{"title":"Provable Synthetic Coordinates for Increasing PoWs Effectiveness against DoS and Spam","authors":"Marius Cristea, B. Groza","doi":"10.1109/SocialCom-PASSAT.2012.96","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.96","url":null,"abstract":"The effectiveness of synthetic coordinate systems against DoS and spam stems from the fact that, while changing or hiding a logical address is easier, changing the location of the spammer inside the network should be harder. But synthetic coordinate systems are limited by the fact that malicious nodes can easily lie about their position or introduce additional delays which have an immediate impact on it. For this purpose, we enhance the synthetic coordinate system provided by Vivaldi with secure nonces that are periodically broadcasted by trusted servers to achieve a provable location claim within the overlay network. As we advocate in this work, secure localization can help in choosing the hardness of PoWs since locations from which more malicious traffic originates can receive PoWs with higher difficulties.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"1 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"129548673","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
Atanu Roy, M. Ahmad, Chandrima Sarkar, Brian Keegan, J. Srivastava
{"title":"The Ones that Got Away: False Negative Estimation Based Approaches for Gold Farmer Detection","authors":"Atanu Roy, M. Ahmad, Chandrima Sarkar, Brian Keegan, J. Srivastava","doi":"10.1109/SocialCom-PASSAT.2012.125","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.125","url":null,"abstract":"The problem of gold farmer detection is the problem of detecting players with illicit behaviors in massively multiplayer online games (MMOs) and has been studied extensively. Detecting gold farmers or other deviant actors in social systems is traditionally understood as a binary classification problem, but the issue of false negatives is significant for administrators as residual actors can serve as the backbone for subsequent clandestine organizing. In this paper we address this gap in the literature by addressing the problem of false negative estimation for gold farmers in MMOs by employing the capture-recapture technique for false negative estimation and combine it with graph clustering techniques to determine \"hidden\" gold farmers in social networks of farmers and normal players. This paper redefines the problem of gold farming as a false negative estimation problem and estimates the gold farmers in co-extensive MMO networks, previously undetected by the game administrators. It also identifies these undetected gold farmers using graph partitioning techniques and applies network data to address rare class classification problem. The experiments in this research found 53% gold farmers who were previously undetected by the game administrators.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"9 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123845890","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Differential Privacy through Knowledge Refinement","authors":"Jordi Soria-Comas, J. Domingo-Ferrer","doi":"10.1109/SocialCom-PASSAT.2012.26","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.26","url":null,"abstract":"We introduce a novel mechanism to attain differential privacy. Contrary to the common mechanism based on the addition of a noise whose magnitude is proportional to the sensitivity of the query function, our proposal is based on the refinement of the user's prior knowledge about the response. We show that our mechanism has several advantages over noise addition: it does not require complex computations, and thus it can be easily automated, it lets the user exploit her prior knowledge about the response to achieve better data quality, and it is independent of the sensitivity of the query function (although this can be a disadvantage if the sensitivity is small). We also show some compounding properties of our mechanism for the case of multiple queries.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"142 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"116550012","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Agent Trust Management Based on Human Plausible Reasoning: Application to Web Search","authors":"Sadra Abedinzadeh, S. Sadaoui","doi":"10.1109/SocialCom-PASSAT.2012.72","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.72","url":null,"abstract":"In open systems, different service providers can join and leave at any time. Multi Agent Systems (MASs) are being used more and more as the basis of open systems. Although openness brings a huge opportunity for different systems to operate in a decoupled and autonomous manner, it can introduce untrustworthy agents into the society. For this purpose, Agent Trust Management (ATM) methods have been proposed to try to eliminate this defect. This paper presents a general framework for managing trust in MASs based on the theory of Human Plausible Reasoning (HPR). The goal of the proposed framework is to determine for each user a ranked list of trusted agents and to find newer possible trust relationships between users and agents. We use the HPR certainty parameters to define how trustworthy each agent is in the list. We measure the agent trust according to two metrics: the direct interaction rating and third-party references. For each user, a third party is any other user with whom a HPR relationship exists. We aggregate the direct interaction rating value and the reputation values of third parties to achieve a single quantitative value for the trust. This value is then used to rank the agents. We apply our HPR-based ATM framework to the domain of Web search. The resulting ATM system provides the user a list of trusted search engines ranked according to the reputation the search engine has gained by interacting with other related users as well as the retrieval precision of pages returned in response to the user's query.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"29 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"123430561","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Factors that Influence the Choice of Privacy Settings on Facebook: Freshmen's View at a South African University","authors":"P. Ntlatywa, R. Botha, B. Haskins","doi":"10.1109/SocialCom-PASSAT.2012.36","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.36","url":null,"abstract":"A contradiction between the reported privacy concerns and observed privacy behaviour of users of social networking sites has been reported. To understand this contradiction this paper examines factors that influence privacy behaviour of users on social networking sites. Participants in this study were freshmen studying IT recruited from Nelson Mandela Metropolitan University during the academic year of 2011. A questionnaire was used to study the reported privacy concerns of the participants, followed by observations on the public Facebook profiles of the participants to shed light on their actual behaviour. Interviews exposed factors that negatively influence privacy behaviour, while another questionnaire explored factors that positively influence privacy behaviour. This study shows that the contradiction between privacy concerns and observed privacy behaviour varies according to the type of information in question. Based on the findings, we developed a model that identifies factors that users consider when choosing privacy settings on Facebook.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"42 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"127505856","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Privacy Preserving Maximum-Flow Computation in Distributed Graphs","authors":"Xiaoyun He, Jaideep Vaidya, Basit Shafiq, N. Adam","doi":"10.1109/SocialCom-PASSAT.2012.20","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.20","url":null,"abstract":"The maximum-flow problem arises in a wide variety of applications such as financial transactions and logistics collaboration networks, where the data can be modeled as a directed graph. In many such applications, the graph data is actually distributed across several organizations where each owns a portion of the overall graph. Due to privacy concerns, the parties may not wish to disclose their local graphs. However, the computation of maximum-flow over the overall graph brings great benefits to concerned stakeholders. In this paper, we address the privacy preserving maximum-flow computation problem in distributed graphs. We propose a two-stage approach that achieves privacy protection while ensuring the correct maximum flow computation. In the first stage, a novel probabilistic edge expansion process is used to obfuscate the graph structure and prevent node re-identification while preserving the maximum flow, the second stage securely integrates local graphs into a global whole such that any third party can then compute the maximum flow. We provide a thorough correctness and privacy analysis and experimentally evaluate the proposed approach.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"22 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125381693","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Private (t,n) Threshold Searching on Streaming Data","authors":"X. Yi, C. Xing","doi":"10.1109/SocialCom-PASSAT.2012.47","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.47","url":null,"abstract":"Private searching on streaming data is a process to dispatch to a public server a program, which searches streaming sources of data without revealing searching criteria and then sends back a buffer containing the findings. From an Abelian group homomorphic encryption, the searching criteria can be constructed by only simple combinations of keywords, e.g., disjunction of keywords. The recent breakthrough in fully homomorphic encryption has allowed us to construct arbitrary searching criteria theoretically. In this paper, we consider a (t, n) threshold query, which searches for documents containing more than t out of n keywords. This form of query can help us find more relevant documents. We present a construction of the searching criteria for private threshold searching on streaming data on the basis of the state-of-the-art fully homomorphic encryption techniques. Our protocol is semantically secure as long as the underlying fully homomorphic encryption scheme is semantically secure.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"125558289","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Social and Emotional Turn Taking for Embodied Conversational Agents","authors":"Merijn Bruijnes","doi":"10.1109/SocialCom-PASSAT.2012.29","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.29","url":null,"abstract":"In this doctoral consortium paper I describe the theme of my research, the model-based generation of consistent emotional turn taking behavior in virtual human conversations and the evaluation of this behavior. My goal is to investigate and generate convincing social behavior in embodied conversational agents.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"28 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"134539556","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Centrality Analysis, Role-Based Clustering, and Egocentric Abstraction for Heterogeneous Social Networks","authors":"Cheng-te Li, Shou-de Lin","doi":"10.1109/SocialCom-PASSAT.2012.59","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.59","url":null,"abstract":"The social network is a powerful data structure allowing the depiction of relationship information between entities. Recent researchers have proposed many successful methods on analyzing homogeneous social networks assuming only a single type of node and relation. Nevertheless, real-world complex networks are usually heterogeneous, which presumes a network can be composed of different types of nodes and relations. In this paper, we propose an unsupervised tensor-based mechanism considering higher-order relational information to model the complex semantics of a heterogeneous social network. Based on the model we present solutions to three critical issues in heterogeneous networks. The first concerns identifying central nodes in the heterogeneous network. Second, we propose a role-based clustering method to identify nodes which play similar roles in the network. Finally, we propose an egocentric abstraction mechanism to facilitate further explorations in a complex social network. The evaluations are conducted on a real-world movie dataset and an artificial crime dataset with promising results.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"59 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"132833123","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}
{"title":"Dimensionality Reduction for Emotional Speech Recognition","authors":"Pouria Fewzee, F. Karray","doi":"10.1109/SocialCom-PASSAT.2012.83","DOIUrl":"https://doi.org/10.1109/SocialCom-PASSAT.2012.83","url":null,"abstract":"The number of speech features that are introduced to emotional speech recognition exceeds some thousands and this makes dimensionality reduction an inevitable part of an emotional speech recognition system. The elastic net, the greedy feature selection, and the supervised principal component analysis are three recently developed dimensionality reduction algorithms that we have considered their application to tackle this issue. Together with PCA, these four methods include both supervised and unsupervised, as well as filter and projection-type dimensionality reduction methods. For experimental reasons, we have chosen VAM corpus. We have extracted two sets of features and have investigated the efficiency of the application of the four dimensionality reduction methods to the combination of the two sets, besides each of the two. The experimental results of this study show that in spite of a dimensionality reduction stage, a longer vector of speech features does not necessarily result in a more accurate prediction of emotion.","PeriodicalId":129526,"journal":{"name":"2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing","volume":"4 1","pages":"0"},"PeriodicalIF":0.0,"publicationDate":"2012-09-03","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":null,"resultStr":null,"platform":"Semanticscholar","paperid":"131529848","PeriodicalName":null,"FirstCategoryId":null,"ListUrlMain":null,"RegionNum":0,"RegionCategory":"","ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":"","EPubDate":null,"PubModel":null,"JCR":null,"JCRName":null,"Score":null,"Total":0}