Fighting authorship linkability with crowdsourcing

作者: Mishari Almishari , Ekin Oguz , Gene Tsudik

DOI: 10.1145/2660460.2660486

关键词:

摘要: Massive amounts of contributed content -- including traditional literature, blogs, music, videos, reviews and tweets are available on the Internet today, with authors numbering in many millions. Textual information, such as product or service reviews, is an important increasingly popular type that being used a foundation trendy community-based reviewing sites, TripAdvisor Yelp. Some recent results have shown that, due partly to their specialized/topical nature, sets authored by same person readily linkable based simple stylometric features. In practice, this means individuals who author more than few under different accounts (whether within one site across multiple sites) can be linked, which represents significant loss privacy.In paper, we start showing problem actually worse previously believed. We then explore ways mitigate authorship linkability reviewing. first attempt harness global power crowdsourcing engaging random strangers into process re-writing reviews. As our empirical (obtained from Amazon Mechanical Turk) clearly demonstrate, yields impressively sensible reflect sufficiently characteristics prior techniques become largely ineffective. also consider using machine translation automatically re-write Contrary what was believed, show decreases number intermediate languages grows. Finally, combination report results.

参考文章(18)
William Aiello, Andrew Warfield, Mihir Nanavati, Nathan Taylor, Herbert west: deanonymizer usenix conference on hot topics in security. pp. 6- 6 ,(2011)
Josyula R. Rao, Pankaj Rohatgi, Can pseudonymity really guarantee privacy usenix security symposium. pp. 7- 7 ,(2000)
Andrew W. E. McDonald, Sadia Afroz, Aylin Caliskan, Ariel Stolerman, Rachel Greenstadt, Use fewer instances of the letter i: toward writing style anonymization privacy enhancing technologies. pp. 299- 318 ,(2012) , 10.1007/978-3-642-31680-7_16
Mishari Almishari, Gene Tsudik, Exploring Linkability of User Reviews Computer Security – ESORICS 2012. pp. 307- 324 ,(2012) , 10.1007/978-3-642-33167-1_18
Randall Schumacker, Sara Tomek, Chi-Square Test Springer, New York, NY. pp. 169- 175 ,(2013) , 10.1007/978-1-4614-6227-9_8
Kristina Toutanova, Dan Klein, Christopher D. Manning, Yoram Singer, Feature-rich part-of-speech tagging with a cyclic dependency network Proceedings of the 2003 Conference of the North American Chapter of the Association for Computational Linguistics on Human Language Technology - NAACL '03. pp. 173- 180 ,(2003) , 10.3115/1073445.1073478
Sadia Afroz, Michael Brennan, Rachel Greenstadt, Detecting Hoaxes, Frauds, and Deception in Writing Style Online ieee symposium on security and privacy. pp. 461- 475 ,(2012) , 10.1109/SP.2012.34
Eiji Hayashi, Jason Hong, Nicolas Christin, Security through a different kind of obscurity Proceedings of the 2011 annual conference on Human factors in computing systems - CHI '11. pp. 2055- 2064 ,(2011) , 10.1145/1978942.1979242
P. Pudil, J. Novovičová, J. Kittler, Floating search methods in feature selection Pattern Recognition Letters. ,vol. 15, pp. 1119- 1125 ,(1994) , 10.1016/0167-8655(94)90127-9
Aylin Caliskan, Rachel Greenstadt, Translate Once, Translate Twice, Translate Thrice and Attribute: Identifying Authors and Machine Translation Tools in Translated Text 2012 IEEE Sixth International Conference on Semantic Computing. pp. 121- 125 ,(2012) , 10.1109/ICSC.2012.46