Open Access   Article Go Back

An Adaptive Privacy Policy Prediction for Classifying the Images as Public and Private for Secured Transaction

Kavitha S1 , H Girisha2

Section:Review Paper, Product Type: Journal Paper
Volume-4 , Issue-4 , Page no. 69-72, Apr-2016

Online published on Apr 27, 2016

Copyright © Kavitha S , H Girisha . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Kavitha S , H Girisha, “An Adaptive Privacy Policy Prediction for Classifying the Images as Public and Private for Secured Transaction,” International Journal of Computer Sciences and Engineering, Vol.4, Issue.4, pp.69-72, 2016.

MLA Style Citation: Kavitha S , H Girisha "An Adaptive Privacy Policy Prediction for Classifying the Images as Public and Private for Secured Transaction." International Journal of Computer Sciences and Engineering 4.4 (2016): 69-72.

APA Style Citation: Kavitha S , H Girisha, (2016). An Adaptive Privacy Policy Prediction for Classifying the Images as Public and Private for Secured Transaction. International Journal of Computer Sciences and Engineering, 4(4), 69-72.

BibTex Style Citation:
@article{S_2016,
author = {Kavitha S , H Girisha},
title = {An Adaptive Privacy Policy Prediction for Classifying the Images as Public and Private for Secured Transaction},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {4 2016},
volume = {4},
Issue = {4},
month = {4},
year = {2016},
issn = {2347-2693},
pages = {69-72},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=860},
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=860
TI - An Adaptive Privacy Policy Prediction for Classifying the Images as Public and Private for Secured Transaction
T2 - International Journal of Computer Sciences and Engineering
AU - Kavitha S , H Girisha
PY - 2016
DA - 2016/04/27
PB - IJCSE, Indore, INDIA
SP - 69-72
IS - 4
VL - 4
SN - 2347-2693
ER -

VIEWS PDF XML
4731 1368 downloads 1415 downloads
  
  
           

Abstract

With the expanding volume of pictures clients offer through social locales, keeping up security has turned into a noteworthy issue, as exhibited by a late influx of advanced episodes where clients unintentionally shared individual data. In light of these episodes, the need of apparatuses to offer clients some assistance with controlling access to their common substance is evident. Toward tending to this need, we propose an Adaptive Privacy Policy Prediction (A3P) framework to offer clients some assistance with composing protection settings for their pictures. We look at the part of social connection, picture substance, and metadata as could be expected under the circumstances pointers of clients' security inclinations. We propose a two-level system which as indicated by the client's accessible history on the site, decides the best accessible security approach for the client's pictures being transferred. Our solution relies on an image classification framework for image categories which may be associated with similar policies, and on a policy prediction algorithm to automatically generate a policy for each newly uploaded image, also according to users’ social features. Over time, the generated policies will follow the evolution of users’ privacy attitude. We provide the results of our extensive evaluation over 5,000 policies, which demonstrate the effectiveness of our system, with prediction accuracies over 90 percent.

Key-Words / Index Term

A3P, Metadata, Policies, Content sharing, Privacy, Prediction

References

[1] Mr. Pankaj Sareen and Dr. Tripat Deep Singh “Data Security in Cloud”, International Journal of Computer Science Engineering (IJCSE) ISSN : 2319-7323, Vol. 4 No.05 Sep 2015
[2]A. Acquisti and R. Gross, “Imagined communities: Awareness, information sharing, and privacy on the facebook,” in Proc. 6th Int. Conf. Privacy Enhancing Technol. Workshop, 2006, pp. 36–58.
[3] R. Agrawal and R. Srikant,“Fast algorithms for mining association rules in large databases,” in Proc. 20th Int. Conf. Very Large Data Bases, 1994, pp. 487–499.
[4] S. Ahern, D. Eckles, N. S. Good, S. King, M. Naaman, and R. Nair, “Over-exposed?: Privacy patterns and considerations in online and mobile photo sharing,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 357–366.
[5] M. Ames and M. Naaman, “Why we tag: Motivations for annotation in mobile and online media,” in Proc. Conf. Human Factors Comput. Syst., 2007, pp. 971–980.
[6] A. Besmer and H. Lipford, “Tagged photos: Concerns, perceptions, and protections,” in Proc. 27th Int. Conf. Extended Abstracts Human Factors Comput. Syst., 2009, pp. 4585–4590.
[7] D. G. Altman and J. M. Bland ,“Multiple significance teJava The complete Reference.
[8] .My SQL Reference Books.