Advertisement

A Flexible Image-Based Access Control Model for Social Networks

  • Bechara Al Bouna
  • Richard Chbeir
  • Alban Gabillon
  • Patrick Capolsini
Chapter
Part of the Lecture Notes in Social Networks book series (LNSN)

Abstract

Nowadays, social network are tremendously spreading their tentacles over the web community providing appropriate and well adapted tools for sharing images. A fundamental glitch to consider is their ability to provide suitable techniques to preserve individuals’ privacy. Indeed, there is an urgent need to guarantee privacy by making available to end-users, tools to enforce their privacy constraints. This cannot be done over images as simple as it has been designed so far for textual data. In fact, images, as all other multimedia objects are of complex structure due to the gap between their raw data and their actual semantic descriptions. Without these descriptions, protecting their content is a difficult matter which outlines the premise of our work. In this chapter, we present a novel security model for image content protection. In our model, we provide dynamic security rules based on first order logic to express constraints that can be applied to contextual information as well as low level features of images. We finally discuss a set of experiments and studies carried out to evaluate the proposed approach.

Keywords

Access Control Security Policy Priority Level Integrity Constraint Salient Object 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

References

  1. 1.
    Abou El Kalam, A., Baida, R.E., Balbiani, P., Benferhat, S., Cuppens, F., Deswarte, Y., Miège, A., Saurel, C., Trouessin, G.: Organization Based Access Control. In: 4th IEEE International Workshop on Policies for Distributed Systems and Networks (Policy’03), June 2003Google Scholar
  2. 2.
    Adam, N.R., Atluri, V., Bertino, E., Ferrari, E.: Content-based authorization model for digital libraries. IEEE Trans. Knowl. Data Eng. 14(2), 296–315 (2002)CrossRefGoogle Scholar
  3. 3.
    Al Bouna, B., Chbeir, R.: Content-based policy specification for multimedia authorization and access control model. In: Cyber Warfare and Cyber Terrorism, pp. 345–357. Idea Group Reference, 2007Google Scholar
  4. 4.
    Al Bouna, B., Chbeir, R., Gabillon, A.: The image protector - a flexible security rule specification toolkit. In: SECRYPT, pp. 345–350, 2011Google Scholar
  5. 5.
    Al Bouna, B., Chbeir, R., Miteran, J.: Mca2cm: Multimedia context-aware access control model. In: Intelligence and Security Informatics, pp. 115–123. IEEE, New Brunswick, New Jersey (2007)Google Scholar
  6. 6.
    Androutsos, D., Plataniotis, K.N., Venetsanopoulos, A.N.: A novel vector-based approach to color image retrieval using a vector angular-based distance measure. Comput. Vis. Image Understand. 75, 46–58 (1999)CrossRefGoogle Scholar
  7. 7.
    Atluri, V., Ae Chun, S.: An authorization model for geospatial data. IEEE Trans. Dependable Sec. Comput. 1(4), 238–254 (2004)CrossRefGoogle Scholar
  8. 8.
    Bertino, E., Fan, J., Ferrari, E., Hacid, M.-S., Elmagarmid, K.A., Zhu, X.: A hierarchical access control model for video database systems. ACM Trans. Inf. Syst. 155–191 (2003)Google Scholar
  9. 9.
    Bertino, E., Hammad, M.A., Aref, W.G., Elmagarmid, A.K.: Access control model for video databases. In: 9th International Conference on Information Knowledge Management, CIKM, pp. 336–343, 2000Google Scholar
  10. 10.
    Boyle, M., Edwards, C., Greenberg, S.: The effects of filtered video on awareness and privacy. In: CSCW, pp. 1–10. ACM, Philadelphia, Pennsylvania (2000)Google Scholar
  11. 11.
    Chen, T.-Y.: Knowledge sharing in virtual enterprises via an ontology-based access control approach. Comput. Ind. 59(5), 502–519 (2008)CrossRefGoogle Scholar
  12. 12.
    Egenhofer, M.J., Frank, A.U., Jackson, J.P.: A topological data model for spatial databases. In: SSD, pp. 271–286, 1989Google Scholar
  13. 13.
    Fan, J., Luo, H., Hacid, M.-S., Bertino, E.: A novel approach for privacy-preserving video sharing. In: CIKM, pp. 609–616. ACM, Bremen, Germany (2005)Google Scholar
  14. 14.
    Gabillon, A., Capolsini, P.: Rule-based policy enforcement point for map services. In: ACM SIGSPATIAL International Workshop on Security and Privacy in GIS and LBS. ACM, San Jose, CA (2010)Google Scholar
  15. 15.
    Gabillon, A., Capolsini, P.: Security mechanisms for geographic data. In: International Conference on Management of Emergent Digital EcoSystems (MEDES), pp. 297–302, Bangkok, Thailand (2010)Google Scholar
  16. 16.
    Gabillon, A., Capolsini, P.: Enforcing protection mechanisms for geographic data (to appear). In: International Symposium on Web and Wireless Geographical Information Systems (W2GIS). Naples, Italy (2012)Google Scholar
  17. 17.
    Horrocks, I., Patel-Schneider, P.F., Boley, H., Tabet, S., Grosof, B., Dean, M.: Swrl: A semantic web rule language combining owl and ruleml, 07 2010Google Scholar
  18. 18.
    Joshi, J.B.D., Li, K., Fahmi, H., Shafiq, B., Ghafoor, A.: A model for secure multimedia document database system in a distributed environment. IEEE Trans. Multimed. Special Issue Multimedia Databases 215–234 (2002)Google Scholar
  19. 19.
    Li, N., Mitchell, J.C.: Understanding spki/sdsi using first-order logic. In: CSFW, pp. 89, 2003Google Scholar
  20. 20.
    Masoumzadeh, A., Joshi, J.B.D.: Osnac: An ontology-based access control model for social networking systems. In: SocialCom/PASSAT, pp. 751–759, 2010Google Scholar
  21. 21.
    Pan, L., Zhang, C.N.: A web-based multilayer access control model for multimedia applications in mpeg-7. Int. J. Netw. Secur. 4(2), 155–165 (2007)MathSciNetGoogle Scholar
  22. 22.
    Pan, L., Zhang, C.N.: A criterion-based multilayer access control approach for multimedia applications and the implementation considerations. ACM Trans. Multimed. Comput. Comm. Appl. 5 17:1–17:29 (2008)Google Scholar
  23. 23.
    Raad, E., Chbeir, R., Dipanda, A.: User profile matching in social networks. In: NBiS, pp. 297–304, 2010Google Scholar
  24. 24.
    Sharma, L.K., Vyas, O.P., Tiwary, U.S., Vyas, R.: A novel approach of multilevel positive and negative association rule mining for spatial databases. In: MLDM, pp. 620–629, 2005Google Scholar
  25. 25.
    Thuraisingham, B.M.: Security and privacy for multimedia database management systems. Multimed. Tool Appl. (33), 13–29 (2007)CrossRefGoogle Scholar
  26. 26.
    Thuraisingham, B.M., Lavee, G., Bertino, E., Fan, J., Khan, L.: Access control, confidentiality and privacy for video surveillance databases. In: SACMAT, pp. 1–10. ACM, California, USA (2006)Google Scholar

Copyright information

© Springer-Verlag GmbH Wien 2013

Authors and Affiliations

  • Bechara Al Bouna
    • 1
  • Richard Chbeir
    • 2
  • Alban Gabillon
    • 3
  • Patrick Capolsini
    • 3
  1. 1.Ticket LabsAntonine UniversityBaabda BeirutLebanon
  2. 2.LIUPPA LaboratoryUniversity of Pau and Adour CountriesAnglet CedexFrance
  3. 3.GePaSud LaboratoryUniversity of French PolynesiaPunaauiaFrance

Personalised recommendations