Proceedings 2018 Network and Distributed System Security Symposium 2018
DOI: 10.14722/ndss.2018.23002
|View full text |Cite
|
Sign up to set email alerts
|

Consensual and Privacy-Preserving Sharing of Multi-Subject and Interdependent Data

Abstract: Individuals share increasing amounts of personal data online. This data often involves-or at least has privacy implications for-data subjects other than the individual who shares it (e.g., photos, genomic data) and the data is shared without their consent. A popular example, with dramatic consequences, is revenge pornography. In this paper, we propose ConsenShare, a system for sharing, in a consensual (wrt the data subjects) and privacy-preserving (wrt both service providers and other individuals) way, data in… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1

Citation Types

0
31
0

Year Published

2019
2019
2023
2023

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 21 publications
(31 citation statements)
references
References 54 publications
0
31
0
Order By: Relevance
“…Furthermore, the approach does not take into account the effect of types of data items under consideration. In a rather restrictive proposal by Olteanu et al [66], photos can only be uploaded to a social network site with all faces detected in it being removed, only allowing to display them after the corresponding person has explicitly agreed.…”
Section: Data Co-ownershipmentioning
confidence: 99%
“…Furthermore, the approach does not take into account the effect of types of data items under consideration. In a rather restrictive proposal by Olteanu et al [66], photos can only be uploaded to a social network site with all faces detected in it being removed, only allowing to display them after the corresponding person has explicitly agreed.…”
Section: Data Co-ownershipmentioning
confidence: 99%
“…In general, cryptography can be helpful in the case of interdependent privacy (mostly for co-owned data as cryptographic techniques are data agnostic, and therefore cannot address data correlation issues per se), to hide information to certain adversarial parties. For instance to share content online or decide on the visibility of some shared content without the service providers and unauthorized users having access to it [Beato and Peeters 2014;Ilia et al 2015;Olteanu et al 2018;Palomar et al 2016] (see Sec. 5.2 and more specifically Table 4 on page 31).…”
Section: Cryptographymentioning
confidence: 99%
“…Manuscript submitted to ACM photo users access control (trust, sensitivity, visibility) [Hu et al 2013] photo users access control (weighted voting) [Beato and Peeters 2014] photo users cryptography (secret sharing) [González-Manzano et al 2014] photo users access control (fine-grained) [Guo et al 2014] generic mobile apps access control (fine-grained) [Ilia et al 2015] photo users access control (fine-grained) + obfuscation [Aditya et al 2016] photo users cryptography (homomorphic encryption) [Mehregan and Fong 2014] generic users access control (discretionary) [Mehregan and Fong 2016] generic users access control (relationship-based) [Such and Rovatsos 2016] photo users access control (negotiation/action vector) [Keküllüoğlu et al 2016] photo users access control (negotiation/action vector) [Palomar et al 2016] photo users cryptography (attribute-based credential) [Rathore and Tripathy 2016] generic users access control (majority voting) [Misra and Such 2017a,b] photo users policy recommandation [Ilia et al 2017] generic service provider cryptography (secret sharing) [Guarnieri et al 2017] medical data users access control (inference control) [Li et al 2017a] photo users obfuscation [Xu et al 2017] photo users access control (veto voting) [Li et al 2017b] photo users access control (fine-grained) [Harkous and Aberer 2017] file cloud storage apps privacy meter (for users) [Zhong et al 2018] photo users access control (neural network detection) [Olteanu et al 2018 show that, despite their popularity, blurring and pixelating are ineffective at obfuscating users, and that inpainting (i.e., removing the user entirely and replacing her with something visually consistent with the image) and avatar (i.e., replacing the user with an avatar that preserves some of the elements of the initial representation) are the best options.…”
Section: Technical Solutionsmentioning
confidence: 99%
See 2 more Smart Citations