Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/2668260.2668280acmotherconferencesArticle/Chapter ViewAbstractPublication PagesmedesConference Proceedingsconference-collections
tutorial

MOP: A Privacy Preserving Model for Multimedia Objects

Published: 15 September 2014 Publication History
  • Get Citation Alerts
  • Abstract

    Recently, multimedia and internet technologies have been in rapid development. Multimedia objects, such as images, video, audio tracks and multimedia documents, have been widely used and are in remarkable growth. Almost everyone on social network publishes or has some multimedia objects stored somewhere. Although multimedia objects are of different types, they can be treated as one entity when it comes to privacy which is our concern in this paper. Many researchers tried to apply some security on multimedia objects. In this work we aim to provide a model to protect multimedia objects from being accessed or altered by unwanted personnel.

    References

    [1]
    Jackson, D. 2002. D. Jackson. Alloy: a lightweight object modeling notation. ACM Transaction on Software Engineering and Methodology (TOSEM), 11(2):256--290.
    [2]
    Aïmeur, E., Gambs, S., & Ho, A. 2009. UPP: user privacy policy for social networking sites. In Proceedings of the IEEE Fourth International Conference Internet and Web Applications and Services, (ICIW '09), 267-- 272. Montreal, QC, 267--272.
    [3]
    Al Bouna, B., Raad, E. j., Elia, C., Chbeir, R., & Haraty, R. 2013. de-Linkability: a privacy-preserving constraint for safely outsourcing multimedia documents. In Proceedings of the International ACM Conference on Management of Emergent Digital EcoSystems (MEDES 2013). Neumunster Abbey, Luxembourg.
    [4]
    Joshi, J., Aref, W., Ghafoor, A., & Spafford, E. 2001. Security models for web-based applications. Communications of the ACM, (Feb. 2001), 38--44.
    [5]
    Joshi, J. B., Kevin Li, Z., Fahmi, H., Shafiq, B., & Ghafoor, A. 2002. A model for secure multimedia document database system in a distributed environment. IEEE Transactions on Multimedia, volume 4, issue 2, 215--234.
    [6]
    Kodali, N., Farkas, C., & Wijesekera, D. 2004. An authorization model for multimedia digital libraries. International Journal on Digital Libraries, 4: / Digital Object Identifier (DOI) 10.1007/s00799-004-0080-1, 139--155.
    [7]
    Hangzai Luo, J. F., Hacid, M., & Bertino, E. 2005. A novel approach for privacy-preserving video sharing. In Proceedings of the CIKM Confernece, Bremen, Germany, 609--616.
    [8]
    Lian, S., Kanellopoulos, D., & Ruffo, G. 2009. Recent advances in multimedia information system security. Informatica 33, 3--24.
    [9]
    Ridzon, R., & Levicky, D. 2009. Multimedia security and multimedia content protection. In Proceedings of the International Symposium ELMAR, Zadar, Croatia, 104--109.
    [10]
    Al Bouna, B., Chbeir, R., & Marrara, S. 2009. Enforcing role based access control model with multimedia signatures. Journal of Systems Architecture, volume 55, issue 4, 264--274.
    [11]
    Al Bouna, B., Chbeir, R., & Gabillon, A. 2011. The image protector: a flexible security rule specification toolkit. In Proceedings of the International Conference on Security and Cryptography. Seville, Spain.
    [12]
    Saad, S., Al Bouna, B., & Chbeir, R. 2011. Privacy preserving via tree augmented naive Bayesian classifier in multimedia databases. In Proceedings of the ACM Conference on Management of Emergent Digital EcoSystems (MEDES 2011), San Francisco, USA, 297--204.
    [13]
    Ben Dhia, I., Abdessalem, T., & Sozio, M. 2012. Primates: A privacy management system for social networks. In Proceedings of the ACM CIKM'12 Conference, Maui, HI, USA, 2746--2749.
    [14]
    Zhuo, L., Diao, M., Zhang, J., & Li, Z. 2013. Hierarchical privacy preservation for personalized image retrieval. In Proceedings of the ACM ICIMCS Conference, Huangshan, Anhui, China, 291--295.
    [15]
    Netscape. (1998, June 5). DMOZ. Retrieved April 20, 2014, from wikipedia: http://en.wikipedia.org/wiki/DMOZ.
    [16]
    Panda, B., Perrizo, W., & Haraty, R. A. 1994. Secure transaction management and query processing in multilevel secure database systems. In Proceedings of the ACM Symposium on Applied Computing. Phoenix, AZ, USA, 363--368.
    [17]
    Haraty, R. A., & Massalkhy, S. 2013. UPP+: A flexible user privacy policy for social networking services. Security and Privacy Preserving in Social Networks. Springer-Verlag Wien. ISBN 978-3-7091-0893-2.
    [18]
    Haraty, R. A., Naous, M., & Mourad, A. 2014. Assuring Consistency in Mixed Models. Journal of Computational Science. ISSN: 1877 - 7503. 10.1016/j.jocs.2014.02.009, 653--663.

    Index Terms

    1. MOP: A Privacy Preserving Model for Multimedia Objects

      Recommendations

      Comments

      Information & Contributors

      Information

      Published In

      cover image ACM Other conferences
      MEDES '14: Proceedings of the 6th International Conference on Management of Emergent Digital EcoSystems
      September 2014
      225 pages
      ISBN:9781450327671
      DOI:10.1145/2668260
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      In-Cooperation

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 15 September 2014

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. Multimedia objects
      2. Privacy
      3. Security
      4. Social Networks

      Qualifiers

      • Tutorial
      • Research
      • Refereed limited

      Conference

      MEDES '14

      Acceptance Rates

      Overall Acceptance Rate 267 of 682 submissions, 39%

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • 0
        Total Citations
      • 58
        Total Downloads
      • Downloads (Last 12 months)3
      • Downloads (Last 6 weeks)0

      Other Metrics

      Citations

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media