Advertisement

Data Leak Aware Crowdsourcing in Social Network

  • Iheb Ben Amor
  • Salima Benbernou
  • Mourad Ouziri
  • Mohamed Nadif
  • Athman Bouguettaya
Part of the Lecture Notes in Computer Science book series (LNCS, volume 7652)

Abstract

Harnessing human computation for solving complex problems call spawns the issue of finding the unknown competitive group of solvers. In this paper, we propose an approach called Friendlysourcing to build up teams from social network answering a business call, all the while avoiding partial solution disclosure to competitive groups. The contributions of this paper include (i) a clustering based approach for discovering collaborative and competitive team in social network (ii) a Markov-chain based algorithm for discovering implicit interactions in the social network.

Keywords

Social network outsourcing human-computation privacy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Daren, C.: Brabham. Crowdsourcing as a model for problem solving: An introduction and cases. Convergence: The International Journal of Research into New Media Technologies 14(1), 75–90 (2008)CrossRefGoogle Scholar
  2. 2.
    Deutch, D., Greenshpan, O., Kostenko, B., Milo, T.: Using markov chain monte carlo to play trivia. In: ICDE, pp. 1308–1311 (2011)Google Scholar
  3. 3.
    Fang, L., Kim, H., LeFevre, K., Tami, A.: A privacy recommendation wizard for users of social networking sites. In: ACM Conference on Computer and Communications Security, pp. 630–632 (2010)Google Scholar
  4. 4.
    Hggstrm, O.: Finite markov chains and algorithmic applications. London Mathematical Society Student Texts. Cambridge University Press (2000)Google Scholar
  5. 5.
    MacQueen, J., et al.: Some methods for classification and analysis of multivariate observations. In: Proceedings of the Fifth Berkeley Symposium on Mathematical Statistics and Probability, California, USA, vol. 1, p. 14 (1967)Google Scholar
  6. 6.
    Sellis, T.K., Miller, R.J., Kementsietsidis, A., Velegrakis, Y. (eds.): Proceedings of the ACM SIGMOD International Conference on Management of Data, SIGMOD 2011, Athens, Greece, June 12-16. ACM (2011)Google Scholar
  7. 7.
    Skopik, F., Schall, D., Psaier, H., Treiber, M., Dustdar, S.: Towards social crowd environments using service-oriented architectures. IT - Information Technology 53(3), 108–116 (2011)CrossRefGoogle Scholar
  8. 8.
    Talukder, N., Ouzzani, M., Elmagarmid, A.K., Elmeleegy, H., Yakout, M.: Privometer: Privacy protection in social networks. In: ICDE Workshops, pp. 266–269 (2010)Google Scholar
  9. 9.
    Weise, T.: Global Optimization Algorithms - Theory and Application (June 2009)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2013

Authors and Affiliations

  • Iheb Ben Amor
    • 1
  • Salima Benbernou
    • 1
  • Mourad Ouziri
    • 1
  • Mohamed Nadif
    • 1
  • Athman Bouguettaya
    • 2
  1. 1.Université Paris Sorbone CitéParis DescartesFrance
  2. 2.RMIT UniversityAustralia

Personalised recommendations