Social Computing and Incentivized Sharing. Group Members UT Dallas Murat Kantarcioglu Alain Bensoussan (UT Dallas) Nathan Berg Bhavani Thuraisingham University.

Slides:



Advertisements
Similar presentations
ACHIEVING NETWORK LEVEL PRIVACY IN WIRELESS SENSOR NETWORKS.
Advertisements

Privacy-Enhancing Models and Mechanisms for Securing Provenance and its Use October 2010 Lead PI: Ravi Sandhu (UT San Antonio) PIs: Elisa Bertino (Purdue),
ROWLBAC – Representing Role Based Access Control in OWL
QUN NI 1, SHOUHUAI XU 2, ELISA BERTINO 1, RAVI SANDHU 2, AND WEILI HAN 3 1 PURDUE UNIVERSITY USA 2 UT SAN ANTONIO USA 3 FUDAN UNIVERSITY CHINA PRESENTED.
Secure Dependable Stream Data Management Vana Kalogeraki (UC Riverside) Dimitrios Gunopulos (UC Riverside) Ravi Sandhu (UT San Antonio) Bhavani Thuraisingham.
© Ravi Sandhu Security Issues in P2P Systems Prof. Ravi Sandhu Laboratory for Information Security Technology George Mason University.
Nocturnal: Automated Messenger-based Information Sharing and Collaboration Coby Fernandess (Intern) the Hebrew University Dahlia Malkhi, Udi Wieder, Lidong.
Workshop on Online Social Networks Microsoft Research Cambridge December 7, 2007.
NIST Big Data Public Working Group Security and Privacy Subgroup Presentation September 30, 2013 Arnab Roy, Fujitsu Akhil Manchanda, GE Nancy Landreville,
Trust and Reputation in Social Networks Laura Zavala 03/2010.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Network Security aka CyberSecurity Monitor and manage security risks at the network level for the entire Johns Hopkins Network.
Information | Analytics | Expertise SOCIAL MEDIA INTELLIGENCE Practical Strategies for Using Social Media to Enhance Security AUGUST 2014 © 2014 IHS IHS.
Enabling the Social Web Krishna P. Gummadi Networked Systems Group Max Planck Institute for Software Systems.
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Bhavani Thuraisingham The University of Texas at Dallas (UTD) February 19, 2015 NSF Workshop on Big Data Security and Privacy Report Summary.
Social networks and information sharing Lada Adamic.
Oozing out knowledge in human brains to the Internet Lada Adamic School of Information University of Michigan
Chapter 20: Social Service Selection Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Elisa Bertino Dept. of Computer Science University of Milano Page 1 Author-X Secure and selective access and flexible distribution mechanisms for XML documents.
School of Information University of Michigan Expertise Networks in Online Communities: Structure and Algorithms Lada Adamic joint work with Jun Zhang and.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
School of Information University of Michigan Expertise Sharing Dynamics in Online Forums Lada Adamic joint work with Jun Zhang, Mark Ackerman, Eytan Bakshy,
Chapter 20: Social Service Selection Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Module 3: Business Information Systems Chapter 11: Knowledge Management.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Information Management for Agricultural Innovation
HCIMA Unit 3 The Internet Revolution and Electronic Tools Next slide.
Introduction to Q&A systems Yahoo! Answer and Naver KiN KSE 801 Uichin Lee.
Evaluation and Testbed Development Bhavani Thuraisingham The University of Texas at Dallas Jim Massaro and Ravi Sandhu.
Data Warehousing Data Mining Privacy. Reading Bhavani Thuraisingham, Murat Kantarcioglu, and Srinivasan Iyer Extended RBAC-design and implementation.
1 4/23/2007 Introduction to Grid computing Sunil Avutu Graduate Student Dept.of Computer Science.
Trustworthy Semantic Webs Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course.
Assured Information Sharing Lifecycle A Framework for Managing the Assured Information Sharing Lifecycle Tim Finin Joint MURI Meeting 12 September 2008.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Lecture #22 Secure Web Information.
A Data Intensive Reputation Management Scheme for Vehicular Ad Hoc Networks Anand Patwardhan, Anupam Joshi, Tim Finin, and Yelena Yesha Anand Patwardhan.
February 2009 Framework for Managing the Assured Information Sharing Lifecycle 2008 MURI project with UMBC, Purdue, U. Texas Dallas, U. Illinois, U. Texas.
Marv Adams Chief Information Officer November 29, 2001.
ICT-enabled Agricultural Science for Development Scenarios, Opportunities, Issues by ICTs transforming agricultural science, research & technology generation.
A Hybrid Technique for Private Location-Based Queries with Database Protection Gabriel Ghinita 1 Panos Kalnis 2 Murat Kantarcioglu 3 Elisa Bertino 1 1.
Chapter 20: Social Service Selection Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Computer Science and Engineering 1 Mobile Computing and Security.
Social Information Processing March 26-28, 2008 AAAI Spring Symposium Stanford University
Data Warehousing Data Mining Privacy. Reading FarkasCSCE Spring
1. IT Infrastructure Amna Riaz007 Tayaba Ashraf008 2.
Communities and Portals Lan Zhang School of Information University of Texas at Austin.
Csci5233 Computer Security1 Bishop: Chapter 14 Representing Identity.
UMBC AN HONORS UNIVERSITY IN MARYLAND A Framework for Managing the Assured Information Sharing Lifecycle Overview 18 September 2009 use acquir e discove.
Big Data Security Issues in Cloud Management. BDWG Big Data Working Group Researchers 1: Data analytics for security 2: Privacy preserving 3: Big data-scale.
Charlotte Nirmalani Gunawardena, Regents’ Professor, University of New Mexico, USA PARADIGM SHIFT TO ONLINE LEARNING: FACILITATING A LEARNING COMMUNITY.
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Introduction to the Course January.
Big Data Security and Privacy
GRAPH IDs As people struggle to manage the conflicting priorities of privacy and security, a new interface will begin to emerge as a way to represent—and.
Data and Applications Security
Knowledge Discovery in the Semantic Web
Trust on Blogosphere using Link Polarity Anubhav Kale, Akshay Java, Pranam Kolari, Dr Anupam Joshi, Dr Tim Finin Motivation Link Polarity Computation.
Doctoral Dissertation Research Proposal
Interdisciplinary Program in Cognitive Science Lee, Jung-Woo
Data Warehousing Data Mining Privacy
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
18734: Foundations of Privacy
Data and Applications Security Developments and Directions
Data and Applications Security Developments and Directions
World-Leading Research with Real-World Impact!
Trust-based Privacy Preservation for Peer-to-peer Data Sharing
Presentation transcript:

Social Computing and Incentivized Sharing

Group Members UT Dallas Murat Kantarcioglu Alain Bensoussan (UT Dallas) Nathan Berg Bhavani Thuraisingham University of Michigan Lada Adamic UMBC Yelena Yesha Joel Sachs Anupam Joshi Tim Finin UTSA Shouhuai Xu Ravi Sandhu Purdue Elisa Bertino Chris Clifton Gabriel Ghinita Ningui Li

social networks & the AISL SOCIAL NETWORKS UT Dallas privacy and security incentivized sharing information dissemination and filtering

social networks and information sharing distributing information determining who should receive information pulling information information filtering (e.g. digg, FriendFeed) securing information propagation of trust and distrust (reputation management) enhance trustworthiness of cryptographic key infrastructure incentivizing sharing individuals more or less likely to share with close contacts

acquiring: novelty and community structure data quality/provenance identify circular intelligence through proximity in social networks temporal & source information can be mapped onto social network  relevance  trust  incentive for sharing  novelty  information flow path  individual receiving information

sharing & acquiring: open participation Knows Knowledge iN

open participation: information or noise? Knowledge In ``Knowledge search is like oozing out knowledge in human brains to the Internet. People who know something better than others can present their know-how, skills or knowledge'' NHN CEO Chae Hwi-young “(It is) the next generation of search… (it) is a kind of collective brain -- a searchable database of everything everyone knows. It's a culture of generosity. The fundamental belief is that everyone knows something.” -- Eckart Walther (Yahoo Research)

Network analysis can be used to determine expertise Preferred Helper: ‘just better’ Preferred Helper: ‘best available’

and study competitive information sharing Java Forum: asker -> replier Task CN: submitter -> winner

structure of complex networks heterogeneous connectivity and participation robustness connectivity propagation of misinformation from compromised nodes

Secure social networks: research goal We ask and address the following two questions: How should we exploit social computing/networks for security purposes (e.g., assured information sharing)? How should we secure social computing/networks?

Security by social computing protect cryptographic security detect and deter malicious players trustworthy and survivable storage reputation management reliable and secure information dissemination

Security for social computing anonymous & accountable social computing privacy-preserving social computing inferring private data from social connections secure incentive mechanisms manipulation-resistant social computing data quality/provenance obscuring identity and connections

prior work Secure social networks & privacy: Network robustness: (poster: Xu et al. “Generalized Epidemic Threshold, with Applications”) Key signing: “Exploiting social networks for threshold signing” (AsiaCCS'08) Privacy and trust in information sharing (Kantarcioglu UTDCS ) Information sharing & filtering: Inferring expertise in Q&A forums (Adamic et al. WWW07&08) Using social networks to detect conflicts of interest (Joshi et. al: WWW2006, ACM Tweb, 2008) online information sharing structure (blogs,twitter) Adamic (WI 2005,ICWSM07&08) Finin, Joshi (WebKDD,ICWSM07&08,+ many more) data quality and providence (detecting spam blogs) (AAAI 2006,ICWSM07,TREC2006) Social and semantic computing: blending the social & semantic (Sachs AAAI 07 workshop)

current research social networks as a filtering & aggregation tool Yelena Yesha, Lada Adamic, Anupam Joshi, Tim Finin understand the role of social networks (e.g. FriendFeed, blogs) in information diffusion sentiment analysis and network structure security for and from social networks Shouhuai Xu, Ravi Sandhu Understanding properties of social networks under attack Using insights to make social computing more robust and secure incentivized sharing in social networks Murat Kantarcioglu, Lada Adamic Experiments: effect of social connections on information sharing (peer recognition) and ability to recognize poor information sources Social engineering (phishing, etc.)

social networks & the AISL SOCIAL NETWORKS UT Dallas privacy and security incentivized sharing information dissemination and filtering