Pythia: A Privacy Aware, Peer-to-Peer Network for Social Search Shirin Nilizadeh, Naveed Alam, Nathaniel Husted, Apu Kapadia School of Informatics and.

Slides:



Advertisements
Similar presentations
Workshop on Online Social Networks Microsoft Research Cambridge December 7, 2007.
Advertisements

Level 2 Award in Social Networking for Business Day 3 Tutor: Alan Jarvis.
Christian Vargas. Also known as Data Privacy or Data Protection Is the relationship between collection and spreading or exposing data and information.
1 A Hitchhiker's Guide to the New Learning Ecosystem Learning 2009 Karie Willyerd VP and Chief Learning Officer 1.
An Overview of Peer-to-Peer Networking CPSC 441 (with thanks to Sami Rollins, UCSB)
1 Freeriders in P2P: Pricing Incentives Don Towsley UMass-Amherst collaborators: D. Figueiredo, J. Shapiro.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
1 Denial-of-Service Resilience in P2P File Sharing Systems Dan Dumitriu (EPFL) Ed Knightly (Rice) Aleksandar Kuzmanovic (Northwestern) Ion Stoica (Berkeley)
Responder Anonymity and Anonymous Peer-to-Peer File Sharing. by Vincent Scarlata, Brian Levine and Clay Shields Presentation by Saravanan.
ASP.NET 2.0 Chapter 6 Securing the ASP.NET Application.
1 Freenet  Addition goals to file location: -Provide publisher anonymity, security -Resistant to attacks – a third party shouldn’t be able to deny the.
Building Expertise Network by Tagging People Yan Qu iSchool, University of Maryland Jun Zhang Pitney Bowes, Inc.
Hippocratic Databases Paper by Rakesh Agrawal, Jerry Kiernan, Ramakrishnan Srikant, Yirong Xu CS 681 Presented by Xi Hua March 1st,Spring05.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
A Wanderer’s Guide to the Data Network Navigating Our Connected World Garrett Shields, GISP, CFM.
FACEBOOK AS A LEARNING TOOL Implications for ubiquitous learning.
1 Anonshare 2.0 P2P Anonymous Browsing History Share Frank Chiang Terry Go Rui Ma Anita Mathew.
By Shobana Padmanabhan Sep 12, 2007 CSE 473 Class #4: P2P Section 2.6 of textbook (some pictures here are from the book)
Sharable Information Workspace William Lee Computer Science University of Illinois at Urbana-Champaign.
Aardvark Anatomy of a Large-Scale Social Search Engine.
Indiana National Guard Employment Coordination Program Job Search VIA Social Media.
1 Facebook B2B Best Practices Guide Using Facebook for Lead Generation.
When Simple Networks Fail: Characterising Social Networks Using Simulation Bruce Edmonds Centre for Policy Modelling Manchester Metropolitan University.
The New SIMnet.org with Social Networking User Orientation Notes June 21,
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Yogesh Gautam B.Sc., MCA, Ph.D. (Computer Science) MBA, PGP Cyber Law.
CSCD 330 Network Programming Fall/Winter/Spring 2014 Lecture 1 - Course Details.
Hiding in the Mobile Crowd: Location Privacy through Collaboration.
Let’s ChronoSync: Decentralized Dataset State Synchronization in Named Data Networking Zhenkai Zhu Alexander Afanasyev (presenter) Tuesday, October 8,
Pitfalls and Mistakes. Agenda Who We Are Social Media Today Pitfalls and Mistakes –Policies –Poor Decisions Online Reputation Accepting Random People.
Olof Nilsson.  Ex: Facebook, MySpace, LinkedIn ◦ Allows users to create web pages or profiles that provide information about themselves and are available.
Semantic Web and Policy Workshop Panel Contribution Norman M. Sadeh School of Computer Science Carnegie Mellon University Director, e-Supply Chain Management.
Regulation of Personal Information Sally Brierley & Emma Harvey.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Who is on… Introduction Using social media entails particular kind of literacies i.e. skills which include the ability to engage in a medium for production.
Georgios Kontaxis‡, Michalis Polychronakis‡, Angelos D. Keromytis‡, and Evangelos P.Markatos* ‡Columbia University and *FORTH-ICS USENIX-SEC (August, 2012)
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
GISPUG – July 27 th,  Enhanced MySites  Social Tagging  Wikis  Resources  Open Discussion.
Mtivity Client Support System Quick start guide. Mtivity Client Support System We are very pleased to announce the launch of a new Client Support System.
Peer-to-Peer and Collective Intelligence A platform for collaboration Andrew Roczniak Collective Intelligence Lab Multimedia Communications Research Lab.
Community provides a private, manageable, and secure online space for organization's to communicate. It puts the collective knowledge of your entire organization.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
Lecture 13: Anonymity on the Web Modified from Levente Buttyan, Michael K. Reiter and Aviel D. Rubin.
Enabling e-Research in Combustion Research Community T.V Pham 1, P.M. Dew 1, L.M.S. Lau 1 and M.J. Pilling 2 1 School of Computing 2 School of Chemistry.
Website that support online communities 1. Wikis 2. Blogs 3. Forums 4. Social networking sites.
Internet Privacy: What’s Yours and What Never Was 14 April 2011 Ms. Foster and Ms. McCabe Street Law.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Community-enhanced De-anonymization of Online Social Networks Shirin Nilizadeh, Apu Kapadia, Yong-Yeol Ahn Indiana University Bloomington CCS 2014.
CSCD 330 Network Programming Winter 2015 Lecture 1 - Course Details.
PRIVACY, LAW & ETHICS MBA 563. Source: eMarketing eXcellence Chaffey et al. BH Overview: Establishing trust and confidence in the online world.
Lecture 16 Page 1 CS 236 Online Exploiting Statelessness HTTP is designed to be stateless But many useful web interactions are stateful Various tricks.
How To Use Social Media to Launch Your Career. The most important social media outlet to be active on is LinkedIn. This site provides valuable tools that.
Get Connected through the My Oracle Support Community Lynn Pionkowski Sr Regional Support Advocate
Introduction Web analysis includes the study of users’ behavior on the web Traffic analysis – Usage analysis Behavior at particular website or across.
Groupware What are the goals of a groupware system? - Facilitation - Coordination - Cooperation - Augmented, supported production Is efficiency the goal?
“ ” LinkedIn for Behind Closed Doors Burnside Library located in the Burnside Civic Centre, 401 Greenhill Road, Tusmore, Adelaide, South Australia Sue.
Chapter 8: Web Analytics, Web Mining, and Social Analytics
AN INTRODUCTION TO FACEBOOK. Learning Objectives A brief introduction to the social networking site Facebook. Instructions to create an account. How to.
1 Anonymity. 2 Overview  What is anonymity?  Why should anyone care about anonymity?  Relationship with security and in particular identification 
Data mining in web applications
Anonymous Communication
Latest Updates on BlackHawk Mines Music : Privacy Policy
Topic 5: Online Communities Press F5 to view!
Inference and Flow Control
Anonymous Communication
National Sales Meeting 2011
Anonymous Communication
Presentation transcript:

Pythia: A Privacy Aware, Peer-to-Peer Network for Social Search Shirin Nilizadeh, Naveed Alam, Nathaniel Husted, Apu Kapadia School of Informatics and Computing Indiana University Bloomington WPES 2011

The “village model” Searching for the right person 2 Picture taken from vark.com

The “library model” of finding the right page, doesn’t always work (Not everything can be Googled!) Q1. What is the best disc golf course at IU? I have decent skills and am looking for good challenges with trees and slopes. Also, a place that isn’t too crowded on weekend mornings. 3 Q2. I’m looking for a great course in computer security, and I see one being taught by Prof. Kapadia and another by Prof. Myers. Any experiences with them? Any comments on one vs. the other?

Centralized architectures leverage personal information to provide better answers but are not ideal for privacy Aardvark Profile’s Privacy Policy (vark.com/privacy): “We store information that we collect through cookies, log files, and explicit interactions with the service to create a "profile" of your preferences. We tie your personally identifiable information to information in the profile, in order to improve the content of the service for you. We do not share your profile with other third parties.” 4

Objective: Design a privacy-aware peer-to-peer social network to support sensitive Q&A 5

Our main goal is to provide “expertise unlinkability” 6 Q1. Why are people in Syria protesting? Q2. What are active political parties in Syria? Q3. Where in Damascus will the protesters continue their protest today? How many people do you expect will join? User Profile: Username: Alice Interests/ Expertise: 1- Texas Restaurants 2- Anthropology User Profile: Username: Bob Interests/ Expertise: 1- Syria 2- Computers and Technology A1. For President Bashar al-Assad to step down, for the ruling Baath Party to allow other political parties, equal rights for Syria's ethnic and religious groups, and broad political freedoms. A2. Baath Party (governing party), Arab Socialist Movement, Arab Socialist Union, etc. A3. At … Square at 4 pm! I expect 10,000! Tag Bob with Syria politics Tag Bob with Syria activist

7 Our P2P design supports private queries and leverages social neighborhoods

We evaluate the privacy provided against honest-but-curious attackers Global Attacker: views all messages and infer the online/offline and idle status of all the nodes at any time Colluding Attackers: some fraction of nodes are compromised and thus have partial knowledge Capability : attackers can link (or not link) questions/answers from a particular expert 8

Anonymity of users degrades over time; however if answers are not linkable, anonymity improves greatly. Simulation: 5 scale-free graphs with 60,000 nodes Communities’ size: nodes Human models from Skype and Aardvark usage were used to simulate queries and answers. 9

Discussion Shielding Participants keep track of their anonymity sets, and compute their loss of anonymity when they ask or answer questions. Reputation Nodes could advertise their expertise along with reputation information for that expertise. Incentives Our current model largely relies on altruism. In addition to reputation mechanisms, simple policies can help control freeriding 10

Thank you! 11

12

Q&A forums don’t actively locate experts 13 Pictures taken from touchtip.com Picture taken from nerdliness.com

Social search leverages humans for more relevant results 14 Picture taken from answers.chacha.com Example Where does the shoe company Nike get its name from? Example The company name was changed from BRS (Blue Ribbon Shoes) to Nike, Inc. in Named after Nike, the Greek goddess of the victory.

15 R R R R After formation of communities, users advertise their interests to the representative using onion routing. Q Which course is better to take, the one taught by Prof. Kapadia or the one taught by Prof. Menczer? Any experiences with them? Any comments on one vs. the other? Representative floods the community asking if anyone wants to answer a question about Classes at Informatics. I A user wants to answer – informs representative – gets acknowledgement – answers question I I I I I A A A

Our main goal is to provide “expertise unlinkability” 16 Q1. Why are people in Syria protesting? Q2. What are active political parties in Syria? Q3. Where in Damascus will the protesters continue their protest today? How many people do you expect will join? User Profile: Username: Alice Interests/ Expertise: 1- Texas Restaurants 2- Anthropology User Profile: Username: Bob Interests/ Expertise: 1- Syria 2- Computers and Technology A1. For President Bashar al-Assad to step down, for the ruling Baath Party to allow other political parties, equal rights for Syria's ethnic and religious groups, and broad political freedoms. A2. Baath Party (governing party), Arab Socialist Movement, Arab Socialist Union, etc. A3. At … Square at 4 pm! I expect 10,000! Tag Bob with Syria politics Tag Bob with Syria activist