Nothing Special   »   [go: up one dir, main page]

skip to main content
10.1145/2810103.2813603acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Face/Off: Preventing Privacy Leakage From Photos in Social Networks

Published: 12 October 2015 Publication History

Abstract

The capabilities of modern devices, coupled with the almost ubiquitous availability of Internet connectivity, have resulted in photos being shared online at an unprecedented scale. This is further amplified by the popularity of social networks and the immediacy they offer in content sharing. Existing access control mechanisms are too coarse-grained to handle cases of conflicting interests between the users associated with a photo; stories of embarrassing or inappropriate photos being widely accessible have become quite common. In this paper, we propose to rethink access control when applied to photos, in a way that allows us to effectively prevent unwanted individuals from recognizing users in a photo. The core concept behind our approach is to change the granularity of access control from the level of the photo to that of a user's personally identifiable information (PII). In this work, we consider the face as the PII. When another user attempts to access a photo, the system determines which faces the user does not have the permission to view, and presents the photo with the restricted faces blurred out. Our system takes advantage of the existing face recognition functionality of social networks, and can interoperate with the current photo-level access control mechanisms. We implement a proof-of-concept application for Facebook, and demonstrate that the performance overhead of our approach is minimal. We also conduct a user study to evaluate the privacy offered by our approach, and find that it effectively prevents users from identifying their contacts in 87.35% of the restricted photos. Finally, our study reveals the misconceptions about the privacy offered by existing mechanisms, and demonstrates that users are positive towards the adoption of an intuitive, straightforward access control mechanism that allows them to manage the visibility of their face in published photos.

References

[1]
http://dataprotection.ie/documents/facebook%20report/final%20report/report.pdf Data Protection Commissioner - Facebook Ireland Audit. {accessed Aug-2015}.
[2]
http://dataprotection.ie/documents/press/Facebook_Ireland_Audit_Review_Report_21_Sept_2012.pdf Data Protection Commissioner - Facebook Ireland Re-Audit. {accessed Aug-2015}.
[3]
http://newsroom.fb.com/company-info Facebook - Stats. {accessed Aug-2015}.
[4]
https://www.facebook.com/help/247746261926036/ Facebook - Tag Review. {accessed Aug-2015}.
[5]
http://techcrunch.com/2014/04/08/facebook-privacy-settings/ Facebook Privacy Selector. {accessed Aug-2015}.
[6]
http://www.businessinsider.com/facebook-350-million-photos-each-day-2013--9 Bussiness Insider - Facebook Users Are Uploading 350 Million New Photos Each Day. {accessed Aug-2015}.
[7]
http://www.businessinsider.com/laraine-cook-high-school-coach-fired-over-facebook-photo-2013--11 Business Insider - A High School Coach Was Fired For Facebook Photo. {accessed Aug-2015}.
[8]
http://www.cbsnews.com/news/did-the-internet-kill-privacy/ CBS news - Did the Internet Kill Privacy? {accessed Aug-2015}.
[9]
http://www.dailytech.com/Germany+Sues+Facebook+For+Violating+Users+Privacy/article18976.htm Germany Sues Facebook For Violating Users' Privacy. {accessed Aug-2015}.
[10]
http://www.emarketer.com/Article/Social-Digital-Video-Drive-Further-Growth-Time-Spent-Online/1009872 Social, Digital Video Drive Further Growth in Time Spent Online. {accessed Aug-2015}.
[11]
http://www.pewresearch.org/fact-tank/2014/02/03/6-new-facts-about-facebook/ Pew Research Center - Facebook Survey. {accessed Aug-2015}.
[12]
http://www.telegraph.co.uk/technology/facebook/10452867/Facebook-defends-using-profile-pictures-for-facial-recognition.html Telegraph - Facebook defends using profile pictures for facial recognition. {accessed Aug-2015}.
[13]
http://www.wired.com/2014/12/fb/ Wired - Facebook Envisions AI That Keeps You From Uploading Embarrassing Pics. {accessed Aug-2015}.
[14]
http://www.wired.co.uk/news/archive/2012-09/21/facebook-data-protection-audit Wired - Facebook complies with EU data protection law. {accessed Aug-2015}.
[15]
Microsoft - Online Reputation in a Connected World, 2009.
[16]
A. Acquisti and C. M. Fong. An experiment in hiring discrimination via online social networks. 2013.
[17]
M. Bertalmio, G. Sapiro, V. Caselles, and C. Ballester. Image inpainting. In SIGGRAPH '00.
[18]
A. Besmer and H. R. Lipford. Privacy perceptions of photo sharing in facebook. SOUPS '08.
[19]
A. Besmer and H. R. Lipford. Moving beyond untagging: Photo privacy in a tagged world. In Proceedings of CHI '10, 2010.
[20]
B. A. Bouna, R. Chbeir, A. Gabillon, and P. Capolsini. A flexible image-based access control model for social networks. In Security and Privacy Preserving in Social Networks. Springer, 2013.
[21]
B. A. Bouna, R. Chbeir, A. Gabillon, et al. The image protector-a flexible security rule specification toolkit. In SECRYPT, 2011.
[22]
A. Criminisi, P. Pérez, and K. Toyama. Region filling and object removal by exemplar-based image inpainting. Transactions on Image Processing, 13(9).
[23]
L. A. Cutillo, R. Molva, and M. Önen. Privacy preserving picture sharing: Enforcing usage control in distributed on-line social networks. In SNS '12, 2012.
[24]
Z. Erkin, M. Franz, J. Guajardo, S. Katzenbeisser, I. Lagendijk, and T. Toft. Privacy-preserving face recognition. In PETS, 2009.
[25]
B. Henne, M. Linke, and M. Smith. A study on the unawareness of shared photos in social network services. In Web 2.0 Security Privacy (W2SP), 2014.
[26]
H. Hu, G.-J. Ahn, and J. Jorgensen. Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In ACSAC '11.
[27]
H. Hu, G.-J. Ahn, and J. Jorgensen. Enabling collaborative data sharing in google+. In GLOBECOM'12, 2012.
[28]
G. B. Huang and E. Learned-Miller. Labeled faces in the wild: Updates and new reporting procedures. Technical Report UM-CS-2014-003, UMass Amherst.
[29]
P. Klemperer, Y. Liang, M. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. Reiter. Tag, you can see it!: Using tags for access control in photo sharing. In CHI '12.
[30]
B. P. Knijnenburg, A. Kobsa, and H. Jin. Dimensionality of information disclosure behavior. IJHCS, 71(12):1144 -- 1162, 2013.
[31]
B. Krishnamurthy and C. E. Wills. Characterizing privacy in online social networks. In WOSN '08.
[32]
Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. Analyzing facebook privacy settings: User expectations vs. reality. In IMC '11.
[33]
I. Polakis, P. Ilia, F. Maggi, M. Lancini, G. Kontaxis, S. Zanero, S. Ioannidis, and A. D. Keromytis. Faces in the distorting mirror: Revisiting photo-based social authentication. CCS'14.
[34]
I. Polakis, M. Lancini, G. Kontaxis, F. Maggi, S. Ioannidis, A. Keromytis, and S. Zanero. All your face are belong to us: Breaking facebook's social authentication. In ACSAC '12, 2012.
[35]
P. Rao, D. Lin, E. Bertino, N. Li, and J. Lobo. Fine-grained integration of access control policies. Computers & Security, 30(2--3):91--107, 2011.
[36]
A.-R. Sadeghi, T. Schneider, and I. Wehrenberg. Efficient privacy-preserving face recognition. ICISC'09.
[37]
Y. Shoshitaishvili, C. Kruegel, and G. Vigna. Portrait of a privacy invasion: Detecting relationships through large-scale photo analysis. In PETS, 2015.
[38]
J. Shotton, T. Sharp, A. Kipman, A. Fitzgibbon, M. Finocchio, A. Blake, M. Cook, and R. Moore. Real-time human pose recognition in parts from single depth images. Commun. ACM, 56(1), Jan. 2013.
[39]
A. C. Squicciarini, M. Shehab, and F. Paci. Collective privacy management in social networks. WWW '09.
[40]
A. C. Squicciarini, S. Sundareswaran, D. Lin, and J. Wede. A3P: Adaptive policy prediction for shared images over popular content sharing sites. HT '11.
[41]
Z. Stone, T. Zickler, and T. Darrell. Autotagging facebook: Social network context improves photo annotation. In CVPRW '08.
[42]
M. M. Strano and J. Wattai Queen. Covering your face on facebook. Journal of Media Psychology: Theories, Methods, and Applications, 24(4), 2012.
[43]
K. Strater and H. R. Lipford. Strategies and struggles with privacy in an online social networking community. In BCS HCI '08.
[44]
Y. Taigman, M. Yang, M. Ranzato, and L. Wolf. DeepFace: Closing the Gap to Human-Level Performance in Face Verification. In CVPR '14.
[45]
K. Thomas, C. Grier, and D. M. Nicol. Unfriendly: Multi-party privacy risks in social networks. In Proceedings of PETS'10, 2010.
[46]
A. Yamada, T. H.-J. Kim, and A. Perrig. Exploiting privacy policy conflicts in online social networks. Technical report, Carnegie Mellon University, 2012.
[47]
J. Yang, K. Hua, Y. Wang, W. Wang, H. Wang, and J. Shen. Automatic objects removal for scene completion. In INFOCOM Workshop on Security and Privacy in Big Data '14.

Cited By

View all
  • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
  • (2024)Image sensitive identification and protection based on semantic segmentationThird International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024)10.1117/12.3031222(213)Online publication date: 19-Jul-2024
  • (2024)Multilevel Privacy Protection for Social Media Based on 2-D Compressive SensingIEEE Internet of Things Journal10.1109/JIOT.2023.331381211:4(6878-6892)Online publication date: 15-Feb-2024
  • Show More Cited By

Index Terms

  1. Face/Off: Preventing Privacy Leakage From Photos in Social Networks

      Recommendations

      Comments

      Please enable JavaScript to view thecomments powered by Disqus.

      Information & Contributors

      Information

      Published In

      cover image ACM Conferences
      CCS '15: Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security
      October 2015
      1750 pages
      ISBN:9781450338325
      DOI:10.1145/2810103
      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Sponsors

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      Published: 12 October 2015

      Permissions

      Request permissions for this article.

      Check for updates

      Author Tags

      1. access control
      2. online social networks
      3. photo tagging
      4. shared photos

      Qualifiers

      • Research-article

      Funding Sources

      Conference

      CCS'15
      Sponsor:

      Acceptance Rates

      CCS '15 Paper Acceptance Rate 128 of 660 submissions, 19%;
      Overall Acceptance Rate 1,261 of 6,999 submissions, 18%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

      Contributors

      Other Metrics

      Bibliometrics & Citations

      Bibliometrics

      Article Metrics

      • Downloads (Last 12 months)96
      • Downloads (Last 6 weeks)22
      Reflects downloads up to 26 Sep 2024

      Other Metrics

      Citations

      Cited By

      View all
      • (2024)Designing Accessible Obfuscation Support for Blind Individuals’ Visual Privacy ManagementProceedings of the 2024 CHI Conference on Human Factors in Computing Systems10.1145/3613904.3642713(1-19)Online publication date: 11-May-2024
      • (2024)Image sensitive identification and protection based on semantic segmentationThird International Conference on Electronic Information Engineering, Big Data, and Computer Technology (EIBDCT 2024)10.1117/12.3031222(213)Online publication date: 19-Jul-2024
      • (2024)Multilevel Privacy Protection for Social Media Based on 2-D Compressive SensingIEEE Internet of Things Journal10.1109/JIOT.2023.331381211:4(6878-6892)Online publication date: 15-Feb-2024
      • (2024)Overview of Usable Privacy Research: Major Themes and Research DirectionsThe Curious Case of Usable Privacy10.1007/978-3-031-54158-2_3(43-102)Online publication date: 20-Mar-2024
      • (2023)ImageAllyProceedings of the Nineteenth USENIX Conference on Usable Privacy and Security10.5555/3632186.3632209(417-436)Online publication date: 7-Aug-2023
      • (2023)OptiRing: Low-Resolution Optical Sensing for Subtle Thumb-to-Index Micro-InteractionsProceedings of the 2023 ACM Symposium on Spatial User Interaction10.1145/3607822.3614538(1-13)Online publication date: 13-Oct-2023
      • (2023)The Security in Optical Wireless Communication: A SurveyACM Computing Surveys10.1145/359471855:14s(1-36)Online publication date: 28-Apr-2023
      • (2023)“Dump it, Destroy it, Send it to Data Heaven”: Blind People’s Expectations for Visual Privacy in Visual Assistance TechnologiesProceedings of the 20th International Web for All Conference10.1145/3587281.3587296(134-147)Online publication date: 30-Apr-2023
      • (2023)On the Potential of Mediation Chatbots for Mitigating Multiparty Privacy Conflicts - A Wizard-of-Oz StudyProceedings of the ACM on Human-Computer Interaction10.1145/35796187:CSCW1(1-33)Online publication date: 16-Apr-2023
      • (2023)Attribute Inference Attacks in Online Multiplayer Video Games: A Case Study on DOTA2Proceedings of the Thirteenth ACM Conference on Data and Application Security and Privacy10.1145/3577923.3583653(27-38)Online publication date: 24-Apr-2023
      • Show More Cited By

      View Options

      Get Access

      Login options

      View options

      PDF

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Media

      Figures

      Other

      Tables

      Share

      Share

      Share this Publication link

      Share on social media