Private cloud and media privacy in social networks

Privacy rules imposed by social networks (SNs) impose several restrictions to user privacy. Though they usually offer the user some control to limit access to his own data, the social network may share uploaded data with other partners and marketing companies. Pictures and videos may have a second life, even after being deleted by the user, and consequently storage and access must take place in the user home domain or facilities managed by the user, following an end to end approach. We propose to combine the usage of private clouds, specialized in media contents, in cooperation with SNs, offering the user complete control over his data, while benefiting from the SNs visibility to announce and spread the data. To achieve transparency, we propose a plug-in system to embed links as annotations in reduced media replacement uploaded in the SN. These links point to the real resource stored in the private cloud, now under complete user control. We perform validation tests which show important improvements in uploading time and user experience.

[1]  Milind A. Bhandarkar,et al.  MapReduce programming with apache Hadoop , 2010, 2010 IEEE International Symposium on Parallel & Distributed Processing (IPDPS).

[2]  Hsiang-Cheh Huang,et al.  Reversible data hiding with histogram-based difference expansion for QR code applications , 2011, IEEE Transactions on Consumer Electronics.

[3]  Eran Hammer-Lahav,et al.  The OAuth 1.0 Protocol , 2010, RFC.

[4]  Yong Man Ro,et al.  Content sharing between home networks by using personal information and associated fuzzy vault scheme , 2009, IEEE Transactions on Consumer Electronics.

[5]  Dan Wing,et al.  Session Traversal Utilities for NAT (STUN) , 2020, RFC.

[6]  Andrés Marín López,et al.  Media cloud: an open cloud computing middleware for content management , 2011, IEEE Transactions on Consumer Electronics.

[7]  Abdulmotaleb El-Saddik,et al.  A Survey of RST Invariant Image Watermarking Algorithms , 2006, 2006 Canadian Conference on Electrical and Computer Engineering.

[8]  Iván Arce,et al.  Guest Editors' Introduction: In Cloud Computing We Trust - But Should We? , 2010, IEEE Secur. Priv..

[9]  Lori M. Kaufman,et al.  Data Security in the World of Cloud Computing , 2009, IEEE Security & Privacy.