Combating Abusive Information in Encrypted Messaging Services: A Secure and Efficient Realization

  • Rui Lian
  • , Yifeng Zheng
  • , Yulong Ming
  • , Chengjun Cai
  • , Cong Wang
  • , Xiaohua Jia

Research output: Journal article publicationJournal articleAcademic researchpeer-review

Abstract

End-to-end encrypted messaging services (EEMSs) empower private communication through encrypting messages, yet also make content moderation for combating the spread of abusive messages challenging. There is an urgent call for supporting content moderation in EEMSs while ensuring user privacy. In this paper, we present a new system design for privacy-assured content moderation in EEMSs. At a high level, users in our system can privately report abusive messages, and the EEMS traces the source if a message has an aggregated report count exceeding a predefined threshold and is audited to be abusive. Our system mainly departs from prior works in that it allows flexible and adaptable thresholds, offers robustness against dishonest reporters providing malformed reports, and better ensures the privacy of all users during the moderation process. We also take a step further and propose a privacy-aware detection mechanism that relies on a blocklist built with transparency to mitigate the further spread of identified abusive messages from forwarders. Formal security analysis is provided and extensive experiments demonstrate the practical efficiency of our system.

Original languageEnglish
Article number11186236
Pages (from-to)3581-3594
Number of pages14
JournalIEEE Transactions on Services Computing
Volume18
Issue number6
DOIs
Publication statusPublished - 1 Oct 2025

Keywords

  • Content moderation
  • end-to-end encryption
  • threshold aggregation

ASJC Scopus subject areas

  • Hardware and Architecture
  • Computer Science Applications
  • Computer Networks and Communications
  • Information Systems and Management

Fingerprint

Dive into the research topics of 'Combating Abusive Information in Encrypted Messaging Services: A Secure and Efficient Realization'. Together they form a unique fingerprint.

Cite this