Abstract
We present the problem of abusive, off-topic or repetitive postings on open publishing websites, and the difficulties associated with filtering them out. We propose a scheme that extracts enough information to allow for filtering, based on users being embedded in a social network. Our system maintains the privacy of the poster, and does not require full identification to work well. We present a concrete realization using constructions based on discrete logarithms, and a sketch of how our scheme could be implemented in a centralized fashion.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil-resistant DHT routing, vol. [42], pp. 305–318.
Wright, R.N., Lincoln, P., Millen, J.K.: Depender graphs: A method of fault-tolerant certificate distribution. Journal of Computer Security 9(4), 323–338 (2001)
Song, D.X., Tygar, J.D., Zuckerman, D.: Expander graphs for digital stream authentication and robust overlay networks. In: IEEE Symposium on Security and Privacy, p. 258 (2002)
Roe, M.: Cryptography and Evidence. PhD thesis, University of Cambridge, Computer Laboratory (1997)
Internet troll. From Wikipedia, the free encyclopedia (2005), http://en.wikipedia.org/wiki/Internet_troll
Kantor, B., Lapsley, P.: Network news transfer protocol. Request for Comments 977, Network Working Group (1986)
Google groups (beta). Website (2005), http://groups.google.com/
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., Berners-Lee, T.: Hypertext transfer protocol. Request for Comments 2616, Network Working Group (1999)
Team, N.H.D.: Common gateway interface. Technical report, University of Illinois at Urbana - Champaign (1998), http://hoohoo.ncsa.uiuc.edu/cgi/
Slashdot: News for nerds, stuff that matters, http://slashdot.org
Independent media center, http://www.indymedia.org/
Wikipedia, the free encyclopedia, http://en.wikipedia.org/wiki/Main_Page
Arnison, M.: Open publishing is the same as free software (2001), http://www.cat.org.au/maffew/cat/openpub.html
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: USENIX Security Symposium, pp. 303–320. USENIX (2004)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A.I.T. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Freiling, F.C., Holz, T., Wicherski, G.: Botnet tracking: Exploring a root-cause methodology to prevent distributed denial-of-service attacks, vol. [42], pp. 319–335 (2005)
von Ahn, L., Blum, M., Hopper, N.J., Langford, J.: Captcha: Using hard ai problems for security. In: Biham, E. (ed.) EUROCRYPT 2003. LNCS, vol. 2656, pp. 294–311. Springer, Heidelberg (2003)
Baird, H.S., Coates, A.L., Fateman, R.J.: Pessimalprint: a reverse turing test. IJDAR 5(2-3), 158–163 (2003)
Diffie, W., Hellman, M.E.: New directions in cryptography. IEEE Transactions on Information Theory IT-22(6), 644–654 (1976)
Buchholz, C.: Liberty alliance project - gemeinschaftliche identitätsverwaltung. Datenschutz und Datensicherheit 7(9) (2003)
Openid: an actually distributed identity system (2005), http://openid.net/
Gamal, T.E.: A public key cryptosystem and a signature scheme based on discrete logarithms. In: Blakely, G.R., Chaum, D. (eds.) CRYPTO 1984. LNCS, vol. 196, pp. 10–18. Springer, Heidelberg (1985)
Golle, P., Jakobsson, M., Juels, A., Syverson, P.F.: Universal re-encryption for mixnets. In: Okamoto, T. (ed.) CT-RSA 2004. LNCS, vol. 2964, pp. 163–178. Springer, Heidelberg (2004)
Camenisch, J., Stadler, M.: Proof systems for general statements about discrete logarithms. Technical Report TR 260 (1997)
Standards, F.I.P.: Digital signature standard (dss). Technical Report 186, FIPS (1994)
Dierks, T., Allen, C.: The TLS protocol. Request for Comments 2246, Network Working Group (1999)
Borisov, N., Goldberg, I., Brewer, E.: Off-the-record communications, or, why not to use PGP. In: Workshop on Privacy in Electronic Society (2004)
Raimondo, M.D., Gennaro, R., Krawczyk, H.: Secure off-the-record messaging. In: Atluri, V., di Vimercati, S.D.C., Dingledine, R. (eds.) WPES, pp. 81–89. ACM, New York (2005)
Travers, J., Milgram, S.: An experimental study of the small world problem. Sociometry 32(425) (1969)
Kleinberg, J.M.: The small-world phenomenon: an algorithmic perspective. In: STOC, pp. 163–170 (2000)
Livejournal. Wikipedia, the free encyclopedia (2005), http://en.wikipedia.org/wiki/LiveJournal#Invite_system
Orkut, http://orkut.com
GMail, http://gmail.google.com
Danezis, G., Anderson, R.: The economics of resisting censorship. IEEE Security and Privacy 3(1), 45–50 (2005)
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACMÂ 4(2) (1981)
Danezis, G., Dingledine, R., Mathewson, N.: Mixminion: Design of a Type III Anonymous Remailer Protocol. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (2003)
Danezis, G., Laurie, B.: Minx: A simple and efficient anonymous packet format. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004), Washington, DC, USA (2004)
Canetti, R.: Security and composition of multiparty cryptographic protocols. J. Cryptology 13(1), 143–202 (2000)
Pfitzmann, B., Schunter, M., Waidner, M.: Cryptographic security of reactive systems. Electr. Notes Theor. Comput. Sci. 32 (2000)
Levien, R.L.: Attack resistant trust metrics. PhD thesis, University of California at Berkeley, Draft Thesis (1995)
Wasserman, S., Faust, K., Iacobucci, D., Granovetter, M.: Social Network Analysis: Methods and Applications (Structural Analysis in the Social Sciences), 1st edn. Cambridge University Press, Cambridge (1994)
di Vimercati, S.D.C., Syverson, P.F., Gollmann, D.: ESORICS 2005. LNCS, vol. 3679. Springer, Heidelberg (2005)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2010 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Danezis, G., Laurie, B. (2010). Private Yet Abuse Resistant Open Publishing. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds) Security Protocols. Security Protocols 2007. Lecture Notes in Computer Science, vol 5964. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-17773-6_28
Download citation
DOI: https://doi.org/10.1007/978-3-642-17773-6_28
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-17772-9
Online ISBN: 978-3-642-17773-6
eBook Packages: Computer ScienceComputer Science (R0)