Abstract
We contend that current and future advances in Internet scale Multimedia analytics , global Inference , and linking can circumvent traditional Security and Privacy barriers. We therefore are in dire need of a new research field to address this issue and come up with new solutions. We present the privacy risks, Attack vectors , details for a preliminary experiment on Account linking , and describe mitigation and educational techniques that will help address the issues.
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsNotes
- 1.
In many countries, this practice is possibly illegal but exists in a gray area and is seemingly routine practice. The Galleon insider trading trial [32] was based largely on the use of expert network consultants.
References
Prosser D (1960) Privacy. In: California law review, vol 48, p 383
House TW (2012) Consumer data privacy in a networked world. http://www.whitehouse.gov/sites/default/files/privacy-final.pdf
Webster M (2013) Privacy. http://www.merriam-webster.com/dictionary/privacy
Wikipedia (2013) Secure communication.http://en.wikipedia.org/wiki/Secure_communication
Sweeney L (1997) Weaving technology and policy together to maintain confidentiality. J Law Med Ethics 25:2–3
Aggarwal C (2005) On k-anonymity and the curse of dimensionality. In: Proceedings of the international conference on very large data bases
Dinur I, Nissim K (2003) Revealing information while preserving privacy. In: ACM SIGACT-SIGMOD-SIGART symposium on principles of database systems (PODS)
Dwork C (2006) Differential privacy. In: 33rd international colloquium on automata, languages, and programming (ICALP)
Dwork C (2008) Differential privacy: a survey of results. In: Agrawal M, Du D, Duan Z, Li A (eds) Theory and applications of models of computation., Lecture notes in computer scienceSpringer, Berlin, pp 1–19
Sweeney L (2002) k-anonymity: a model for protecting privacy. J Uncertain Fuzziness Knowl-based Syst 10(5):557–570
Narayanan A, Shmatikov V (2008) Robust de-anonymization of large sparse datasets. In: Proceedings of the IEEE symposium on security and privacy
Narayanan A, Shmatikov V (2009) De-anonymizing social networks. In: Proceedings of the IEEE symposium on security and privacy
Chow R, Golle P, Staddon J (2008) Detecting privacy leaks using corpus-based association rules. In: Proceeding of the 14th ACM SIGKDD international conference on knowledge discovery and data mining
Staddon J, Golle P, Zimny B (2007) Web-based inference detection. In: Proceedings of 16th USENIX security symposium
Griffith V, Jakobsson M (2005) Messin’ with texas deriving mother’s maiden names using public records. In: Proceedings of the international conference on applied cryptography and network security (ACNS)
Balduzzi M, Platzer C, Holz T, Kirda E, Balzarotti D, Kruegel C (2010) Abusing social networks for automated user profiling. In: 13th international symposium on recent advances in intrusion detection, 09 RAID’2010
Bishop M, Cummins J, Peisert S, Singh A, Bhumiratana B, Agarwal D, Frincke D, Hogarth M (2010) Relationships and data sanitization: a study in scarlet. In: Proceedings of the workshop on new security paradigms
Blumberg A, Eckersley P, On locational privacy, and how to avoid losing it forever. Electronic frontier foundation
Hoh B, Gruteser M, Herring R, Ban J, Work D, Herrera J-C, Bayen AM, Annavaram M, Jacobson Q (2008) Virtual trip lines for distributed privacy-preserving traffic monitoring. In: Proceeding of the 6th international conference on mobile systems, applications, and services MobiSys’08
Popa RA, Balakrishnan H, Blumberg A (2009) VPriv: protecting privacy in location-based vehicular services. In: Proceedings of the USENIX security symposium
Zhong G, Goldberg I, Hengartner U (2007) Louis, lester and pierre: three protocols for location privacy. In: Proceedings of the privacy enhancing technologies symposium
H-Security Cree.py application knows where you’ve been. http://www.h-online.com/security/news/item/Cree-py-application-knows-where-you-ve-been-1217981.html
Friedland G, Sommer R (2010) Cybercasing the joint: on the privacy implications of geo-tagging. In: Proceedings of the USENIX workshop on hot topics in security, August 2010
Friedland G, Choi J (2011) Semantic computing and privacy: a case study using inferred geo-location. Int J Semant Comput 5(01):79–93
Lukas J, Fridrich J, Goljan M (2006) Digital camera identification from sensor pattern noise. IEEE Trans Inf Forensics Secur 1(2):205–214
Dufaux F, Ebrahimi T (2006) Scrambling for video surveillance with privacy. In: computer vision and pattern recognition workshop. CVPRW’06. In: Proceeding of the conference on, pp 160–160
Fan J, Luo H, Hacid M-S, Bertino E (2005) A novel approach for privacy-preserving video sharing. In: Proceedings of the 14th ACM international conference on information and knowledge management, CIKM’05. ACM, New York, pp 609–616
Koshimizu T, Toriyama T, Babaguchi N (2006) Factors on the sense of privacy in video surveillance. In: Proceedings of the 3rd ACM workshop on continuous archival and retrival of personal experiences, CARPE’06. ACM, New York, pp 35–44
Neustaedter C, Greenberg S, Boyle M (2006) Blur filtration fails to preserve privacy for home-based video conferencing. ACM Trans Comput-Hum Interact 13(1):1–36
Dufaux F, Ebrahimi T (2010) A framework for the validation of privacy protection solutions in video surveillance. In: IEEE international conference on multimedia and expo (ICME), pp 66–71
Friedland G, Maier G, Sommer R, Weaver N (2011) Sherlock Holmes evil twin: on the impact of global inference for online privacy. In: Proceedings of the new security paradigms workshop (NSPW), September 2011
Cohan P (2009) Why executives risk their job to tip a hedge fund. http://meet-the-street.blogspot.com/2009/10/expert-networks-what-every-iro-needs-to.html,
Amazon.com Mechanical Turk, https://www.mturk.com/mturk/welcome
Mediaeval web site. http://www.multimediaeval.org
Burget L, Oldřich P, Sandro C, Glembek O, Matějka P, Brümmer N (2011) Discriminantly trained probabilistic linear discriminant analysis for speaker verification. In: Proceedings of ICASSP, Brno, Czech Republic
Mathias L, Chatzichristofis SA (2008) Lire: Lucene image retrieval—an extensible Java CBIR library. In: Proceedings of the 16th ACM international conference on multimedia, pp 1085–1088, October 2008
Hatch AO (2006) Generalized linear kernels for one-versus-all classification: application to speaker recognition. In: Proceedings of ICASSP, Toulouse, France
Ioffe S (2006) Probabilistic linear discriminant analysis. In: Proceedings of ECCV, pp 531–542
Joint factor analysis matlab demo. http://speech.fit.vutbr.cz/software/joint-factor-analysis-matlab-demo/
Bonastre J, Wils F, Meignier S (2005) Alize, a free toolkit for speaker recognition. In: Proceedings of the ICASSP, vol 1, pp 737–740
Hmm toolkit (htk). http://htk.eng.cam.ac.uk/
Facebook users by age.http://en.wikipedia.org/wiki/Facebook#Reception
Tools for teaching privacy to k12 and undergraduate students.http://teachingprivacy.icsi.berkeley.edu
Acknowledgments
This material is based upon work supported by the National Science Foundation under Grant No. CNS-1065240. Any opinions, findings, and conclusions or recommendations expressed in this material are those of the authors and do not necessarily reflect the views of the National Science Foundation. We thank Michael Ellsworth for his rewording suggestions.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Friedland, G., Janin, A., Lei, H., Choi, J., Sommer, R. (2015). Content-Based Privacy for Consumer-Produced Multimedia. In: Baughman, A., Gao, J., Pan, JY., Petrushin, V. (eds) Multimedia Data Mining and Analytics. Springer, Cham. https://doi.org/10.1007/978-3-319-14998-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-319-14998-1_7
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-14997-4
Online ISBN: 978-3-319-14998-1
eBook Packages: Computer ScienceComputer Science (R0)