Campus Event Calendar

Event Entry

What and Who

On the Trustworthiness of Weak Identities in Social Computing Systems

Krishna Gummadi
Max Planck Institute for Software Systems
Joint MPI-INF/MPI-SWS Lecture Series
AG 1, AG 2, AG 3, AG 4, AG 5, SWS, RG1, MMCI  
MPI Audience

Date, Time and Location

Wednesday, 7 August 2013
60 Minutes
E1 5


Social computing systems refer to online computer systems that enable users to interact, collaborate, and compete with one another. Examples include social networking sites like Facebook and Google+, blogging sites like Twitter and LiveJournal, content sharing sites like YouTube and Flickr, social bookmarking sites like Delicious and Reddit, crowd-sourced opinion sites like Yelp and eBay seller ratings, and social peer production sites like Wikipedia and Amazon's Mechanical Turk. Recently these systems have become tremendously popular and they are bringing profound changes in the ways individuals, organizations, and governments exchange information in the society.

Unfortunately, today's social computing systems have an achilles heel: users of these systems operate behind "weak identities", i.e., identities that can be forged without too much effort. Attackers can easily create forge multiple fake identities and manipulate the functionality of the system. There is mounting evidence that such fake identities are being used to introduce / promote spam content or to manipulate the real popularity of existing users and content on these systems.

In this talk, I will first discuss existing defense strategies that largely focus on detecting and suspending fake identities in social computing systems. Later, I will propose new approaches to reason about the trustworthiness of weak identities.


Jennifer Müller
--email hidden
passcode not visible
logged in users only

Jennifer Müller, 08/06/2013 14:35
Jennifer Müller, 04/15/2013 13:58 -- Created document.