Privacy.tag: privacy concern expressed and respected

The ever increasing popularity of social networks and the ever easier photo taking and sharing experience have led to unprecedented concerns on privacy infringement. Inspired by the fact that the Robot Exclusion Protocol, which regulates web crawlers' behavior according a per-site deployed robots.txt, and cooperative practices of major search service providers, have contributed to a healthy web search industry, in this paper, we propose Privacy Expressing and Respecting Protocol (PERP) that consists of a Privacy.tag -- a physical tag that enables a user to explicitly and flexibly express their privacy deal, and Privacy Respecting Sharing Protocol (PRSP) -- a protocol that empowers the photo service provider to exert privacy protection following users' policy expressions, to mitigate the public's privacy concern, and ultimately create a healthy photo-sharing ecosystem in the long run. We further design an exemplar Privacy.Tag using customized yet compatible QR-code, and implement the Protocol and study the technical feasibility of our proposal. Our evaluation results confirm that PERP and PRSP are indeed feasible and incur negligible computation overhead.

[1]  Saikat Guha,et al.  Auctions in do-not-track compliant internet advertising , 2011, CCS '11.

[2]  Mahadev Satyanarayanan,et al.  Scalable crowd-sourcing of video from mobile devices , 2013, MobiSys '13.

[3]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[4]  Brent Waters,et al.  Ciphertext-Policy Attribute-Based Encryption , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).

[5]  Martin Steinebach,et al.  Robust image obfuscation for privacy protection in Web 2.0 applications , 2012, Other Conferences.

[6]  AnguelovDragomir,et al.  Google Street View , 2010 .

[7]  Krishna P. Gummadi,et al.  Analyzing facebook privacy settings: user expectations vs. reality , 2011, IMC '11.

[8]  Orhan Bulan,et al.  Per-Colorant-Channel Color Barcodes for Mobile Applications: An Interference Cancellation Framework , 2013, IEEE Transactions on Image Processing.

[9]  Gregory D. Abowd,et al.  Preventing Camera Recording by Designing a Capture-Resistant Environment , 2005, UbiComp.

[10]  Touradj Ebrahimi,et al.  A framework for the validation of privacy protection solutions in video surveillance , 2010, 2010 IEEE International Conference on Multimedia and Expo.

[11]  Ramesh Govindan,et al.  P3: Toward Privacy-Preserving Photo Sharing , 2013, NSDI.

[12]  Niloy J. Mitra,et al.  Halftone QR codes , 2013, ACM Trans. Graph..

[13]  Lee A. Bygrave,et al.  A right to be forgotten? , 2014, Commun. ACM.

[14]  M. Koster The web robots pages , 1999 .

[15]  Emin Gün Sirer,et al.  Beehive: O(1) Lookup Performance for Power-Law Query Distributions in Peer-to-Peer Overlays , 2004, NSDI.

[16]  Wai Ho Mow,et al.  PiCode: 2D barcode with embedded picture and ViCode: 3D barcode with embedded video , 2013, MobiCom.

[17]  Mor Naaman,et al.  Over-exposed?: privacy patterns and considerations in online and mobile photo sharing , 2007, CHI.

[18]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[19]  Takayuki Yamada,et al.  Use of invisible noise signals to prevent privacy invasion through face recognition from camera images , 2012, ACM Multimedia.

[20]  Alessandro Acquisti,et al.  Imagined Communities: Awareness, Information Sharing, and Privacy on the Facebook , 2006, Privacy Enhancing Technologies.

[21]  Heather Richter Lipford,et al.  Moving beyond untagging: photo privacy in a tagged world , 2010, CHI.

[22]  Brent Waters,et al.  Attribute-based encryption for fine-grained access control of encrypted data , 2006, CCS '06.

[23]  Jon M. Kleinberg,et al.  Challenges in mining social network data: processes, privacy, and paradoxes , 2007, KDD '07.

[24]  Noboru Babaguchi,et al.  PriSurv: Privacy Protected Video Surveillance System Using Adaptive Visual Abstraction , 2008, MMM.