Prediction (A3P)
system to assist users compose privacy settings for
their images. Our main contribution to the existing
work is to generate user profile, further the privacy
inference policies should be mainatained with respect
to user profile.
Key Words: Social media; content sharing.
1. INTRODUCTION
Creating privacy controls for social media or networks
that are both expressive and usable is a major challenge.
The word “social media” refers to the outspread of
Internet-based and mobile services that allow users to
participate in online exchanges, bring user-created
content, or join online communities. Online social
networks or sharing/content sites are websites that allow
users to build or construct connections and relationships
to other Internet users. Social networks store information
remotely, rather than on a user’s personal computer.
Social networking can be used to keep in touch with
friends, make new friends and find people with similar
interests and ideas. The relation between privacy and a
person’s social network is multi-faceted. So it required to
develop more security mechanisms for different
communication technologies, especially online social
networks. Privacy is very important to the design of
security mechanisms. Most social networks providers
have provide an opportunity of privacy settings to allow or
refuse others access to personal information details. In
certain event or an occasion we want information about
ourselves to be known only by a small circle of close
friends, and not by strangers or unknown people. In other
side, we are willing to reveal our personal information to
strangers, but not to those who know us better. Social
network theorists have studied the relevance of relations
of different depth and strength in a person’s social
network and the valued of so-called weak ties in the flow
of information across different nodes in a network. An
Internet privacy can be define as the ability to control
what information one reveals about oneself, and who can
access that information. Essentially, when the data is
gathered or analyzed without the knowledge or
permission of its owner, privacy is violated. When it comes
to the usage of the data, the owner should be informed
about the purposes and aim for which the data is being or
will be used. Most content sharing or photo sharing
websites permit users to enter their privacy preferences.
Unfortunately, recent studies have shown that users
struggle or it is difficult to set up and maintain such
privacy settings. One of the main reasons provided is that
given the amount of shared information this process can
be tiresome and error-prone. Therefore, many have
recognized the need of policy recommendation systems
which can help users to easily and properly configure
privacy settings. However, existing system for automating
privacy settings appear to be insufficient to address the
unique privacy needs of images due to the amount of
information absolutely carried within images and their
relationship with the online environment wherein they
are exposed. The privacy of user data can be given by
using two methods.
1. The user can enter the privacy preferences
2. Usage of recommendation systems which helps users
for setting the privacy preferences.
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 887
The privacy policy of user uploaded data can be provided
depends on the user social environment and personal
characteristics. Social context of users, such as their profile
information and relationships with others may provide
beneficial information regarding users’ privacy
preferences. The privacy policy for image which is
uploaded by user can be provided depend on the user
uploaded image’s content and its metadata. A hierarchical
image classification which classifies images first based on
their contents and then decides each category into
subcategories based on their metadata. Images that do not
have metadata will be classed together only by content.
Such a hierarchical classification provides by A3P system
which gives a higher priority to image content and reduces
the influence of missing tags[1].
2. LITERATURE SURVEY
Many studies and analysis have been performed on
privacy policy techniques.
Alessandra Mazzia et al. [2012] introduced PViz
Comprehension Tool , an interface and system that
corresponds more directly with how users model groups
and privacy policies applied to their networks. It allows
the user to understand the Visibility of her profile
according to automatically natural sub-groupings of
people. Because the user must be able to identify and
differentiated automatically-constructed groups, we also
address the important sub-problem of producing effective
group labels. PViz tool is better than other current policy
comprehension tools Facebook's Audience View and
Custom Settings page.
Peter F. Klemperer et al. [2012] developed a tag based
access control of data shared in the social media sites. A
system that generates access-control policies from photo
management tags. Every photo is incorporated with an
access grid for mapping the photo with the user’s friends.
The participants can select a suitable preference and
access the information. Photo tags can be divided as
organizational or communicative based on the user needs.
There are several important limitations to our study
design. First, our results are limited by the participants we
recruited and the photos they provided. A second set of
disadvantages concerns our use of machine generated
access-control rules. The algorithm has no access to the
context and meaning of tags and no insight into the policy
the participant intended when tagging for access control.
As a result, some rules appeared strange to the
participants, potentially driving them toward explicit
policy-based tags like “private” and “public.
Sergej Zerr et al. [2012] proposed a technique Privacy-
Aware Image Classification and Search to automatically
detect private images, and to enable privacy-oriented
image search. It combines textual meta data images with
variety of visual features to give security policies. In this
the selected image features (edges, faces, color
histograms) which can help discriminate between natural
and man-made objects that can indicate the presence or
absence of particular objects (SIFT). It uses various
classification models trained on a large scale dataset with
privacy assignments obtained through a social annotation
game.
Choudhury et al. [2009] proposed a recommendation
framework to connect image content with communities in
online social media. They characterize images through
three types of features: visual features, user generated text
tags, and social interaction, from which they recommend
the most likely groups for a given image.
Similarly, an automated recommendation system for a
user’s images to provide suitable photo-sharing groups.
Jonathan Anderson et al. [2009] proposed Privacy Suites
which allows users to easily choose “suites" of privacy
settings. A privacy suite can be created by an expert using
privacy programming. The privacy suite is distributed
through distribution channels to the members of the social
sites. The drawback of a rich programming language is
less understandability for end users. Given a sufficiently
high-level language and good coding practice, motivated
users should be able to verify a Privacy Suite. The main
goal is transparency, which is essential for convincing
influential users that it is safe to use.
Ching-man Au Yeung et al. [2009] proposed a access
control system based on a decentralised authentication
protocol, descriptive tags and linked data of social
networks in the Semantic Web. It allows users to create
expressive policies for their photos stored in one or more
photo sharing sites, and users can specify access control
rules based on open linked data provided by other parties.
Danezis et al. [2009] proposed a machine-learning based
approach to automatically extract privacy settings from
the social context within which the data is produced. It
develop privacy settings based on a concept of “Social
Circles” which consist of clusters of friends. User’s privacy
preferences for location-based data based on location and
time of day.
Fabeah Adu-Oppong et al. [2008] developed concept of
social circles. It provides a web based solution to protect
personal information. The technique named Social Circles
Finder, which automatically generates the friend’s list. It is
a technique that analyses the social circle of a person and
identifies the intensity of relationship and therefore social
circles obtained a meaningful categorization of friends for
setting privacy policies. The application will identify the
social circles of the subject but not show them to the
subject. The subject will then be asked questions about
International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056
Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072
© 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 888
their willingness to share a piece of their personal
information. Based on the answers the application finds
the visual graph of users.
Kambiz Ghazinour et al. [2008] designed a recommender
system known as Your Privacy Protector that
understands the social net behavior of their privacy
settings and recommending privacy options. It uses user’s
personal profile, User’s interests and User’s privacy
settings on photo albums as parameters and on the basis
of these parameters the system constructs the personal
profile of the user. It automatically learned for a given
profile of users and assign the privacy options. It allows
users to see their current privacy settings on their social
network profile, namely Facebook, and detects the
possible privacy risks. Based on the risks it adopts the
necessary privacy settings.
Fang et al. [2007] proposed a privacy wizard to assist
users grant privileges to their friends. The wizard asks
users to first assign privacy labels to selected friends, and
then uses this as input to construct a classifier which
divides friends based on their profiles and automatically
assign privacy labels to the unlabeled friends.
3. CONCLUSIONS
This paper describes various privacy policy techniques for
user uploaded images in various content sharing sites. The
privacy policy can be applied based on the user social
behavior and the user uploaded image content. Privacy
policy techniques among the existing systems. Future
research leads towards improving the performance by a
novel semantic retrieval of images.
REFERENCES
1. Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha
Sundareswaran, and Joshua Wede, “Privacy Policy
Inference of User- Uploaded Images on Content Sharing
Sites” IEEE Transaction On Knowledge And Data
Enginnering, VOL. 27, NO. 1, January 2015 193
2. A. Mazzia, K. LeFevre, and A. E.,, “The PViz
comprehension tool for social network privacy settings,”
in Proc. Symp. Usable Privacy Security, 2012.
3. P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L.
Bauer, L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can
see it!: Using tags for access control in photo sharing,” in
Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012,
pp. 377–386.
4. S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova, “Privacy-
aware image classification and search,” in Proc. 35th Int.
ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp.
35–44.
5. H. Sundaram, L. Xie, M. De Choudhury, Y. Lin, and A.
Natsev, “Multimedia semantics: Interactions between
content andcommunity,” Proc. IEEE, vol. 100, no. 9, pp.
2737–2758, Sep. 2012.
6. J. Bonneau, J. Anderson, and L. Church, “Privacy suites:
Shared privacy for social networks,” in Proc. Symp. Usable
Privacy Security,2009.
7. C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt,
“Providing access control to online photo albums based on
tags and linked data,” in Proc. Soc. Semantic Web: Where
Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14.
8. J. Bonneau, J. Anderson, and G. Danezis, “Prying data out
of a social network,” in Proc. Int. Conf. Adv. Soc. Netw.
Anal. Mining.,2009, pp.249–254.
9. A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P.
Tsang, “Social circles: Tackling privacy in social networks,”
in Proc. Symp. Usable Privacy Security, 2008.

More Related Content

PDF
My Privacy My decision: Control of Photo Sharing on Online Social Networks
PDF
Implementation of Privacy Policy Specification System for User Uploaded Image...
PDF
iaetsd Adaptive privacy policy prediction for user uploaded images on
PDF
Ijcatr04041017
PDF
An Access Control Model for Collaborative Management of Shared Data in OSNS
PDF
Kt3518501858
PDF
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
PDF
Visual Relation Identification Using BoFT Labels in Social Media Feeds
My Privacy My decision: Control of Photo Sharing on Online Social Networks
Implementation of Privacy Policy Specification System for User Uploaded Image...
iaetsd Adaptive privacy policy prediction for user uploaded images on
Ijcatr04041017
An Access Control Model for Collaborative Management of Shared Data in OSNS
Kt3518501858
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
Visual Relation Identification Using BoFT Labels in Social Media Feeds

What's hot (16)

PPT
Privacy presentation
PDF
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
PDF
Social Networking Websites and Image Privacy
PDF
grindle-hcii
PDF
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
PDF
IRJET- Secure Social Network using Text Mining
PDF
A Survey on Privacy in Social Networking Websites
DOCX
Privacy policy inference of user uploaded
PDF
Privacy policy inference of user uploaded images on content sharing sites
PPT
Overview Of Network Analysis Platforms
DOCX
Trust based video management framework for social multimedia networks
PDF
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
PDF
A Survey on Multi-party Privacy Disputes in Social Networks
DOCX
Privacy policy inference of user uploaded
DOCX
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
PDF
Socially augmented software empowering software operation through social cont...
Privacy presentation
SECUREWALL-A FRAMEWORK FOR FINEGRAINED PRIVACY CONTROL IN ONLINE SOCIAL NETWORKS
Social Networking Websites and Image Privacy
grindle-hcii
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
IRJET- Secure Social Network using Text Mining
A Survey on Privacy in Social Networking Websites
Privacy policy inference of user uploaded
Privacy policy inference of user uploaded images on content sharing sites
Overview Of Network Analysis Platforms
Trust based video management framework for social multimedia networks
Privacy Recommendations and Ranking of User Images on Content Sharing Sites
A Survey on Multi-party Privacy Disputes in Social Networks
Privacy policy inference of user uploaded
PRIVACY POLICY INFERENCE OF USER-UPLOADED IMAGES ON CONTENT SHARING SITES
Socially augmented software empowering software operation through social cont...

Similar to A Survey On Privacy Policy Inference for Social Images (20)

PDF
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
PDF
Authorization mechanism for multiparty data sharing in social network
PDF
Detecting and Resolving Privacy Conflicts in Online Social Networks
PDF
Intelligent access control policies for Social network site
PDF
Privacy Protection Using Formal Logics in Onlne Social Networks
PDF
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
PDF
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
PDF
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
PDF
Protect Social Connection Using Privacy Predictive Algorithm
PDF
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
PDF
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
PDF
Detecting and Providing Solutions to Privacy Issues in Social Media
PDF
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
PDF
Collusion-resistant multiparty data sharing in social networks
PDF
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
PDF
Policy resolution of shared data in online social networks
PDF
549 458-465
PDF
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
PDF
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
PDF
Scalable Access Control For Privacy-Aware Media Sharing.pdf
Ijricit 01-008 confidentiality strategy deduction of user-uploaded pictures o...
Authorization mechanism for multiparty data sharing in social network
Detecting and Resolving Privacy Conflicts in Online Social Networks
Intelligent access control policies for Social network site
Privacy Protection Using Formal Logics in Onlne Social Networks
Predicting Privacy Policy Automatically To the User Uploaded Images on Conten...
PRIVACY PRESERVATION IN SOCIAL MEDIA BY IMAGE PROCESSING
Privacy Policy Inference of User-Uploaded Images on Content Sharing Sites
Protect Social Connection Using Privacy Predictive Algorithm
YOURPRIVACYPROTECTOR: A RECOMMENDER SYSTEM FOR PRIVACY SETTINGS IN SOCIAL NET...
IRJET- Personalised Privacy-Preserving Social Recommendation based on Ranking...
Detecting and Providing Solutions to Privacy Issues in Social Media
A SECURED AUDITING PROTOCOL FOR TRANSFERRING DATA AND PROTECTED DISTRIBUTED S...
Collusion-resistant multiparty data sharing in social networks
Privacy Management of Multi User Environment in Online Social Networks (OSNs)
Policy resolution of shared data in online social networks
549 458-465
MUTATION AND CROSSOVER ISSUES FOR OSN PRIVACY
Avoiding Anonymous Users in Multiple Social Media Networks (SMN)
Scalable Access Control For Privacy-Aware Media Sharing.pdf

More from IRJET Journal (20)

PDF
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
PDF
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
PDF
Kiona – A Smart Society Automation Project
PDF
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
PDF
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
PDF
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
PDF
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
PDF
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
PDF
BRAIN TUMOUR DETECTION AND CLASSIFICATION
PDF
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
PDF
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
PDF
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
PDF
Breast Cancer Detection using Computer Vision
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
PDF
Auto-Charging E-Vehicle with its battery Management.
PDF
Analysis of high energy charge particle in the Heliosphere
PDF
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Enhanced heart disease prediction using SKNDGR ensemble Machine Learning Model
Utilizing Biomedical Waste for Sustainable Brick Manufacturing: A Novel Appro...
Kiona – A Smart Society Automation Project
DESIGN AND DEVELOPMENT OF BATTERY THERMAL MANAGEMENT SYSTEM USING PHASE CHANG...
Invest in Innovation: Empowering Ideas through Blockchain Based Crowdfunding
SPACE WATCH YOUR REAL-TIME SPACE INFORMATION HUB
A Review on Influence of Fluid Viscous Damper on The Behaviour of Multi-store...
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...
Explainable AI(XAI) using LIME and Disease Detection in Mango Leaf by Transfe...
BRAIN TUMOUR DETECTION AND CLASSIFICATION
The Project Manager as an ambassador of the contract. The case of NEC4 ECC co...
"Enhanced Heat Transfer Performance in Shell and Tube Heat Exchangers: A CFD ...
Advancements in CFD Analysis of Shell and Tube Heat Exchangers with Nanofluid...
Breast Cancer Detection using Computer Vision
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
A Novel System for Recommending Agricultural Crops Using Machine Learning App...
Auto-Charging E-Vehicle with its battery Management.
Analysis of high energy charge particle in the Heliosphere
Wireless Arduino Control via Mobile: Eliminating the Need for a Dedicated Wir...

Recently uploaded (20)

PPTX
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
PDF
B461227.pdf American Journal of Multidisciplinary Research and Review
PDF
Human CELLS and structure in Anatomy and human physiology
PDF
CBCN cam bien cong nghiep bach khoa da năng
PPTX
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
PDF
Recent Trends in Network Security - 2025
PPTX
IOP Unit 1.pptx for btech 1st year students
PPTX
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
PDF
IoT-Based Hybrid Renewable Energy System.pdf
PPTX
non conventional energy resorses material unit-1
PPT
Basics Of Pump types, Details, and working principles.
PPTX
Ingredients of concrete technology .pptx
PPTX
Cloud Security and Privacy-Module-2a.pptx
PDF
ITEC 1010 - Networks and Cloud Computing
PDF
Water Industry Process Automation & Control Monthly - September 2025
PDF
Module 1 part 1.pdf engineering notes s7
PDF
CB Công Nghiệp Slide .dh bách khoa đà nẵng
PPT
Unit - I.lathemachnespct=ificationsand ppt
PPTX
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
PPTX
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx
sinteringn kjfnvkjdfvkdfnoeneornvoirjoinsonosjf).pptx
B461227.pdf American Journal of Multidisciplinary Research and Review
Human CELLS and structure in Anatomy and human physiology
CBCN cam bien cong nghiep bach khoa da năng
22ME926Introduction to Business Intelligence and Analytics, Advanced Integrat...
Recent Trends in Network Security - 2025
IOP Unit 1.pptx for btech 1st year students
MODULE 02 - CLOUD COMPUTING-Virtual Machines and Virtualization of Clusters a...
IoT-Based Hybrid Renewable Energy System.pdf
non conventional energy resorses material unit-1
Basics Of Pump types, Details, and working principles.
Ingredients of concrete technology .pptx
Cloud Security and Privacy-Module-2a.pptx
ITEC 1010 - Networks and Cloud Computing
Water Industry Process Automation & Control Monthly - September 2025
Module 1 part 1.pdf engineering notes s7
CB Công Nghiệp Slide .dh bách khoa đà nẵng
Unit - I.lathemachnespct=ificationsand ppt
DATA STRCUTURE LABORATORY -BCSL305(PRG1)
240409 Data Center Training Programs by Uptime Institute (Drafting).pptx

A Survey On Privacy Policy Inference for Social Images

  • 1. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 886 A Survey On Privacy Policy Inference for Social Images Miss. Chaitrali A. Salunke Student, Computer Engineering Department, V.P College of Engineering, Baramati, Maharashtra, India ---------------------------------------------------------------------***--------------------------------------------------------------------- Abstract - Social media has become one of the ultimate important parts of our daily life as it enables us to communicate with a many people. Creation of social networking sites such as Facebook LinkedIn etc, individuals are given opportunities to meet new friends in their own and also in the other variety of communities across the world. So that many of the photo sharing applications or content sharing applications on these sites allow users to annotate photos with those who are in them. A number of researchers have studied the social uses and privacy issues of online photo sharing or content sharing sites , but less have explored the privacy issues of photo sharing in social networks. Users of social-networking services share abundant information with numerous “friends.” This improved technology causes to privacy violation where the users are sharing the enormous volumes of images across more number of peoples. This privacy need to be taken care in order to make better the user satisfaction level. Towards or focusing on this need, using Adaptive Privacy Policy Prediction (A3P) system to assist users compose privacy settings for their images. Our main contribution to the existing work is to generate user profile, further the privacy inference policies should be mainatained with respect to user profile. Key Words: Social media; content sharing. 1. INTRODUCTION Creating privacy controls for social media or networks that are both expressive and usable is a major challenge. The word “social media” refers to the outspread of Internet-based and mobile services that allow users to participate in online exchanges, bring user-created content, or join online communities. Online social networks or sharing/content sites are websites that allow users to build or construct connections and relationships to other Internet users. Social networks store information remotely, rather than on a user’s personal computer. Social networking can be used to keep in touch with friends, make new friends and find people with similar interests and ideas. The relation between privacy and a person’s social network is multi-faceted. So it required to develop more security mechanisms for different communication technologies, especially online social networks. Privacy is very important to the design of security mechanisms. Most social networks providers have provide an opportunity of privacy settings to allow or refuse others access to personal information details. In certain event or an occasion we want information about ourselves to be known only by a small circle of close friends, and not by strangers or unknown people. In other side, we are willing to reveal our personal information to strangers, but not to those who know us better. Social network theorists have studied the relevance of relations of different depth and strength in a person’s social network and the valued of so-called weak ties in the flow of information across different nodes in a network. An Internet privacy can be define as the ability to control what information one reveals about oneself, and who can access that information. Essentially, when the data is gathered or analyzed without the knowledge or permission of its owner, privacy is violated. When it comes to the usage of the data, the owner should be informed about the purposes and aim for which the data is being or will be used. Most content sharing or photo sharing websites permit users to enter their privacy preferences. Unfortunately, recent studies have shown that users struggle or it is difficult to set up and maintain such privacy settings. One of the main reasons provided is that given the amount of shared information this process can be tiresome and error-prone. Therefore, many have recognized the need of policy recommendation systems which can help users to easily and properly configure privacy settings. However, existing system for automating privacy settings appear to be insufficient to address the unique privacy needs of images due to the amount of information absolutely carried within images and their relationship with the online environment wherein they are exposed. The privacy of user data can be given by using two methods. 1. The user can enter the privacy preferences 2. Usage of recommendation systems which helps users for setting the privacy preferences.
  • 2. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 887 The privacy policy of user uploaded data can be provided depends on the user social environment and personal characteristics. Social context of users, such as their profile information and relationships with others may provide beneficial information regarding users’ privacy preferences. The privacy policy for image which is uploaded by user can be provided depend on the user uploaded image’s content and its metadata. A hierarchical image classification which classifies images first based on their contents and then decides each category into subcategories based on their metadata. Images that do not have metadata will be classed together only by content. Such a hierarchical classification provides by A3P system which gives a higher priority to image content and reduces the influence of missing tags[1]. 2. LITERATURE SURVEY Many studies and analysis have been performed on privacy policy techniques. Alessandra Mazzia et al. [2012] introduced PViz Comprehension Tool , an interface and system that corresponds more directly with how users model groups and privacy policies applied to their networks. It allows the user to understand the Visibility of her profile according to automatically natural sub-groupings of people. Because the user must be able to identify and differentiated automatically-constructed groups, we also address the important sub-problem of producing effective group labels. PViz tool is better than other current policy comprehension tools Facebook's Audience View and Custom Settings page. Peter F. Klemperer et al. [2012] developed a tag based access control of data shared in the social media sites. A system that generates access-control policies from photo management tags. Every photo is incorporated with an access grid for mapping the photo with the user’s friends. The participants can select a suitable preference and access the information. Photo tags can be divided as organizational or communicative based on the user needs. There are several important limitations to our study design. First, our results are limited by the participants we recruited and the photos they provided. A second set of disadvantages concerns our use of machine generated access-control rules. The algorithm has no access to the context and meaning of tags and no insight into the policy the participant intended when tagging for access control. As a result, some rules appeared strange to the participants, potentially driving them toward explicit policy-based tags like “private” and “public. Sergej Zerr et al. [2012] proposed a technique Privacy- Aware Image Classification and Search to automatically detect private images, and to enable privacy-oriented image search. It combines textual meta data images with variety of visual features to give security policies. In this the selected image features (edges, faces, color histograms) which can help discriminate between natural and man-made objects that can indicate the presence or absence of particular objects (SIFT). It uses various classification models trained on a large scale dataset with privacy assignments obtained through a social annotation game. Choudhury et al. [2009] proposed a recommendation framework to connect image content with communities in online social media. They characterize images through three types of features: visual features, user generated text tags, and social interaction, from which they recommend the most likely groups for a given image. Similarly, an automated recommendation system for a user’s images to provide suitable photo-sharing groups. Jonathan Anderson et al. [2009] proposed Privacy Suites which allows users to easily choose “suites" of privacy settings. A privacy suite can be created by an expert using privacy programming. The privacy suite is distributed through distribution channels to the members of the social sites. The drawback of a rich programming language is less understandability for end users. Given a sufficiently high-level language and good coding practice, motivated users should be able to verify a Privacy Suite. The main goal is transparency, which is essential for convincing influential users that it is safe to use. Ching-man Au Yeung et al. [2009] proposed a access control system based on a decentralised authentication protocol, descriptive tags and linked data of social networks in the Semantic Web. It allows users to create expressive policies for their photos stored in one or more photo sharing sites, and users can specify access control rules based on open linked data provided by other parties. Danezis et al. [2009] proposed a machine-learning based approach to automatically extract privacy settings from the social context within which the data is produced. It develop privacy settings based on a concept of “Social Circles” which consist of clusters of friends. User’s privacy preferences for location-based data based on location and time of day. Fabeah Adu-Oppong et al. [2008] developed concept of social circles. It provides a web based solution to protect personal information. The technique named Social Circles Finder, which automatically generates the friend’s list. It is a technique that analyses the social circle of a person and identifies the intensity of relationship and therefore social circles obtained a meaningful categorization of friends for setting privacy policies. The application will identify the social circles of the subject but not show them to the subject. The subject will then be asked questions about
  • 3. International Research Journal of Engineering and Technology (IRJET) e-ISSN: 2395 -0056 Volume: 03 Issue: 02 | Feb-2016 www.irjet.net p-ISSN: 2395-0072 © 2016, IRJET | Impact Factor value: 4.45 | ISO 9001:2008 Certified Journal | Page 888 their willingness to share a piece of their personal information. Based on the answers the application finds the visual graph of users. Kambiz Ghazinour et al. [2008] designed a recommender system known as Your Privacy Protector that understands the social net behavior of their privacy settings and recommending privacy options. It uses user’s personal profile, User’s interests and User’s privacy settings on photo albums as parameters and on the basis of these parameters the system constructs the personal profile of the user. It automatically learned for a given profile of users and assign the privacy options. It allows users to see their current privacy settings on their social network profile, namely Facebook, and detects the possible privacy risks. Based on the risks it adopts the necessary privacy settings. Fang et al. [2007] proposed a privacy wizard to assist users grant privileges to their friends. The wizard asks users to first assign privacy labels to selected friends, and then uses this as input to construct a classifier which divides friends based on their profiles and automatically assign privacy labels to the unlabeled friends. 3. CONCLUSIONS This paper describes various privacy policy techniques for user uploaded images in various content sharing sites. The privacy policy can be applied based on the user social behavior and the user uploaded image content. Privacy policy techniques among the existing systems. Future research leads towards improving the performance by a novel semantic retrieval of images. REFERENCES 1. Anna Cinzia Squicciarini, Member, IEEE, Dan Lin, Smitha Sundareswaran, and Joshua Wede, “Privacy Policy Inference of User- Uploaded Images on Content Sharing Sites” IEEE Transaction On Knowledge And Data Enginnering, VOL. 27, NO. 1, January 2015 193 2. A. Mazzia, K. LeFevre, and A. E.,, “The PViz comprehension tool for social network privacy settings,” in Proc. Symp. Usable Privacy Security, 2012. 3. P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter, “Tag, you can see it!: Using tags for access control in photo sharing,” in Proc. ACM Annu. Conf. Human Factors Comput. Syst., 2012, pp. 377–386. 4. S. Zerr, S. Siersdorfer, J. Hare, and E. Demidova, “Privacy- aware image classification and search,” in Proc. 35th Int. ACM SIGIR Conf. Res. Develop. Inform. Retrieval, 2012, pp. 35–44. 5. H. Sundaram, L. Xie, M. De Choudhury, Y. Lin, and A. Natsev, “Multimedia semantics: Interactions between content andcommunity,” Proc. IEEE, vol. 100, no. 9, pp. 2737–2758, Sep. 2012. 6. J. Bonneau, J. Anderson, and L. Church, “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security,2009. 7. C. A. Yeung, L. Kagal, N. Gibbins, and N. Shadbolt, “Providing access control to online photo albums based on tags and linked data,” in Proc. Soc. Semantic Web: Where Web 2.0 Meets Web 3.0 at the AAAI Symp., 2009, pp. 9–14. 8. J. Bonneau, J. Anderson, and G. Danezis, “Prying data out of a social network,” in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining.,2009, pp.249–254. 9. A. Kapadia, F. Adu-Oppong, C. K. Gardiner, and P. P. Tsang, “Social circles: Tackling privacy in social networks,” in Proc. Symp. Usable Privacy Security, 2008.