skip to main content
10.1145/2702123.2702295acmconferencesArticle/Chapter ViewAbstractPublication PageschiConference Proceedingsconference-collections
research-article

Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages

Published:18 April 2015Publication History

ABSTRACT

Both governments and corporations routinely surveil computer-mediated communication (CMC). Technologists often suggest widespread encryption as a defense mechanism, but CMC encryption schemes have historically faced significant usability and adoption problems. Here, we introduce a novel technique called Open Book designed to address these two problems. Inspired by how people deal with eavesdroppers offline, Open Book uses data mining and natural language processing to transform CMC messages into ones that are vaguer than the original. Specifically, we present: 1) a greedy Open Book algorithm that cloaks messages by transforming them to resemble the average Internet message; 2) an open-source, browser-based instantiation of it called Read Me, designed for Gmail; and, 3) a set of experiments showing that intended recipients can decode Open Book messages, but that unintended human- and machine-recipients cannot. Finally, we reflect on some open questions raised by this approach, such as recognizability and future side-channel attacks.

References

  1. 1. L. Backstrom and J. Kleinberg. Romantic partnerships and the dispersion of social ties: A network analysis of relationship status on Facebook. In Proc. CSCW, pages 831--841, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2. C. Baker, C. Fillmore, and J. B. Lowe. The Berkeley FrameNet Project. In Proc. COLING, pages 86--90, 1998. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3. P. Biernacki and D. Waldorf. Snowball Sampling: Problems and Techniques of Chain Referral Sampling. Sociological Methods & Research, 10(2):141--163, 1981.Google ScholarGoogle ScholarCross RefCross Ref
  4. 4. D. M. Blei, A. Y. Ng, and M. I. Jordan. Latent dirichlet allocation. JMLR, 3:993--1022, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. 5. M. S. Blumenthal and D. D. Clark. Rethinking the design of the Internet: the end-to-end arguments vs. the brave new world. ACM TOIT, 1(1):70--109, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. 6. D. Boneh et al. Twenty years of attacks on the RSA cryptosystem. Notices of the AMS, 46(2):203--213, 1999.Google ScholarGoogle Scholar
  7. 7. boyd, danah and Marwick, Alice. Social Privacy in Networked Publics: Teens' Attitudes, Practices, and Strategies. In A Decade in Internet Time: Symposium on the Dynamics of the Internet and Society, 1999.Google ScholarGoogle Scholar
  8. 8. T. Brants and A. Franz. Web 1T 5-gram Version 1. Linguistic Data Consortium, Philadelphia, 2006.Google ScholarGoogle Scholar
  9. 9. S. E. Brennan. The grounding problem in conversations with and through computers. Social and cognitive approaches to interpersonal communication, pages 201--225, 1998.Google ScholarGoogle Scholar
  10. 10. R. S. Campbell and J. W. Pennebaker. The secret life of pronouns flexibility in writing style and physical health. Psychological Science, 14(1):60--65, 2003.Google ScholarGoogle ScholarCross RefCross Ref
  11. 11. J. Chen, G. Hsieh, J. U. Mahmud, and J. Nichols. Understanding individuals' personal values from social media word use. In Proc. CSCW, pages 405--414, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. 12. C. Chung and J. W. Pennebaker. The psychological functions of function words. Social communication, pages 343--359, 2007.Google ScholarGoogle Scholar
  13. 13. H. H. Clark. Using language, volume 1996. Cambridge University Press Cambridge, 1996.Google ScholarGoogle ScholarCross RefCross Ref
  14. 14. H. H. Clark and S. E. Brennan. Grounding in communication. Perspectives on socially shared cognition, 13(1991):127--149, 1991.Google ScholarGoogle Scholar
  15. 15. H. H. Clark and M. A. Krych. Speaking while monitoring addressees for understanding. Journal of Memory and Language, 50(1):62--81, 2004.Google ScholarGoogle ScholarCross RefCross Ref
  16. 16. W. Diffie and M. E. Hellman. New directions in cryptography. IEEE Transactions on Information Theory, 22(6):644--654, 1976. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. 17. D. Gergle, R. E. Kraut, and S. R. Fussell. The impact of delayed visual feedback on collaborative performance. In Proc. CHI, pages 1303--1312. ACM, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. 18. G. Greenwald and E. MacAskill. NSA Prism program taps in to user data of Apple, Google and others. The Guardian, June 6, 2013.Google ScholarGoogle Scholar
  19. 19. J. T. Hancock and P. J. Dunham. Language use in computer-mediated communication: The role of coordination devices. Discourse Processes, 31(1):91--110, 2001.Google ScholarGoogle ScholarCross RefCross Ref
  20. 20. S. G. Hart and L. E. Staveland. Development of NASA-TLX (task load index): Results of empirical and theoretical research. Human mental workload, 1(3):139--183, 1988.Google ScholarGoogle Scholar
  21. 21. P. J. Hinds and D. E. Bailey. Out of sight, out of sync: Understanding conflict in distributed teams. Organization science, 14(6):615--632, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. 22. F. Jin, R. P. Khandpur, N. Self, E. Dougherty, S. Guo, F. Chen, B. A. Prakash, and N. Ramakrishnan. Modeling Mass Protest Adoption in Social Network Communities Using Geometric Brownian Motion. In Proc. KDD, pages 1660--1669, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. 23. B. Klimt and Y. Yang. Introducing the Enron Corpus. In CEAS, 2004.Google ScholarGoogle Scholar
  24. 24. G. Miller. WordNet: A Lexical Database for English. CACM, 38(11):39--41, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. 25. C. Z. Mooney and R. D. Duval. Bootstrapping: A nonparametric approach to statistical inference. 1993.Google ScholarGoogle ScholarCross RefCross Ref
  26. 26. R. L. Rivest, A. Shamir, and L. Adleman. A method for obtaining digital signatures and public-key cryptosystems. CACM, 21(2):120--126, 1978. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. 27. N. S. Shami, J. Nichols, and J. Chen. Social Media Participation and Performance at Work: A Longitudinal Study. In Proc. CHI, pages 115--118, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. 28. S. Sheng, L. Broderick, C. A. Koranda, and J. J. Hyland. Why Johnny still can't encrypt: evaluating the usability of email encryption software. In Proc. SOUPS, 2006.Google ScholarGoogle Scholar
  29. 29. N. Spasojevic, J. Yan, A. Rao, and P. Bhattacharyya. LASTA: Large Scale Topic Assignment on Multiple Social Networks. In Proc. KDD, pages 1809--1818, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. 30. S. Subramaniam. Frontiers in E-commerce Personalization. In Proc. KDD, pages 1516--1516, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. 31. J. Vertesi. My Experiment Opting Out of Big Data Made Me Look Like a Criminal. Time, May 1, 2014.Google ScholarGoogle Scholar
  32. 32. H. M. Wallach. Topic modeling: beyond bag-of-words. In Proc. ICML, pages 977--984, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. 33. A. Whitten and J. D. Tygar. Why Johnny can't encrypt: A usability evaluation of PGP 5.0. In Proceedings of the 8th USENIX Security Symposium, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. 34. S.-H. Yang, A. Kolcz, A. Schlaikjer, and P. Gupta. Large-scale High-precision Topic Modeling on Twitter. In Proc. KDD, pages 1907--1916, 2014. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. 35. P. R. Zimmermann. The official PGP user's guide. MIT press, 1995. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Open Book: A Socially-inspired Cloaking Technique that Uses Lexical Abstraction to Transform Messages

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      CHI '15: Proceedings of the 33rd Annual ACM Conference on Human Factors in Computing Systems
      April 2015
      4290 pages
      ISBN:9781450331456
      DOI:10.1145/2702123

      Copyright © 2015 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 18 April 2015

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      CHI '15 Paper Acceptance Rate486of2,120submissions,23%Overall Acceptance Rate6,199of26,314submissions,24%

      Upcoming Conference

      CHI '24
      CHI Conference on Human Factors in Computing Systems
      May 11 - 16, 2024
      Honolulu , HI , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader