Abstract
Future online social networks need to not only protect sensitive data of their users, but also protect them from abusive behavior coming from malicious participants in the network. We investigate the use of supervised learning techniques to detect abusive behavior and describe privacy-preserving protocols to compute the feature set required by abuse classification algorithms in a secure and privacy-preserving way. While our method is not yet fully resilient against a strong adaptive adversary, our evaluation suggests that it will be useful to detect abusive behavior with a minimal impact on privacy.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Bishop, C.M.: Pattern Recognition and Machine Learning, 1st edn. Springer, New York (2006)
Boneh, D., Lynn, B., Shacham, H.: Short signatures from the weil pairing. In: Boyd, C. (ed.) ASIACRYPT 2001. LNCS, vol. 2248, pp. 514–532. Springer, Heidelberg (2001)
Breiman, L.: Arcing the edge. Technical report, Technical Report 486, Statistics Department, University of California at Berkeley (1997)
De Cristofaro, E., Gasti, P., Tsudik, G.: Fast and private computation of cardinality of set intersection and union. In: Pieprzyk, J., Sadeghi, A.-R., Manulis, M. (eds.) CANS 2012. LNCS, vol. 7712, pp. 218–231. Springer, Heidelberg (2012)
Evans, N.S., Polot, B., Grothoff, C.: Efficient and secure decentralized network size estimation. In: IFIP International Conferences on Networking (2012)
Gipp, B., Meuschke, N., Gernandt, A.: Decentralized trusted timestamping using the crypto currency bitcoin. In: iConference. iSchools (2015)
Grothoff, C., Porup, J.M.: The NSA’s SKYNET program may be killing thousands of innocent people. ARS Technica UK (2016). https://hal.inria.fr/hal-01278193
Hinduja, S., Patchin, J.W.: Bullying, cyberbullying and suicide. Arch. Suicide Res. 14(3), 206–221 (2010)
Kramer, A., Guillory, J., Hancock, J.: Experimental evidence of massive-scale emotional contagion through social networks. In: Proceedings of the National Academy of Sciences of the United States of America (2013)
Langos, C.: Cyberbullying: The challenge to define. Cyberpsychology Behav. Soc. Networking 15, 285–289 (2012)
v. Loesch, C., Toth, G.X., Baumann, M.: Scalability & paranoia in a decentralized social network. In: Federated Social Web. Berlin, Germany (2011)
López, V., Fernández, A., García, S., Palade, V., Herrera, F.: An insight into classification with imbalanced data: Empirical results and current trends on using data intrinsic characteristics. Inf. Sci. 250, 113–141 (2013)
Luxton, D., June, J., Fairall, J.: Social media and suicide: A public health perspective. Am. J. Public Health 102, 195–200 (2012)
Mandeep K. Dhami, P.: Behavioural Science Support for JTRIG’s Effects and Online HUMINT Operations March 2011. http://www.statewatch.org/news/2015/jun/behavioural-science-support-for-jtrigs-effects.pdf
Stein, T., Chen, E., Mangla, K.: Facebook immune system. In: Proceedings of the 4th Workshop on Social Network Systems, p. 8. ACM (2011)
Thomas, K., McCoy, D., Grier, C., Kolcz, A., Paxson, V.: Trafficking fraudulent accounts: the role of the underground market in twitter spam and abuse. In: USENIX Security Symposium (2013)
Acknowledgments
We thank the Renewable Freedom Foundation for supporting this research, the volunteers who annotated abuse and the anonymous reviewers. Special thanks to Cristina Onete for pointing us towards PSI protocol literature.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2016 Springer International Publishing AG
About this paper
Cite this paper
García-Recuero, Á., Burdges, J., Grothoff, C. (2016). Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks. In: Livraga, G., Torra, V., Aldini, A., Martinelli, F., Suri, N. (eds) Data Privacy Management and Security Assurance. DPM QASA 2016 2016. Lecture Notes in Computer Science(), vol 9963. Springer, Cham. https://doi.org/10.1007/978-3-319-47072-6_6
Download citation
DOI: https://doi.org/10.1007/978-3-319-47072-6_6
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-47071-9
Online ISBN: 978-3-319-47072-6
eBook Packages: Computer ScienceComputer Science (R0)