Personal Rights Management- Enabling Privacy Rights in Digital Online Content
نویسندگان
چکیده
With ubiquitous use of digital cameras, e.g. in mobile phones, privacy is no longer threatened by governments and companies only. A new threat exists by people, who take photos of unaware people with no risk and little cost anywhere in public and private spaces. Fast distribution via online communities and web pages expose an individual’s private life to the public. Social and legal measures are taken to deal with this, but they are hardly enforcable. We propose a supportive infrastructure aiming for the distribution channel such that if the picture gets publicly available, the exposed individual has a chance to detect it and take action. Protection of personal privacy has become a major issue. Most of the current work assumes an asymmetric model; the violator is an institution, while the victim is a person. Recently, a new privacy thread has emerged. An increasing number of people are equiped with miniature cameras, taking photos anywhere and anytime, thus endangering privacy when they publish the photos. Countermeasures, like penalties or a ban on cameraphones have proven insufficient, as a growing number of websites promoting such photos (e.g. the Mobile Asses website [1]) shows. As it is infeasible to enforce a broad ban on cameraphones or artificially inhibit their usage by technical measures (e.g., simulated shutter noise), we propose a novel way to complement such measures: we attack the distribution channel. If a picture of a person is taken and published, the victim has a good chance of being the first to find this picture, enabling her to request the pictures removal or invoke legal action in time. Three major players are in our setting: the photographer (Bob), the individual (Alice), and the search engine. Bob is the photographer using a cameraphone. We assume that Bob should not to be prevented from taking the pictures and have his identity protected as long as he does not infringe the rights of anybody. Alice is being photographed by Bob. The interest of Alice is that she has some control over pictures taken of her, so we assume this picture should not be distributed without her consent. We grant her this option: If a picture of her is taken and published, she can find out early. Alice uses a receiver, which registers the identities of pictures taken in her vicinity. The receiver is her own mobile phone or a piece of hardware. It can also be integrated in the infrastructure provided by external parties, for instance, the owner of a discotheque or the GSM ? Mina Deng is funded by research grants of the Katholieke Universiteit Leuven, Bel-
منابع مشابه
Privacy Rights Management for Mobile Phones
Recent progress in mobile phone technology enables the users to generate and store personal data, for example pictures taken with built-in digital cameras. This personal data can then be forwarded to other mobile devices. Currently, there are no mechanisms available that protect such user-generated content against unauthorized use and distribution, or that enforce the user privacy preferences. ...
متن کاملPersonal Rights Management - Taming Camera-Phones for Individual Privacy Enforcement
With ubiquitous use of digital camera devices, especially in mobile phones, privacy is no longer threatened by governments and companies only. The new technology creates a new threat by ordinary people, who could take and distribute pictures of an individual with no risk and little cost in any situation in public or private spaces. Fast distribution via web based photo albums, online communitie...
متن کاملمدیریت کلید در سیستمهای مدیریت حقوق دیجیتال در حالت برونخطی
By expanding application of digital content in the world of information technology, supervision and control over the data, and also preventing the copy of documents is considered. In this relation digital rights management systems are responsible for the secure distribution of digital content, and for this purpose the common functions in the field of cryptography and utilize Digital watermarkin...
متن کاملApplications to Improve Privacy on Online Social Networks
Privacy management is different across the many online social networks and not always satisfies the user expectations. Some social networks members may demand choosing their privacy preferences more richly and exercise a tighter control on the information they drop. For this regard, it is under question if some of the Digital Rights Management systems features may be incorporated to the privacy...
متن کاملPrivacy - DRM : Data Protection by Copy Protection ?
Protecting media contents and enforcing privacy policies seem to be related problems: mechanisms are needed to restrict data processing outside the copyright holder’s, respectively data subject’s, domain of control. A systematic analysis of requirements, properties, and experiences with digital rights management (DRM) reveals substantial differences between Content-DRM to protect media contents...
متن کاملA Digital Rights Management approach to privacy in online social networks
Information shared in online social networks is subject to privacy policies specified in each network. These privacy terms protect users to some extent and grant them some basic rights on the information they share. In the near future, and according to the Web 2.0 philosophy, social networks members will be able to choose their privacy preferences more richly, and perhaps with techniques derive...
متن کامل