A Collusion-Resistant Automation Scheme for Social Moderation Systems

被引:0
|
作者
Lou, Jing-Kai [1 ,2 ]
Chen, Kuan-Ta [2 ]
Lei, Chin-Laung [1 ]
机构
[1] Natl Taiwan Univ, Dept Elect Engn, Taipei, Taiwan
[2] Acad Sinica, Inst Informat Sci, Beijing, Peoples R China
关键词
Bad Mouthing; Collusion Detection; Fraud Detection; Social Moderation; Web; 2.0;
D O I
暂无
中图分类号
TN [电子技术、通信技术];
学科分类号
0809 ;
摘要
For current Web 2.0 services, manual examination of user uploaded content is normally required to ensure its legitimacy and appropriateness, which is a substantial burden to service providers. To reduce labor costs and the delays caused by content censoring, social moderation has been proposed as a front-line mechanism, whereby user moderators are encouraged to examine content before system moderation is required. Given the immerse amount of new content added to the Web each day, there is a need for automation schemes to facilitate rear system moderation. This kind of mechanism is expected to automatically summarize reports from user moderators and ban misbehaving users or remove inappropriate content whenever possible. However, the accuracy of such schemes may be reduced by collusion attacks, where some work together to mislead the automatic summarization in order to obtain shared benefits. In this paper, we propose a collusion-resistant automation scheme for social moderation systems. Because some user moderators may collude and dishonestly claim that a user misbehaves, our scheme detects whether an accusation from a user moderator is fair or malicious based on the structure of mutual accusations of all users in the system. Through simulations we show that collusion attacks are likely to succeed if an intuitive count-based automation scheme is used. The proposed scheme, which is based on the community structure of the user accusation graph, achieves a decent performance in most scenarios..
引用
收藏
页码:571 / +
页数:2
相关论文
共 50 条
  • [21] Collusion-Resistant Sybil Attack Detection Scheme in Mobile Ad hoc Networks
    Khan, Muhammad Sajid
    Iltaf, Naima
    Rashdi, Adnan
    2014 NATIONAL SOFTWARE ENGINEERING CONFERENCE (NSEC - 2014), 2014, : 30 - 36
  • [22] A novel approach to collusion-resistant video watermarking
    Su, K
    Kundur, D
    Hatzinakos, D
    SECURITY AND WATERMARKING OF MULTIMEDIA CONTENTS IV, 2002, 4675 : 491 - 502
  • [23] Collusion-resistant Fingerprinting of Parallel Content Channels
    Joudeh, Basheer
    Skoric, Boris
    PROCEEDINGS OF THE 2022 ACM WORKSHOP ON INFORMATION HIDING AND MULTIMEDIA SECURITY, IH-MMSEC 2022, 2022, : 81 - 89
  • [24] A collusion-resistant certificateless provable data possession scheme for shared data with user revocation
    Yang, Guang
    Han, Lidong
    Bi, Jingguo
    Wang, Fuqun
    CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2024, 27 (02): : 2165 - 2179
  • [25] Collusion-resistant convertible ring signature schemes
    Jung Yeon Hwang
    Ku-Young Chang
    Hyun Sook Cho
    Boyeon Song
    Willy Susilo
    Science China Information Sciences, 2015, 58 : 1 - 16
  • [26] Collusion-Resistant Processing of SQL Range Predicates
    Kesarwani, Manish
    Kaul, Akshar
    Singh, Gagandeep
    Deshpande, Prasad M.
    Haritsa, Jayant R.
    DATA SCIENCE AND ENGINEERING, 2018, 3 (04) : 323 - 340
  • [27] Collusion-Resistant Anonymous Data Collection Method
    Ashrafi, Mafruz Zaman
    Ng, See Kiong
    KDD-09: 15TH ACM SIGKDD CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING, 2009, : 69 - 77
  • [28] Collusion-Resistant Processing of SQL Range Predicates
    Kesarwani, Manish
    Kaul, Akshar
    Singh, Gagandeep
    Deshpande, Prasad M.
    Haritsa, Jayant R.
    DATABASE SYSTEMS FOR ADVANCED APPLICATIONS (DASFAA 2018), PT II, 2018, 10828 : 211 - 227
  • [29] Collusion-resistant convertible ring signature schemes
    Hwang, Jung Yeon
    Chang, Ku-Young
    Cho, Hyun Sook
    Song, Boyeon
    Susilo, Willy
    SCIENCE CHINA-INFORMATION SCIENCES, 2015, 58 (01) : 1 - 16
  • [30] Fully Collusion-Resistant Trace-and-Revoke Scheme in Prime-Order Groups
    Park, Jong Hwan
    Rhee, Hyun Sook
    Lee, Dong Hoon
    JOURNAL OF COMMUNICATIONS AND NETWORKS, 2011, 13 (05) : 428 - 441