A crowdsourcing method for online social networks security assessment based on human-centric computing

被引:25
|
作者
Zhang, Zhiyong [1 ,2 ]
Jing, Junchang [1 ,2 ]
Wang, Xiaoxue [1 ,2 ]
Choo, Kim-Kwang Raymond [3 ]
Gupta, Brij B. [4 ]
机构
[1] Henan Univ Sci & Technol, Informat Engn Coll, Luoyang 471023, Peoples R China
[2] Henan Int Joint Lab Cyberspace Secur Applicat, Luoyang 471023, Peoples R China
[3] Univ Texas San Antonio, Dept Informat Syst & Cyber Secur, San Antonio, TX 78249 USA
[4] Natl Inst Technol Kurukshetra, Kurukshetra 136119, Haryana, India
基金
中国国家自然科学基金;
关键词
Online social networks; Security and privacy; Crowd computing; Human-centric computing; SocialSitu; Task assignment; Artificial intelligence; PRIVACY; TRUST;
D O I
10.1186/s13673-020-00230-0
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Crowdsourcing and crowd computing are a trend that is likely to be increasingly popular, and there remain a number of research and operational challenges that need to be addressed. The human-centric computational abstraction called situation may be used to cope with these difficulties. In this paper, we focus on one such challenge, which is how to assign crowd assessment tasks about security and privacy in online social networks to the most appropriate users efficiently, effectively and accurately. Specifically, here we propose a novel task assignment method to facilitate crowd assessment, which improves the security and trustworthiness of social networking platforms, as well as a task assignment algorithm based on SocialSitu, which is a social-domain-focused situational analytics. Findings from our crowd assessment experiments on a real world social network Shareteches show that the precision and recall of the proposed method and algorithm are 0.491 and 0.538 higher than those of a random algorithm's, as well as 0.336 and 0.366 higher than users' theme-aware algorithm's, respectively. Moreover, these results further suggest that our experimental evaluation enhance the security and privacy of online social networks.
引用
收藏
页数:19
相关论文
共 50 条
  • [1] Research directions for trust and security in human-centric computing
    Creese, S
    Goldsmith, M
    Roscoe, B
    Zakiuddin, I
    [J]. PRIVACY, SECURITY AND TRUST WITHIN THE CONTEXT OF PERVASIVE COMPUTING, 2005, 780 : 83 - 91
  • [2] Human-Centric Computing
    Rabaey, Jan M.
    [J]. IEEE TRANSACTIONS ON VERY LARGE SCALE INTEGRATION (VLSI) SYSTEMS, 2020, 28 (01) : 3 - 11
  • [3] Human-Centric Computing
    Rabaey, Jan M.
    [J]. 2021 IEEE INTERNATIONAL ELECTRON DEVICES MEETING (IEDM), 2021,
  • [4] Human-Centric Technology Based on Orange Computing
    Wang, Hung-Yi
    Chen, Bo-Wei
    Bharanitharan, K.
    Wu, Jaw-Shyang
    Tseng, Shih-Pang
    Wang, Jhing-Fa
    [J]. 1ST INTERNATIONAL CONFERENCE ON ORANGE TECHNOLOGIES (ICOT 2013), 2013, : 250 - 251
  • [5] Overview of Human-Centric Computing
    Iida, Ichiro
    Morita, Toshihiko
    [J]. FUJITSU SCIENTIFIC & TECHNICAL JOURNAL, 2012, 48 (02): : 124 - 128
  • [6] Virtual workshops for human-centric computing
    Costabile, MF
    Fogli, D
    Fresta, G
    Mussio, P
    Piccinno, A
    [J]. 2004 IEEE SYMPOSIUM ON VISUAL LANGUAGES AND HUMAN CENTRIC COMPUTING: PROCEEDINGS, 2004, : 65 - 68
  • [7] Editorial: Human-Centric Security and Privacy
    Nepal, Surya
    Ko, Ryan K. L.
    Grobler, Marthie
    Camp, L. Jean
    [J]. FRONTIERS IN BIG DATA, 2022, 5
  • [8] An Image Authentication Method for Secure Internet-Based Communication in Human-Centric Computing
    Chen, Yung-Yao
    Hsia, Chih-Hsien
    Kao, Hsiang-Yun
    Wang, You-An
    Hu, Yu-Chen
    [J]. JOURNAL OF INTERNET TECHNOLOGY, 2020, 21 (07): : 1893 - 1903
  • [9] Guest Editorial: Special Issue on Human-Centric Cyber Social Computing
    Jin, Qun
    Li, Weimin
    Guo, Song
    Panchanathan, Sethuraman
    [J]. IEEE TRANSACTIONS ON COMPUTATIONAL SOCIAL SYSTEMS, 2019, 6 (05) : 1038 - 1041
  • [10] Using Human-Centric Wireless Sensor Networks to Support Personal Security
    Carreno, Pablo
    Gutierrez, Francisco
    Ochoa, Sergio F.
    Fortino, Giancarlo
    [J]. INTERNET AND DISTRIBUTED COMPUTING SYSTEMS, IDCS 2013, 2013, 8223 : 51 - 64