Social Computing and Incentivized Sharing. Group Members UT Dallas Murat Kantarcioglu Alain...

download Social Computing and Incentivized Sharing. Group Members UT Dallas Murat Kantarcioglu Alain Bensoussan (UT Dallas) Nathan Berg Bhavani Thuraisingham University

of 17

  • date post

    13-Jan-2016
  • Category

    Documents

  • view

    212
  • download

    0

Embed Size (px)

Transcript of Social Computing and Incentivized Sharing. Group Members UT Dallas Murat Kantarcioglu Alain...

  • Social Computing and Incentivized Sharing

  • Group Members

    UT DallasMurat KantarciogluAlain Bensoussan (UT Dallas)Nathan Berg Bhavani ThuraisinghamUniversity of MichiganLada AdamicUMBCYelena YeshaJoel SachsAnupam Joshi Tim FininUTSAShouhuai Xu Ravi SandhuPurdueElisa Bertino Chris CliftonGabriel GhinitaNingui Li

  • social networks & the AISL SOCIAL NETWORKS UT Dallas privacy and security incentivized sharing information dissemination and filtering

  • social networks and information sharingdistributing informationdetermining who should receive information

    pulling informationinformation filtering (e.g. digg, FriendFeed)

    securing informationpropagation of trust and distrust (reputation management)enhance trustworthiness of cryptographic key infrastructure

    incentivizing sharingindividuals more or less likely to share with close contacts

  • acquiring: novelty and community structuredata quality/provenanceidentify circular intelligence through proximity in social networks

    temporal & source information can be mapped onto social network

  • sharing & acquiring: open participation

  • open participation: information or noise?``Knowledge search is like oozing out knowledge in human brains to the Internet. People who know something better than others can present their know-how, skills or knowledge'' NHN CEO Chae Hwi-young(It is) the next generation of search (it) is a kind of collective brain -- a searchable database of everything everyone knows. It's a culture of generosity. The fundamental belief is that everyone knows something. -- Eckart Walther (Yahoo Research)

  • Network analysis can be used to determine expertisePreferred Helper: just betterPreferred Helper: best available

  • and study competitive information sharingJava Forum: asker -> replierTask CN: submitter -> winner

  • structure of complex networksheterogeneous connectivity and participationrobustnessconnectivitypropagation of misinformation from compromised nodes

  • Secure social networks: research goalWe ask and address the following two questions:How should we exploit social computing/networks for security purposes (e.g., assured information sharing)?How should we secure social computing/networks?

  • Security by social computingprotect cryptographic securitydetect and deter malicious playerstrustworthy and survivable storagereputation managementreliable and secure information dissemination

  • Security for social computinganonymous & accountable social computingprivacy-preserving social computinginferring private data from social connectionssecure incentive mechanismsmanipulation-resistant social computingdata quality/provenanceobscuring identity and connections

  • prior workSecure social networks & privacy:Network robustness: (poster: Xu et al. Generalized Epidemic Threshold, with Applications)Key signing: Exploiting social networks for threshold signing (AsiaCCS'08)Privacy and trust in information sharing (Kantarcioglu UTDCS-21-08 )Information sharing & filtering:Inferring expertise in Q&A forums (Adamic et al. WWW07&08)Using social networks to detect conflicts of interest (Joshi et. al: WWW2006, ACM Tweb, 2008)online information sharing structure (blogs,twitter)Adamic (WI 2005,ICWSM07&08)Finin, Joshi (WebKDD,ICWSM07&08,+ many more)data quality and providence (detecting spam blogs) (AAAI 2006,ICWSM07,TREC2006)Social and semantic computing:blending the social & semantic (Sachs AAAI 07 workshop)

  • current researchsocial networks as a filtering & aggregation toolYelena Yesha, Lada Adamic, Anupam Joshi, Tim Finin understand the role of social networks (e.g. FriendFeed, blogs) in information diffusionsentiment analysis and network structuresecurity for and from social networksShouhuai Xu, Ravi SandhuUnderstanding properties of social networks under attackUsing insights to make social computing more robust and secureincentivized sharing in social networksMurat Kantarcioglu, Lada AdamicExperiments: effect of social connections on information sharing (peer recognition) and ability to recognize poor information sourcesSocial engineering (phishing, etc.)

  • social networks & the AISL SOCIAL NETWORKS UT Dallas privacy and security incentivized sharing information dissemination and filtering

    ****

    **