A Collusion-Resistant Automation Scheme for Social Moderation Systems

被引:0
|
作者
Lou, Jing-Kai [1 ,2 ]
Chen, Kuan-Ta [2 ]
Lei, Chin-Laung [1 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
[2] Acad Sinica, Inst Informat Sci, Beijing, Peoples R China
关键词
Bad Mouthing; Collusion Detection; Fraud Detection; Social Moderation; Web; 2.0;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For current Web 2.0 services, manual examination of user uploaded content is normally required to ensure its legitimacy and appropriateness, which is a substantial burden to service providers. To reduce labor costs and the delays caused by content censoring, social moderation has been proposed as a front-line mechanism, whereby user moderators are encouraged to examine content before system moderation is required. Given the immerse amount of new content added to the Web each day, there is a need for automation schemes to facilitate rear system moderation. This kind of mechanism is expected to automatically summarize reports from user moderators and ban misbehaving users or remove inappropriate content whenever possible. However, the accuracy of such schemes may be reduced by collusion attacks, where some work together to mislead the automatic summarization in order to obtain shared benefits. In this paper, we propose a collusion-resistant automation scheme for social moderation systems. Because some user moderators may collude and dishonestly claim that a user misbehaves, our scheme detects whether an accusation from a user moderator is fair or malicious based on the structure of mutual accusations of all users in the system. Through simulations we show that collusion attacks are likely to succeed if an intuitive count-based automation scheme is used. The proposed scheme, which is based on the community structure of the user accusation graph, achieves a decent performance in most scenarios..
引用
收藏
页码:571 / +
页数:2
相关论文
共 50 条
  • [1] A collusion-resistant video watermarking scheme
    Houmansadr, Amir
    Ghaemmaghami, Shahrokh
    INFORMATION HIDING, 2007, 4437 : 343 - +
  • [2] A collusion-resistant dynamic key management scheme for WSNs
    Zhan, Furui
    Yao, Nianmin
    SECURITY AND COMMUNICATION NETWORKS, 2016, 9 (18) : 6351 - 6364
  • [3] Collusion-Resistant Worker Recruitment in Crowdsourcing Systems
    Xiao, Mingyan
    Jin, Wenqiang
    Li, Ming
    Yang, Lei
    Thapa, Arun
    Li, Pan
    IEEE TRANSACTIONS ON MOBILE COMPUTING, 2023, 22 (01) : 129 - 144
  • [4] Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
    Jong Hwan Park
    Dong Hoon Lee
    Designs, Codes and Cryptography, 2011, 60 : 255 - 276
  • [5] Collusion-resistant fingerprinting scheme based on the CDMA-technique
    Hayashi, Naoki
    Kuribayashi, Minoru
    Morii, Masakatu
    ADVANCES IN INFORMATION AND COMPUTER SECURITY, PROCEEDINGS, 2007, 4752 : 28 - +
  • [6] Fully collusion-resistant traitor tracing scheme with shorter ciphertexts
    Park, Jong Hwan
    Lee, Dong Hoon
    DESIGNS CODES AND CRYPTOGRAPHY, 2011, 60 (03) : 255 - 276
  • [7] Collusion-resistant fingerprinting for multimedia
    Trappe, W
    Wu, M
    Liu, KR
    2002 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOLS I-IV, PROCEEDINGS, 2002, : 3309 - 3312
  • [8] A Collusion-Resistant Routing Scheme for Noncooperative Wireless Ad Hoc Networks
    Zhong, Sheng
    Wu, Fan
    IEEE-ACM TRANSACTIONS ON NETWORKING, 2010, 18 (02) : 582 - 595
  • [9] An Improved Collusion-resistant Public-key Traitor Tracing Scheme
    Guan Peipei
    Yang Yixian
    Niu Xinxin
    2009 INTERNATIONAL CONFERENCE ON E-BUSINESS AND INFORMATION SYSTEM SECURITY, VOLS 1 AND 2, 2009, : 906 - +
  • [10] Collusion-resistant dynamic fingerprinting for multimedia
    He, Shan
    Wu, Min
    2007 IEEE INTERNATIONAL CONFERENCE ON ACOUSTICS, SPEECH, AND SIGNAL PROCESSING, VOL II, PTS 1-3, 2007, : 289 - +