skip to main content
research-article

Blockchain-based Framework for Reducing Fake or Vicious News Spread on Social Media/Messaging Platforms

Authors Info & Claims
Published:01 November 2021Publication History
Skip Abstract Section

Abstract

With social media becoming the most frequently used mode of modern-day communications, the propagation of fake or vicious news through such modes of communication has emerged as a serious problem. The scope of the problem of fake or vicious news may range from rumour-mongering, with intent to defame someone, to manufacturing false opinions/trends impacting elections and stock exchanges to much more alarming and mala fide repercussions of inciting violence by bad actors, especially in sensitive law-and-order situations. Therefore, curbing fake or vicious news and identifying the source of such news to ensure strict accountability is the need of the hour. Researchers have been working in the area of using text analysis, labelling, artificial intelligence, and machine learning techniques for detecting fake news, but identifying the source or originator of such news for accountability is still a big challenge for which no concrete approach exists as of today. Also, there is another common problematic trend on social media whereby targeted vicious content goes viral to mobilize or instigate people with malicious intent to destabilize normalcy in society. In the proposed solution, we treat both problems of fake news and vicious news together. We propose a blockchain and keyed watermarking-based framework for social media/messaging platforms that will allow the integrity of the posted content as well as ensure accountability on the owner/user of the post. Intrinsic properties of blockchain-like transparency and immutability are advantageous for curbing fake or vicious news. After identification of fake or vicious news, its spread will be immediately curbed through backtracking as well as forward tracking. Also, observing transactions on the blockchain, the density and rate of forwarding of a particular original message going beyond a threshold can easily be checked, which could be identified as a possible malicious attempt to spread objectionable content. If the content is deemed dangerous or inappropriate, its spread will be curbed immediately. The use of the Raft consensus algorithm and bloXroute servers is proposed to enhance throughput and network scalability, respectively. Thus, the framework offers a proactive as well as reactive, practically feasible, and effective solution for curtailment of fake or vicious news on social media/messaging platforms. The proposed work is a framework for solving fake or vicious news spread problems on social media; the complete design specifications are beyond scope of the current work and will be addressed in the future.

REFERENCES

  1. [1] Castro Miguel, Liskov Barbara, et al. 1999. Practical byzantine fault tolerance. In Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI’99). 173186.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. [2] Challal Yacine and Seba Hamida. 2008. Group key management protocols: A novel taxonomy. Int. J. Comput. Inf. Eng. 2, 10 (2008), 36203633.Google ScholarGoogle Scholar
  3. [3] Chen Yize, Li Quanlai, and Wang Hao. 2018. Towards trusted social networks with blockchain technology. arXiv:1801.02796. Retrieved from http://arxiv.org/abs/1801.02796.Google ScholarGoogle Scholar
  4. [4] Christidis K. and Devetsikiotis M.. 2016. Blockchains and smart contracts for the internet of things. IEEE Access 4 (2016), 22922303.Google ScholarGoogle ScholarCross RefCross Ref
  5. [5] Christopoulou Androniki. 2016. The Information Disorder Ecosystem: A Study on the Role of Social Media, the Initiatives to Tackle Disinformation and a Systematic Literature Review of False Information Taxonomies.Retrieved from https://repository.ihu.edu.gr/xmlui/bitstream/handle/11544/29381/a.christopoulou_ebdm_16-04-2019.pdf?sequence=2.Google ScholarGoogle Scholar
  6. [6] Crosby Michael, Nachiappan, Pattanayak Pradan, Verma Sanjeev, and Kalyanaraman Vignesh. 2016. Blockchain Technology: Beyond Bitcoin. Retrieved from http://scet.berkeley.edu/wp-content/uploads/AIR-2016-Blockchain.pdf.Google ScholarGoogle Scholar
  7. [7] Dwivedi Ashutosh Dhar, Malina Lukas, Dzurenda Petr, and Srivastava Gautam. 2019. Optimized blockchain model for internet of things based healthcare applications. In Proceedings of the 42nd International Conference on Telecommunications and Signal Processing (TSP’19), Herencsar Norbert (Ed.). IEEE, 135139. https://doi.org/10.1109/TSP.2019.8769060Google ScholarGoogle ScholarCross RefCross Ref
  8. [8] Dwivedi Ashutosh Dhar, Srivastava Gautam, Dhar Shalini, and Singh Rajani. 2019. A decentralized privacy-preserving healthcare blockchain for iot. Sensors 19, 2 (2019), 326. https://doi.org/10.3390/s19020326Google ScholarGoogle ScholarCross RefCross Ref
  9. [9] Fraga-Lamas P. and Fernández-Caramés T. M.. 2020. Fake news, disinformation, and deepfakes: Leveraging distributed ledger technologies and blockchain to combat digital deception and counterfeit reality. IT Prof. 22, 2 (2020), 5359.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Garba Abba, Dwivedi Ashutosh Dhar, Kamal Mohsin, Srivastava Gautam, Tariq Muhammad, Hasan M. Anwar, and Chen Zhong. 2020. A digital rights management system based on a scalable blockchain. Peer-to-Peer Netw. Appl. 14, 5 (2021), 26652680. DOI: 10.1007/s12083-020-01023-zGoogle ScholarGoogle ScholarCross RefCross Ref
  11. [11] Hasan Haya R. and Salah Khaled. 2019. Combating deepfake videos using blockchain and smart contracts. IEEE Access 7 (2019), 4159641606. https://doi.org/10.1109/ACCESS.2019.2905689Google ScholarGoogle ScholarCross RefCross Ref
  12. [12] Hosseini Pedram, Diab Mona, and Broniatowski David A.. 2018. False news on social media. DOI: 10.13140/RG.2.2.35434.57285Google ScholarGoogle Scholar
  13. [13] Huckle Steve and White Martin. 2017. Fake news: a technological approach to proving the origins of content, using blockchains. Big Data 5, 4 (2017), 356371. https://doi.org/10.1089/big.2017.0071Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Ismail Leila and Materwala Huned. 2019. A review of blockchain architecture and consensus protocols: Use cases, challenges, and solutions. Symmetry 11, 10 (2019). https://doi.org/10.3390/sym11101198Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Jia Bing, Zhou Tao, Li Wuyungerile, Liu Zhenchang, and Zhang Jiantao. 2018. A blockchain-based location privacy protection incentive mechanism in crowd sensing networks. Sensors 18, 11 (2018), 3894. https://doi.org/10.3390/s18113894Google ScholarGoogle ScholarCross RefCross Ref
  16. [16] King Sunny and Nadal Scott. 2012. Ppcoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published article, August 19.Google ScholarGoogle Scholar
  17. [17] Lauslahti Kristian, Mattila Juri, and Seppälä Timo. 2017. Smart Contracts—How Will Blockchain Technology Affect Contractual Practices?ETLA Report 68. Helsinki.Google ScholarGoogle Scholar
  18. [18] Figueira Álvaro and Oliveira Luciana. 2017. The current state of fake news: Challenges and opportunities. Proc. Comput. Sci. 121 (2017), 817825. https://doi.org/10.1016/j.procs.2017.11.106Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. [19] Nakamoto Satoshi. 2019. Bitcoin: A Peer-to-peer Electronic Cash System. Technical Report. Manubot.Google ScholarGoogle Scholar
  20. [20] Parikh S. B. and Atrey P. K.. 2018. Media-rich fake news detection: A survey. In Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval (MIPR’18). 436441.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Parikh S. B., Patil V., Makawana R., and Atrey P. K.. 2019. Towards impact scoring of fake news. In Proceedings of the IEEE Conference on Multimedia Information Processing and Retrieval (MIPR’19). 529533.Google ScholarGoogle ScholarCross RefCross Ref
  22. [22] Qayyum Adnan, Qadir Junaid, Janjua Muhammad Umar, and Sher Falak. 2019. Using blockchain to rein in the new post-truth world and check the spread of fake news. IT Prof. 21, 4 (2019), 1624. https://doi.org/10.1109/MITP.2019.2910503Google ScholarGoogle ScholarCross RefCross Ref
  23. [23] Saad M., Ahmad A., and Mohaisen A.. 2019. Fighting fake news propagation with blockchains. In Proceedings of the IEEE Conference on Communications and Network Security (CNS’19). 14.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Salman T., Zolanvari M., Erbad A., Jain R., and Samaka M.. 2019. Security services using blockchains: A state of the art survey. IEEE Commun. Surv. Tutor. 21, 1 (2019), 858880.Google ScholarGoogle Scholar
  25. [25] Sankar L. S., Sindhu M., and Sethumadhavan M.. 2017. Survey of consensus protocols on blockchain applications. In Proceedings of the 4th International Conference on Advanced Computing and Communication Systems (ICACCS’17). 15.Google ScholarGoogle ScholarCross RefCross Ref
  26. [26] Seo Haeseung, Xiong Aiping, and Lee Dongwon. 2019. Trust it or not: Effects of machine-learning warnings in helping individuals mitigate misinformation. In Proceedings of the 11th ACM Conference on Web Science (WebSci’19), Boldi Paolo, Welles Brooke Foucault, Kinder-Kurlanda Katharina, Wilson Christo, Peters Isabella, and Jr. Wagner Meira (Eds.). ACM, 265274. https://doi.org/10.1145/3292522.3326012Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Shang W., Liu M., Lin W., and Jia M.. 2018. Tracing the source of news based on blockchain. In Proceedings of the IEEE/ACIS 17th International Conference on Computer and Information Science (ICIS’18). 377381.Google ScholarGoogle ScholarCross RefCross Ref
  28. [28] Shang Wenqian, Liu Mengyu, Lin Weiguo, and Jia Minzheng. 2018. Tracing the source of news based on blockchain. In Proceedings of the 17th IEEE/ACIS International Conference on Computer and Information Science (ICIS’18). IEEE Computer Society, 377381. https://doi.org/10.1109/ICIS.2018.8466516Google ScholarGoogle ScholarCross RefCross Ref
  29. [29] Singh Rajani, Dwivedi Ashutosh Dhar, Srivastava Gautam, Wiszniewska-Matyszkiel Agnieszka, and Cheng Xiaochun. 2020. A game theoretic analysis of resource mining in blockchain. J. Netw. Softw. Tools Appl. 23, 3 (2020). https://doi.org/10.1007/s10586-020-03046-wGoogle ScholarGoogle Scholar
  30. [30] Srivastava Gautam, Dhar Shalini, Dwivedi Ashutosh Dhar, and Crichigno Jorge. 2019. Blockchain education. In Proceedings of the IEEE Canadian Conference of Electrical and Computer Engineering (CCECE’19). IEEE, 15. https://doi.org/10.1109/CCECE.2019.8861828Google ScholarGoogle ScholarCross RefCross Ref
  31. [31] Srivastava Gautam, Dwivedi Ashutosh Dhar, and Singh Rajani. 2018. Automated remote patient monitoring: Data sharing and privacy using blockchain. arXiv:1811.03417. Retrieved from http://arxiv.org/abs/1811.03417.Google ScholarGoogle Scholar
  32. [32] Srivastava Gautam, Dwivedi Ashutosh Dhar, and Singh Rajani. 2018. Crypto-democracy: a decentralized voting scheme using blockchain technology. In Proceedings of the 15th International Joint Conference on E-business and Telecommunications (ICETE’18), Samarati Pierangela and Obaidat Mohammad S. (Eds.). SciTePress, 674679. https://doi.org/10.5220/0006881906740679Google ScholarGoogle ScholarCross RefCross Ref
  33. [33] Srivastava Gautam, Dwivedi Ashutosh Dhar, and Singh Rajani. 2018. PHANTOM protocol as the new crypto-democracy. In Proceedings of the 17th International Conference on Computer Information Systems and Industrial Management (CISIM’18), Lecture Notes in Computer Science, Vol. 11127, Saeed Khalid and Homenda Wladyslaw (Eds.). Springer, 499509. https://doi.org/10.1007/978-3-319-99954-8_41Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Szabo Nick. 1994. Smart Contracts. Retrieved from http://www.fon.hum.uva.nl/rob/Courses/InformationInSpeech/CDROM/Literature/LOTwinterschool2006/szabo.best.vwh.net/smart.contracts.html.Google ScholarGoogle Scholar
  35. [35] Talwar Shalini, Dhir Amandeep, Singh Dilraj, Virk Gurnam Singh, and Salo Jari. 2020. Sharing of fake news on social media: Application of the honeycomb framework and the third-person effect hypothesis. J. Retail. Consum. Serv. 57 (2020), 102197. https://doi.org/10.1016/j.jretconser.2020.102197Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Torky Mohamed, Nabil Emad, and Said Wael. 2019. Proof of credibility: A blockchain approach for detecting and blocking fake news in social networks. Int. J. Adv. Comput. Sci. Appl. 10, 12 (2019), 321327.Google ScholarGoogle Scholar
  37. [37] Uri Klarman, Soumya Basu, Aleksandar Kuzmanovic, and Gun Sirer Emin. 2019. Bloxroute: A Scalable Trustless Blockchain Distribution Network. Retrieved from https://bloxroute.com/.Google ScholarGoogle Scholar
  38. [38] Wang J., Li M., He Y., Li H., Xiao K., and Wang C.. 2018. A blockchain based privacy-preserving incentive mechanism in crowdsensing applications. IEEE Access 6 (2018), 1754517556.Google ScholarGoogle ScholarCross RefCross Ref
  39. [39] Wei Lijun, Wu Jing, and Long Chengnian. 2020. A blockchain-based hybrid incentive model for crowdsensing. Electronics 9, 2 (2020). https://doi.org/10.3390/electronics9020215Google ScholarGoogle ScholarCross RefCross Ref
  40. [40] Yang Mengmeng, Zhu Tianqing, Liang Kaitai, Zhou Wanlei, and Deng Robert H.. 2019. A blockchain-based location privacy-preserving crowdsensing system. Fut. Gener. Comput. Syst. 94 (2019), 408418. https://doi.org/10.1016/j.future.2018.11.046Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Blockchain-based Framework for Reducing Fake or Vicious News Spread on Social Media/Messaging Platforms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Asian and Low-Resource Language Information Processing
        ACM Transactions on Asian and Low-Resource Language Information Processing  Volume 21, Issue 1
        January 2022
        442 pages
        ISSN:2375-4699
        EISSN:2375-4702
        DOI:10.1145/3494068
        Issue’s Table of Contents

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 November 2021
        • Accepted: 1 May 2021
        • Revised: 1 March 2021
        • Received: 1 December 2020
        Published in tallip Volume 21, Issue 1

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader

      Full Text

      View this article in Full Text.

      View Full Text

      HTML Format

      View this article in HTML Format .

      View HTML Format
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!