Social Computing and Incentivized Sharing. Group Members UT Dallas Murat Kantarcioglu Alain...
-
Upload
abel-strickland -
Category
Documents
-
view
216 -
download
0
Transcript of Social Computing and Incentivized Sharing. Group Members UT Dallas Murat Kantarcioglu Alain...
Social Computing and Incentivized Sharing
Group Members
• UT Dallas• Murat Kantarcioglu• Alain Bensoussan (UT Dallas)• Nathan Berg • Bhavani Thuraisingham
• University of Michigan• Lada Adamic
• UMBC• Yelena Yesha• Joel Sachs• Anupam Joshi • Tim Finin
• UTSA• Shouhuai Xu • Ravi Sandhu
• Purdue• Elisa Bertino • Chris Clifton• Gabriel Ghinita• Ningui Li
social networks & the AISL
SOCIALNETWORKS
UT Dallas
privacy and securityprivacy and security
incentivized sharing
incentivized sharing
information dissemination and filtering
information dissemination and filtering
social networks and information sharing
• distributing information• determining who should receive information
• pulling information• information filtering (e.g. digg, FriendFeed)
• securing information• propagation of trust and distrust (reputation management)• enhance trustworthiness of cryptographic key infrastructure
• incentivizing sharing• individuals more or less likely to share with close contacts
acquiring: novelty and community structure
• data quality/provenance• identify circular intelligence through
proximity in social networks
• temporal & source information can be mapped onto social network
relevancetrustincentive for sharing
novelty
information flow path
individual receiving information
sharing & acquiring: open participation
Knows
Knowledge iN
open participation: information or noise?
Knowledge In ``Knowledge search is like oozing out knowledge in human brains to the Internet. People who know something better than others can present their know-how, skills or knowledge''
NHN CEO Chae Hwi-young
“(It is) the next generation of search… (it) is a kind of collective brain -- a searchable database of everything everyone knows. It's a culture of generosity. The fundamental belief is that everyone knows something.”
-- Eckart Walther (Yahoo Research)
Network analysis can be used to determine expertise
Preferred Helper: ‘just better’
Preferred Helper: ‘best available’
and study competitive information sharing
• Java Forum: asker -> replier• Task CN: submitter -> winner
structure of complex networks• heterogeneous
connectivity and participation
• robustness• connectivity• propagation of
misinformation from compromised nodes
Secure social networks: research goal
• We ask and address the following two questions:• How should we exploit social computing/networks for security
purposes (e.g., assured information sharing)?
• How should we secure social computing/networks?
Security by social computing
• protect cryptographic security
• detect and deter malicious players
• trustworthy and survivable storage
• reputation management
• reliable and secure information dissemination
Security for social computing
• anonymous & accountable social computing
• privacy-preserving social computing
• inferring private data from social connections
• secure incentive mechanisms
• manipulation-resistant social computing
• data quality/provenance
• obscuring identity and connections
prior work
• Secure social networks & privacy:• Network robustness: (poster: Xu et al. “Generalized Epidemic Threshold, with Applications”)• Key signing: “Exploiting social networks for threshold signing” (AsiaCCS'08)• Privacy and trust in information sharing (Kantarcioglu UTDCS-21-08 )
• Information sharing & filtering:• Inferring expertise in Q&A forums (Adamic et al. WWW07&08)• Using social networks to detect conflicts of interest (Joshi et. al: WWW2006, ACM Tweb,
2008)• online information sharing structure (blogs,twitter)
• Adamic (WI 2005,ICWSM07&08)• Finin, Joshi (WebKDD,ICWSM07&08,+ many more)
• data quality and providence (detecting spam blogs) (AAAI 2006,ICWSM07,TREC2006)
• Social and semantic computing:• blending the social & semantic (Sachs AAAI 07 workshop)
current research
• social networks as a filtering & aggregation tool• Yelena Yesha, Lada Adamic, Anupam Joshi, Tim Finin
• understand the role of social networks (e.g. FriendFeed, blogs) in information diffusion
• sentiment analysis and network structure
• security for and from social networks• Shouhuai Xu, Ravi Sandhu
• Understanding properties of social networks under attack
• Using insights to make social computing more robust and secure
• incentivized sharing in social networks• Murat Kantarcioglu, Lada Adamic
• Experiments: effect of social connections on information sharing (peer recognition) and ability to recognize poor information sources
• Social engineering (phishing, etc.)
social networks & the AISL
SOCIALNETWORKS
UT Dallas
privacy and securityprivacy and security
incentivized sharing
incentivized sharing
information dissemination and filtering
information dissemination and filtering