English | 中文

手机二维码
 
【打印本页】      【下载PDF全文】   查看/发表评论  下载PDF阅读器  关闭
←前一篇|后一篇→ 过刊浏览    高级检索
本文已被:浏览 349次   下载 562 本文二维码信息
码上扫一扫!
社交照片隐私保护机制研究进展
李凤华,孙哲,吕梦凡,牛犇
分享到: 微信 更多
(中国科学院信息工程研究所 信息安全国家重点实验室 北京 中国 100093;中国科学院大学 网络空间安全学院 北京 中国 100049)
摘要:
照片分享服务已经广泛渗透到人们生活的各个角落,这种新型服务模式及应用给人们带来便利的同时无形中泄露了用户的隐私信息,而照片分享平台上数量激增的社交照片和多样化的用户需求给隐私保护带来了更大挑战。结合国内外相关最新研究趋势,对社交网络中的照片隐私保护问题进行研究展望。首先介绍基于全生命周期的社交照片隐私保护模型、照片隐私信息分类、照片隐私保护动机和攻击者模型,以及所面临的隐私威胁;其次从社交照片生成与感知、发布与交换、存储与销毁、融合与分析4个环节介绍了其隐私保护机制研究现状;最后展望了该领域的未来研究方向。
关键词:  照片隐私保护  全生命周期  社交网络  访问控制  图像加密
DOI:10.19363/j.cnki.cn10-1380/tn.2018.03.04
投稿时间:2016-12-20修订日期:2017-02-17
基金项目:本课题得到国家重点研发计划(No.2017YFB0802203);国家自然科学基金-面上基金资助项目(No.61672515);国家科技部高技术研究发展计划("863"计划)基金资助项目(No.2015AA016007);国家自然科学基金-广东联合基金资助项目(No.U1401251)资助。
Research Progress of Photo Privacy-Preserving Mechanisms in Online Social Network
LI Fenghua,SUN Zhe,LV Mengfan,NIU Ben
State Key Laboratory of Information Security, Institute of Information Engineering, Chinese Academy of Sciences, Beijing 100093, China;School of Cyber Security, University of Chinese Academy of Sciences, Beijing 100049, China
Abstract:
The well-developed photo sharing service has infiltrated our daily life, this novel service mode provides us conveniences at the cost of our privacy. This situation becomes more serious with the increasing number of social photos and individuation of user's requirements. In this paper, we study the photo privacy-preserving mechanisms in online social networks based on analyzing the state-of-the-art research trends. Specifically, we first introduce the full life-cycle model of photo privacy, and review the information classification, defense motivation and attack models. We also present the threats and challenges of photo privacy leakage. Then, we make a comprehensive study on this research field in terms of Generation and Perception, Publication and Exchange, Storage and Disposal, Combining Analysis. Finally, we discuss the future research directions on photo privacy preservation.
Key words:  photo privacy protection  full life-cycle  online social network  access control  image encryption