Call for Paper - January 2023 Edition
IJCA solicits original research papers for the January 2023 Edition. Last date of manuscript submission is December 20, 2022. Read More

A Review Study on Privacy Policy Inference of Multiple User-Uploaded Images on Social Context Websites

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Himani Singh, Mamta Bhusry

Himani Singh and Mamta Bhusry. A Review Study on Privacy Policy Inference of Multiple User-Uploaded Images on Social Context Websites. International Journal of Computer Applications 152(2):27-30, October 2016. BibTeX

	author = {Himani Singh and Mamta Bhusry},
	title = {A Review Study on Privacy Policy Inference of Multiple User-Uploaded Images on Social Context Websites},
	journal = {International Journal of Computer Applications},
	issue_date = {October 2016},
	volume = {152},
	number = {2},
	month = {Oct},
	year = {2016},
	issn = {0975-8887},
	pages = {27-30},
	numpages = {4},
	url = {},
	doi = {10.5120/ijca2016911778},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


Sharing images might prompt presentation of individual data and security breach. This collected data can be misused by unsafe clients. To anticipate such sort of undesirable acknowledgement of individual images, adaptable security settings are required. Recently, such security settings are made accessible and keeping up these measures is a cloudy and error inclined procedure. In this manner, suggestion framework is required which supply client with an adaptable help for organizing security settings in much easier way.

This paper includes the survey on different studies on privacy preserving for sharing images over social networking sites.


  1. M. Ames and M. Naaman, (2007). “Why we tag: Motivations for annotation in mobile and online media,” in Proc. Conf. Human Factors Comput. Syst., pp. 971–980.
  2. A. Besmer and H. Lipford, (2009). “Tagged photos: Concerns, perceptions, and protections,” in Proc. 27th Int. Conf. Extended Abstracts Human Factors Comput. Syst., pp. 4585–4590.
  3. D. G. Altman and J. M. Bland, (1995). “Multiple significance tests: The bonferroni method,” Brit. Med. J., vol. 310, no. 6973.
  4. J. Bonneau, J. Anderson, and L. Church, (2009). “Privacy suites: Shared privacy for social networks,” in Proc. Symp. Usable Privacy Security.
  5. J. Bonneau, J. Anderson, and G. Danezis, (2009). “Prying data out of a social network,” in Proc. Int. Conf. Adv. Soc. Netw. Anal. Mining, pp.249–254.
  6. A. Mazzia, K. LeFevre, and E. Adar. (2012). “The PViz comprehension tool for social network privacy settings,” in Proc. SOUPS.
  7. P. F. Klemperer, Y. Liang, M. L. Mazurek, M. Sleeper, B. Ur, L. Bauer, L. F. Cranor, N. Gupta, and M. K. Reiter. (2012). “Tag, you can see it! Using tags for access control in photo sharing,” in Proc. CHI.
  8. T. Jaeger, A. Edwards, and X. Zhang. (2003). “Policy management using access control spaces,” ACM Transactions on Information and System Security, 6(3):327–364
  9. H. Krasnova, O. Günther, S. Spiekermann, and K. Koroleva. (2009). “Privacy concerns and identity in online social networks,” Identity in the Information Society, 2:39–63.
  10. A. Besmer and H. Richter Lipford. (2010). “Moving beyond un-tagging: Photo privacy in a tagged world,” In Proc. CHI.
  11. M. Johnson, S. Egelman, and S. M. Bellovin. (2012). “Facebook and privacy: It’s complicated,” In Proc. SOUPS.
  12. H. Hu, G.-J. Ahn, and J. Jorgensen. (2011). “Detecting and resolving privacy conflicts for collaborative data sharing in online social networks,” in Proc. ACSAC.
  13. Y. Liu, K. P. Gummadi, B. Krishnamurthy, and A. Mislove. (2011). “Analyzing Facebook privacy settings: user expectations vs. reality,” in Proc. IMC.
  14. Y. Wang, G. Norcie, S. Komanduri, A. Acquisti, P. G. Leon, and L. F. Cranor. (2011). “I regretted the minute I pressed share: a qualitative study of regrets on Facebook,” in Proc. SOUPS.
  15. Z. Tufekci. (2008). “Can you see me now? Audience and disclosure regulation in online social network sites,” Bulletin of Science, Technology & Society, 28(1):20–36.
  16. J. Staddon, D. Huffaker, L. Brown, and A. Sedley. (2012). “Are privacy concerns a turn-off? Engagement and privacy in social networks,” in Proc. SOUPS.
  17. E. Hayashi, O. Riva, K. Strauss, A. J. B. Brush, and S. Schechter. (2012). “Goldilocks and the two mobile devices: going beyond all-or-nothing access to a device’s applications,” In Proc. SOUPS.
  18. A. L. Young and A. Quan-Haase. (2009). “Information revelation and Internet privacy concerns on social network sites: a case study of Facebook,” In Proc. 4th International Conference on Communities and Technologies, 2009.
  19. T. Das, R. Bhagwan, and P. Naldurg. (2010). “Baaz: A system for detecting access control misconfigurations,” In Proc. USENIX Security Symposium.
  20. L. Bauer, S. Garriss, and M. K. Reiter. (2011). “Detecting and resolving policy misconfigurations in access-control systems,” ACM TISSEC, 14(1).
  21. A. C. Squicciarini, S. Sundareswaran, D. Lin, and J. Wede. (2011). “A3P: adaptive policy prediction for shared images over popular content sharing sites,” in Proc. Hypertext.
  22. L. Fang and K. LeFevre. (2010). “Privacy wizards for social networking sites,” in Proc. WWW.


Image Sharing, Privacy Preserving, Survey, Social Networking Sites, Traffic Rate