SoK: Content Moderation Schemes in End-to-End Encrypted Systems
- URL: http://arxiv.org/abs/2208.11147v5
- Date: Sun, 11 Aug 2024 16:17:08 GMT
- Title: SoK: Content Moderation Schemes in End-to-End Encrypted Systems
- Authors: Chaitanya Rahalkar, Anushka Virgaonkar,
- Abstract summary: We study the unique features of some content moderation techniques, such as message franking and perceptual hashing.
This has led researchers to develop remediations and design new security primitives to make content moderation compatible with end-to-end encryption systems.
- Score: 0.6138671548064355
- License: http://creativecommons.org/licenses/by/4.0/
- Abstract: This paper aims to survey various techniques utilized for content moderation in end-to-end encryption systems. We assess the challenging aspect of content moderation: maintaining a safe platform while assuring user privacy. We study the unique features of some content moderation techniques, such as message franking and perceptual hashing, and highlight their limitations. Currently implemented content moderation techniques violate the goals of end-to-end encrypted messaging to some extent. This has led researchers to develop remediations and design new security primitives to make content moderation compatible with end-to-end encryption systems. We detail these developments, analyze the proposed research efforts, assess their security guarantees, correlate them with other proposed solutions, and determine suitable improvements under specific scenarios.
Related papers
- A Privacy-Preserving Graph Encryption Scheme Based on Oblivious RAM [0.0]
We propose a novel graph encryption scheme designed to mitigate access pattern and query pattern leakage.
Our solution establishes two key security objectives: (1) ensuring that adversaries, when presented with an encrypted graph, remain oblivious to any information regarding the underlying graph, and (2) achieving query indistinguishability by concealing access patterns.
arXiv Detail & Related papers (2024-05-29T16:47:38Z) - A Survey on Personalized Content Synthesis with Diffusion Models [57.01364199734464]
PCS aims to customize the subject of interest to specific user-defined prompts.
Over the past two years, more than 150 methods have been proposed.
This paper offers a comprehensive survey of PCS, with a particular focus on the diffusion models.
arXiv Detail & Related papers (2024-05-09T04:36:04Z) - Enc2DB: A Hybrid and Adaptive Encrypted Query Processing Framework [47.11111145443189]
We introduce Enc2DB, a novel secure database system following a hybrid strategy on and openGauss.
We present a micro-benchmarking test and self-adaptive mode switch strategy that can choose the best execution path (cryptography or TEE) to answer a given query.
We also design and implement a ciphertext index compatible with native cost model and querys to accelerate query processing.
arXiv Detail & Related papers (2024-04-10T08:11:12Z) - Boosting Digital Safeguards: Blending Cryptography and Steganography [0.30783046172997025]
Steganography involves hiding data within another medium, thereby facilitating covert communication by making the message invisible.
This proposed approach takes advantage of the latest advancements in Artificial Intelligence (AI) and Deep Learning (DL), especially through the application of Generative Adversarial Networks (GANs)
The application of GANs enables a smart, secure system that utilizes the inherent sensitivity of neural networks to slight alterations in data.
arXiv Detail & Related papers (2024-04-09T03:36:39Z) - Cryptanalysis and improvement of multimodal data encryption by
machine-learning-based system [0.0]
encryption algorithms to accommodate varied requirements of this field.
Best approach to analyzing an encryption algorithm is to identify a practical and efficient technique to break it.
arXiv Detail & Related papers (2024-02-24T10:02:21Z) - Coding-Based Hybrid Post-Quantum Cryptosystem for Non-Uniform Information [53.85237314348328]
We introduce for non-uniform messages a novel hybrid universal network coding cryptosystem (NU-HUNCC)
We show that NU-HUNCC is information-theoretic individually secured against an eavesdropper with access to any subset of the links.
arXiv Detail & Related papers (2024-02-13T12:12:39Z) - Advancing Differential Privacy: Where We Are Now and Future Directions for Real-World Deployment [100.1798289103163]
We present a detailed review of current practices and state-of-the-art methodologies in the field of differential privacy (DP)
Key points and high-level contents of the article were originated from the discussions from "Differential Privacy (DP): Challenges Towards the Next Frontier"
This article aims to provide a reference point for the algorithmic and design decisions within the realm of privacy, highlighting important challenges and potential research directions.
arXiv Detail & Related papers (2023-04-14T05:29:18Z) - SoK: Content Moderation for End-to-End Encryption [2.66512000865131]
Messaging applications now enable end-to-end-encryption (E2EE) by default, and E2EE data storage is becoming common.
These important advances for security and privacy create new content moderation challenges for online services.
We bridge literature that is diverse in both content moderation subject matter, such as malware, spam, hate speech, terrorist content, and enterprise policy compliance.
arXiv Detail & Related papers (2023-03-07T15:26:41Z) - Collaborative Domain Blocking: Using federated NLP To Detect Malicious
Domains [0.0]
We propose a novel system that aims to remedy the issues by examining deep textual patterns of network-oriented content.
We also propose to use federated learning that allows users to take advantage of each other's localized knowledge/experience regarding what should or should not be blocked on a network.
arXiv Detail & Related papers (2022-10-08T18:52:43Z) - Reinforcement Learning on Encrypted Data [58.39270571778521]
We present a preliminary, experimental study of how a DQN agent trained on encrypted states performs in environments with discrete and continuous state spaces.
Our results highlight that the agent is still capable of learning in small state spaces even in presence of non-deterministic encryption, but performance collapses in more complex environments.
arXiv Detail & Related papers (2021-09-16T21:59:37Z) - Survey of Network Intrusion Detection Methods from the Perspective of
the Knowledge Discovery in Databases Process [63.75363908696257]
We review the methods that have been applied to network data with the purpose of developing an intrusion detector.
We discuss the techniques used for the capture, preparation and transformation of the data, as well as, the data mining and evaluation methods.
As a result of this literature review, we investigate some open issues which will need to be considered for further research in the area of network security.
arXiv Detail & Related papers (2020-01-27T11:21:05Z)
This list is automatically generated from the titles and abstracts of the papers in this site.
This site does not guarantee the quality of this site (including all information) and is not responsible for any consequences.