aprigard:在线社交网络中隐私侵犯的自动高效检测方法

Karuna Sonone, V. Barkade
{"title":"aprigard:在线社交网络中隐私侵犯的自动高效检测方法","authors":"Karuna Sonone, V. Barkade","doi":"10.1109/ICCMC.2018.8487824","DOIUrl":null,"url":null,"abstract":"The users from the social networks like Facebook, Twitter etc. expecting that social networks can able to preserve their privacy. To address this, recently PRIGUARD framework introduced in which meta model and description logic used for describing the social network commitments and domain in order to specify the privacy needs of end users. This approach is able to detect the violations of privacy in both sound and complete. However the still there is scope of improvement in PRIGUARD method and limitations. One such limitation of PRIGUARD does not supporting the proactive violations of its commitments whenever its required to pro-vide the context dependent privacy management. In this paper we are presenting the Automated PRIGUARD (APRI-GUARD) which is based on existing PRIGUARD method. APRIGUARD method not only supports the functionality of existing PRIGUARD but also enabling the approach of proactively violates its commitments. This achieves more efficiency and security to end users privacy. The proposed approach will be used before taking a particular action for checking whether it will lead violation and hence it will results in its prevention before it happens. Antithesis, it will be utilized to do sporadic checks on the system to see if any violations have occurred.)","PeriodicalId":6604,"journal":{"name":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","volume":"82 1","pages":"945-949"},"PeriodicalIF":0.0000,"publicationDate":"2018-02-01","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"APRIGUARD: The Automatic and Eficient Method for Privacy Violations Detection in OSNs (Online Social Networks\",\"authors\":\"Karuna Sonone, V. Barkade\",\"doi\":\"10.1109/ICCMC.2018.8487824\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"The users from the social networks like Facebook, Twitter etc. expecting that social networks can able to preserve their privacy. To address this, recently PRIGUARD framework introduced in which meta model and description logic used for describing the social network commitments and domain in order to specify the privacy needs of end users. This approach is able to detect the violations of privacy in both sound and complete. However the still there is scope of improvement in PRIGUARD method and limitations. One such limitation of PRIGUARD does not supporting the proactive violations of its commitments whenever its required to pro-vide the context dependent privacy management. In this paper we are presenting the Automated PRIGUARD (APRI-GUARD) which is based on existing PRIGUARD method. APRIGUARD method not only supports the functionality of existing PRIGUARD but also enabling the approach of proactively violates its commitments. This achieves more efficiency and security to end users privacy. The proposed approach will be used before taking a particular action for checking whether it will lead violation and hence it will results in its prevention before it happens. Antithesis, it will be utilized to do sporadic checks on the system to see if any violations have occurred.)\",\"PeriodicalId\":6604,\"journal\":{\"name\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"volume\":\"82 1\",\"pages\":\"945-949\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2018-02-01\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/ICCMC.2018.8487824\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"2018 Second International Conference on Computing Methodologies and Communication (ICCMC)","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/ICCMC.2018.8487824","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
引用次数: 0

摘要

Facebook、Twitter等社交网络的用户希望社交网络能够保护他们的隐私。为了解决这个问题,最近引入了prguard框架,其中元模型和描述逻辑用于描述社交网络承诺和领域,以指定最终用户的隐私需求。这种方法能够检测到侵犯隐私的声音和完整。然而,prguard方法仍有改进的余地和局限性。prguard的一个这样的限制是,当需要提供上下文相关的隐私管理时,它不支持主动违反其承诺。本文提出了一种基于现有prguard方法的自动prguard (aprii - guard)。apguard方法不仅支持现有的prguard功能,而且还支持主动违反其承诺的方法。从而达到更高的效率和安全性,以保护最终用户的隐私。建议的方法将在采取特定行动之前使用,以检查其是否会导致违规,因此它将导致在其发生之前进行预防。相反,它将用于对系统进行零星检查,以查看是否发生了任何违规行为。)
本文章由计算机程序翻译,如有差异,请以英文原文为准。
查看原文
分享 分享
微信好友 朋友圈 QQ好友 复制链接
本刊更多论文
APRIGUARD: The Automatic and Eficient Method for Privacy Violations Detection in OSNs (Online Social Networks
The users from the social networks like Facebook, Twitter etc. expecting that social networks can able to preserve their privacy. To address this, recently PRIGUARD framework introduced in which meta model and description logic used for describing the social network commitments and domain in order to specify the privacy needs of end users. This approach is able to detect the violations of privacy in both sound and complete. However the still there is scope of improvement in PRIGUARD method and limitations. One such limitation of PRIGUARD does not supporting the proactive violations of its commitments whenever its required to pro-vide the context dependent privacy management. In this paper we are presenting the Automated PRIGUARD (APRI-GUARD) which is based on existing PRIGUARD method. APRIGUARD method not only supports the functionality of existing PRIGUARD but also enabling the approach of proactively violates its commitments. This achieves more efficiency and security to end users privacy. The proposed approach will be used before taking a particular action for checking whether it will lead violation and hence it will results in its prevention before it happens. Antithesis, it will be utilized to do sporadic checks on the system to see if any violations have occurred.)
求助全文
通过发布文献求助,成功后即可免费获取论文全文。 去求助
来源期刊
自引率
0.00%
发文量
0
期刊最新文献
Modelling of Audio Effects for Vocal and Music Synthesis in Real Time Deep Learning Framework for Diabetic Retinopathy Diagnosis A Comprehensive Survey on Internet of Things Based Healthcare Services and its Applications Exploring Pain Insensitivity Inducing Gene ZFHX2 by using Deep Convolutional Neural Network Atmospheric Weather Prediction Using various machine learning Techniques: A Survey
×
引用
GB/T 7714-2015
复制
MLA
复制
APA
复制
导出至
BibTeX EndNote RefMan NoteFirst NoteExpress
×
×
提示
您的信息不完整,为了账户安全,请先补充。
现在去补充
×
提示
您因"违规操作"
具体请查看互助需知
我知道了
×
提示
现在去查看 取消
×
提示
确定
0
微信
客服QQ
Book学术公众号 扫码关注我们
反馈
×
意见反馈
请填写您的意见或建议
请填写您的手机或邮箱
已复制链接
已复制链接
快去分享给好友吧!
我知道了
×
扫码分享
扫码分享
Book学术官方微信
Book学术文献互助
Book学术文献互助群
群 号:481959085
Book学术
文献互助 智能选刊 最新文献 互助须知 联系我们:info@booksci.cn
Book学术提供免费学术资源搜索服务,方便国内外学者检索中英文文献。致力于提供最便捷和优质的服务体验。
Copyright © 2023 Book学术 All rights reserved.
ghs 京公网安备 11010802042870号 京ICP备2023020795号-1