浏览全部资源
扫码关注微信
1. 中国科学院信息工程研究所,北京 100093
2. 中国科学院大学网络空间安全学院,北京 100049
3. 西安电子科技大学网络与信息安全学院,陕西 西安 710071
[ "李凤华(1966- ),男,湖北浠水人,博士,中国科学院信息工程研究所研究员、博士生导师,主要研究方向为网络与系统安全、信息保护、隐私计算。" ]
[ "孙哲(1987- ),男,安徽安庆人,中国科学院信息工程研究所博士生,主要研究方向为信息保护、隐私计算。" ]
[ "牛犇(1984- ),男,陕西西安人,博士,中国科学院信息工程研究所副研究员,主要研究方向为网络安全、隐私计算。" ]
[ "曹进(1985- ),男,陕西西安人,博士,西安电子科技大学副教授、硕士生导师,主要研究方向为应用密码学、安全协议分析、无线网络安全。" ]
[ "李晖(1968- ),男,河南灵宝人,博士,西安电子科技大学教授、博士生导师,主要研究方向为密码学、无线网络安全、云计算安全、信息论与编码理论。" ]
网络出版日期:2019-07,
纸质出版日期:2019-07-25
移动端阅览
李凤华, 孙哲, 牛犇, 等. 跨社交网络的隐私图片分享框架[J]. 通信学报, 2019,40(7):1-13.
Fenghua LI, Zhe SUN, Ben NIU, et al. Privacy-preserving photo sharing framework cross different social network[J]. Journal on communications, 2019, 40(7): 1-13.
李凤华, 孙哲, 牛犇, 等. 跨社交网络的隐私图片分享框架[J]. 通信学报, 2019,40(7):1-13. DOI: 10.11959/j.issn.1000-436x.2019107.
Fenghua LI, Zhe SUN, Ben NIU, et al. Privacy-preserving photo sharing framework cross different social network[J]. Journal on communications, 2019, 40(7): 1-13. DOI: 10.11959/j.issn.1000-436x.2019107.
针对图片转发场景下隐私泄露的问题,提出了一种跨社交网络的隐私图片分享框架,可用于图片隐私信息的延伸控制和溯源取证。延伸控制方案利用基于传播链的访问控制模型限制后续用户的操作权限,并将隐私策略嵌入图片文件,通过图片加密算法保护图片隐私信息和隐私策略的机密性、完整性,确保用户隐私策略被正确执行。该方案不受限于任何现有社交网络图片分享平台,并且能够有效防止非授权转发造成的图片隐私信息泄露威胁。在此基础上,溯源取证方案记录用户的操作行为,并通过嵌套签名方案防止恶意用户篡改和伪造溯源记录,为跨社交网络的图片隐私侵犯行为溯源取证提供技术手段。实验结果验证了所提方案的有效性和效率。
With rapid developments of digital photography and social networks
users of photo-sharing-supported social networking applications can easily forward photos across different social networks at the cost of their growing privacy concerns.To address this problem
a privacy-preserving photo sharing framework was proposed
which could apply to extended control and privacy invasion tracing.In extended control scheme
the following users on a dissemination chain was restrained by each user’s privacy policy.Then several privacy areas of photos were encrypted and the access control polices were bound to the uploaded photos
so that any privacy areas on the photos could be hidden away from unwanted viewers even across different social networks.On this basis
the behaviors of users were record by tracing scheme of privacy invasion
the integrality of records was protected by using nested signature algorithm.The correctness
security and performance of overhead of the scheme are then thoroughly analyzed and evaluated via detailed simulations.
HU H , AHN G J , JORGENSEN J . Multiparty access control for online social networks:model and mechanisms [J ] . IEEE Transactions on Knowledge and Data Engineering , 2013 , 25 ( 7 ): 1614 - 1627 .
ILIA P , POLAKIS I , ATHANASOPOULOS E , et al . Face/off:preventing privacy leakage from photos in social networks [C ] // The 22nd ACM SIGSAC Conference on Computer and Communications Security . 2015 : 781 - 792 .
VISHWAMITRA N , LI Y , WANG K , et al . Towards PII-based multiparty access control for photo sharing in online social networks [C ] // The 22nd ACM on Symposium on Access Control Models and Technologies . 2017 : 155 - 166 .
XU K , GUO Y , GUO L , et al . My privacy my decision:control of photo sharing on online social networks [J ] . IEEE Transactions on Dependable and Secure Computing , 2017 , 14 ( 2 ): 199 - 210 .
LI F , LI Z , HAN W , et al . Cyberspace-oriented access control:a cyberspace characteristics based model and its policies [J ] . IEEE Internet of Things Journal , 2018 , 6 ( 2 ): 1471 - 1483 .
LI F , SUN Z , NIU B , et al . HideMe:privacy-preserving photo sharing on social networks [C ] // The 38th IEEE International Conference on Computer Communications . 2019 : 154 - 162 .
RA M R , GOVINDAN R , ORTEGA A . P3:toward privacy-preserving photo sharing [C ] // The 10th USENIX Symposium on Networked Systems Design and Implementation . USENIX , 2013 : 515 - 528 .
ZHANG L , JUNG T , LIU C , et al . Pop:privacy-preserving outsourced photo sharing and searching for mobile devices [C ] // The 35th IEEE International Conference on Distributed Computing Systems . 2015 : 308 - 317 .
HE J , LIU B , KONG D , et al . Puppies:transformation-supported personalized privacy preserving partial image sharing [C ] // The 46th Annual IEEE/IFIP International Conference on Dependable Systems and Networks . 2016 : 359 - 370 .
SUN W , ZHOU J , ZHU S , et al . Robust privacy-preserving image sharing over online social networks (OSNs) [J ] . ACM Transactions on Multimedia Computing,Communications,and Applications , 2018 , 14 ( 1 ):14.
李晖 . 隐私计算—面向隐私保护的新型计算 [J ] . 信息通信技术 , 2018 , 12 ( 6 ): 4 - 6 .
LI H . Privacy computing:a new computing model for privacy preserving [J ] . Information and Communications Technologies , 2018 , 12 ( 6 ): 4 - 6 .
KARJOTH G , SCHUNTER M , WAIDNER M . Platform for enterprise privacy practices:privacy-enabled management of customer data [C ] // Springer International Workshop on Privacy Enhancing Technologies . 2002 : 69 - 84 .
薛见新 , 申德荣 , 寇月 , 等 . 面向数据融合的半环溯源计算方法 [J ] . 计算机研究与发展 , 2016 , 53 ( 2 ): 316 - 325 .
XUE J X , SHEN D R , KOU Y , et al . Semiring provenance for data fusion [J ] . Journal of Computer Research and Development , 2016 , 53 ( 2 ): 316 - 325 .
王梁 , 周光焱 , 王黎维 , 等 . 不确定关系数据属性级溯源表示与概率计算 [J ] . 软件学报 , 2014 , 25 ( 4 ): 863 - 879 .
WANG L , ZHOU G Y , WANG L W , et al . Attribute level lineage and probabilistic computation of uncertain data [J ] . Journal of Software , 2014 , 25 ( 4 ): 863 - 879 .
SUN L , PARK J , NGUYEN D , et al . A provenance-aware access control framework with typed provenance [J ] . IEEE Transactions on Dependable and Secure Computing , 2016 , 13 ( 4 ): 411 - 423 .
张聿博 , 张锡哲 , 张斌 . 面向社交网络信息源定位的观察点部署方法 [J ] . 软件学报 , 2014 , 25 ( 12 ): 2837 - 2851 .
ZHANG Y B , ZHANG X Z , ZHANG B . Observer deployment method for locating the information source in social network [J ] . Journal of Software , 2014 , 25 ( 12 ): 2837 - 2851 .
付安民 , 秦宁元 , 宋建业 , 等 . 云端多管理者群组共享数据中具有隐私保护的公开审计方案 [J ] . 计算机研究与发展 , 2015 , 52 ( 10 ): 2353 - 2362 .
FU A M , QIN N Y , SONG J Y , et al . Privacy-preserving public auditing for multiple managers shared data in the cloud [J ] . Journal of Computer Research and Development , 2015 , 52 ( 10 ): 2353 - 2362 .
SUCH J M , CRIADO N . Resolving multi-party privacy conflicts in social media [J ] . IEEE Transactions on Knowledge and Data Engineering , 2016 , 28 ( 7 ): 1851 - 1863 .
XU Y , PRICE T , FRAHM J M , et al . Virtual U:defeating face liveness detection by building virtual models from your public photos [C ] // The 25th USENIX Security Symposium . 2016 : 497 - 512 .
FOGUES R L , MURUKANNAIAH P K , SUCH J M , et al . Sharing policies in multiuser privacy scenarios:Incorporating context,preferences,and arguments in decision making [J ] . ACM Transactions on Computer-Human Interaction , 2017 , 24 ( 1 ):5.
LI F , SUN Z , NIU B , et al . SRIM scheme:an impression-management scheme for privacy-aware photo-sharing users [J ] . Engineering , 2018 , 4 ( 1 ): 85 - 93 .
YUAN X , WANG X , WANG C , et al . Enabling privacy-preserving image-centric social discovery [C ] // The 34th IEEE International Conference on Distributed Computing Systems . IEEE , 2014 : 198 - 207 .
HE J , LIU B , BAO X , et al . On privacy preserving partial image sharing [C ] // The 35th IEEE International Conference on.Distributed Computing Systems . IEEE , 2015 : 758 - 759 .
FERREIRA B , RODRIGUES J , LEITAO J , et al . Privacy-preserving content-based image retrieval in the cloud [C ] // The 34th IEEE Symposium on Reliable Distributed Systems . IEEE , 2015 : 11 - 20 .
YUAN L , KORSHUNOV P , EBRAHIMI T . Secure JPEG scrambling enabling privacy in photo sharing [C ] // The 11th IEEE International Conference and Workshops on Automatic Face and Gesture Recognition . IEEE , 2015 , 4 : 1 - 6 .
NOURIAN A , MAHESWARAN M . Privacy aware image template matching in clouds using ambient data [J ] . The Journal of Supercomputing , 2013 , 66 ( 2 ): 1049 - 1070 .
PEARSON S , MONT M C , KOUNGA G . Enhancing accountability in the cloud via sticky policies [C ] // Springer FTRA International Conference on Secure and Trust Computing,Data Management,and Application . 2011 : 146 - 155 .
SPYRA G , BUCHANAN W J , EKONOMOU E . Sticky policies approach within cloud computing [J ] . Elsevier Computers & Security , 2017 , 70 : 366 - 375 .
PARK J , NGUYEN D , SANDHU R . A provenance-based access control model [C ] // The 10th Annual International Conference on Privacy,Security and Trust . 2012 : 137 - 144 .
BATES A M , TIAN D , BUTLER K R B , et al . Trustworthy whole-system provenance for the Linux kernel [C ] // The 24th USENIX security symposium . USENIX , 2015 : 319 - 334 .
李彪 . 微博中热点话题的内容特质及传播机制研究——基于新浪微博 6025 条高转发微博的数据挖掘分析 [J ] . 中国人民大学学报 , 2013 , 27 ( 5 ): 10 - 17 .
LI B . Research on content characteristics and communication mechanism of hot topics in weibo--data mining and analysis based on sina weibo 6025 highly retweeted microblogs [J ] . Journal of Renmin University of China , 2013 , 27 ( 5 ): 10 - 17 .
ZHANG L , BO C , HOU J , et al . Kaleido:you can watch it but cannot record it [C ] // The 21st ACM Annual International Conference on Mobile Computing and Networking . 2015 : 372 - 385 .
0
浏览量
1600
下载量
0
CSCD
关联资源
相关文章
相关作者
相关机构