Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

CADIVa: cooperative and adaptive decentralized identity validation model for social networks

  • Original Article
  • Published:
Social Network Analysis and Mining Aims and scope Submit manuscript

Abstract

Online social networks (OSNs) have successfully changed the way people interact. Online interactions among people span geographical boundaries and interweave with different human life activities. However, current OSNs identification schemes lack guarantees on quantifying the trustworthiness of online identities of users joining them. Therefore, driven from the need to empower users with an identity validation scheme, we introduce a novel model, cooperative and adaptive decentralized identity validation CADIVa, that allows OSN users to assign trust levels to whomever they interact with. CADIVa exploits association rule mining approach to extract the identity correlations among profile attributes in every individual community in a social network. CADIVa is a fully decentralized and adaptive model that exploits fully decentralized learning and cooperative approaches not only to preserve users privacy, but also to increase the system reliability and to make it resilient to mono-failure. CADIVa follows the ensemble learning paradigm to preserve users privacy and employs gossip protocols to achieve efficient and low-overhead communication. We provide two different implementation scenarios of CADIVa. Results confirm CADIVa’s ability to provide fine-grained community-aware identity validation with average improvement up to 36 and 50 % compared to the semi-centralized or global approaches, respectively.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7
Fig. 8
Fig. 9

Similar content being viewed by others

Explore related subjects

Discover the latest articles, news and stories from top researchers in related subjects.

Notes

  1. www.linkedin.com.

  2. www.facebook.com.

  3. https://plus.google.com/.

  4. https://zephoria.com/top-15-valuable-facebook-statistics/.

  5. We exploit the community detection algorithm suggested in Rahimian et al. (2014) as it provides a fully decentralized solution.

  6. R depends on the topological properties of the underlying graph.

References

  • Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. In: ACM SIGMOD record, vol 22. ACM, pp 207–216

  • Agrawal R, Srikant R, et al (1994) Fast algorithms for mining association rules. In: Proceedings of 20th international conference on very large data bases, VLDB, vol 1215, pp 487–499

  • Akcora CG, Carminati B, Ferrari E (2012) Privacy in social networks: how risky is your social graph? In: ICDE’12. IEEE, pp 9–19

  • Bahri L, Carminati B, Ferrari E (2014) Community-based identity validation on online social networks. In: IEEE 34th international conference on distributed computing systems (ICDCS), 2014. IEEE, pp 21–30

  • Brandes U, Delcling D, Gaertler M, Gorke R, Hoefer M, Nikoloski Z, Wagner D (2008) On modularity clustering. IEEE Trans Knowl Data Eng 20(2):172–188

    Article  Google Scholar 

  • Cai X, Bain M, Krzywicki A, Wobcke W, Kim YS, Compton P, Mahidadia A (2011) Collaborative filtering for people to people recommendation in social networks. In: AI 2010: advances in artificial intelligence. Springer, pp 476–485

  • Chairunnanda P, Pham N, Hengartner U (2011) Privacy: Gone with the typing! identifying web users by their typing patterns. In: IEEE third international conference on privacy, security, risk and trust (passat), 2011 and 2011 IEEE third international conference on social computing (socialcom). IEEE, pp 974–980

  • Chorley M (2012) How facebook and social networking sites are used by child abuse gangs to groom victims for ‘sex parties’. Available at: http://www.dailymail.co.uk/news/article-2236208/How-Facebook-social-networking-sites-used-child-abuse-gangs-groom-victims-sex-parties.html. Accessed 12 June 2016

  • Datta A, Buchegger S, Vu L-H, Strufe T, Rzadca K (2010) Decentralized online social networks. In: Handbook of social network technologies and applications. Springer, pp 349–378

  • Debatin B, Lovejoy JP, Horn A-K, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput Mediat Commun 15(1):83–108

    Article  Google Scholar 

  • Dwyer C (2011) Privacy in the age of google and facebook. Technol Soc Mag IEEE 30(3):58–63

    Article  Google Scholar 

  • Ferrara E (2012) Community structure discovery in facebook. Int J Soc Netw Min 1:67–90

    Article  Google Scholar 

  • Goga O, Lei H, Parthasarathi SHK, Friedland G, Sommer R, Teixeira R (2013) Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd international conference on World Wide Web. International World Wide Web conferences steering committee, pp 447–458

  • Gong NZ, Talwalkar A, Mackey L, Huang L, Shin ECR, Stefanov E, Song D, et al. (2011) Jointly predicting links and inferring attributes using a social-attribute network (san). arXiv preprint arXiv:1112.3265

  • He B-Z, Chen C-M, Su Y-P, Sun H-M (2014) A defence scheme against identity theft attack based on multiple social networks. Expert Syst Appl 41(5):2345–2352

    Article  Google Scholar 

  • Hipp J, Güntzer U, Nakhaeizadeh G (2000) Algorithms for association rule mining a general survey and comparison. ACM Sigkdd Explor Newsl 2(1):58–64

    Article  Google Scholar 

  • Hope C (2013) Facebook is a ‘major location for online child sexual grooming’, head of child protection agency says. Telegr

  • Huber M, Mulazzani M, Weippl E, Kitzler G, Goluch S (2011) Friend-in-the-middle attacks: exploiting social networking sites for spam. Internet Comput IEEE 15(3):28–34

    Article  Google Scholar 

  • Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100

    Article  Google Scholar 

  • Jin L, Takabi H, Joshi JB (2011) Towards active detection of identity clone attacks on online social networks. In: Proceedings of the first ACM conference on data and application security and privacy. ACM, pp 27–38

  • Kapanipathi P, Anaya J, Sheth A, Slatkin B, Passant A (2011) Privacy-aware and scalable content dissemination in distributed social networks. Semant Web-ISWC 2011:157–172

    Google Scholar 

  • Koll D, Li J, Fu X (2014) Soup: an online social network by the people, for the people. In: Proceedings of the 15th international middleware conference. ACM, pp 193–204

  • Kotsiantis S, Kanellopoulos D (2006) Association rules mining: a recent overview. GESTS Int Trans Comput Sci Eng 32(1):71–82

    Google Scholar 

  • Krivitsky PN, Handcock MS, Raftery AE, Hoff PD (2009) Representing degree distributions, clustering, and homophily in social networks with latent cluster random effects models. Soc Netw 31(3):204–213

    Article  Google Scholar 

  • Li N, Qardaji WH, Su D (2011) Provably private data anonymization: or, k-anonymity meets differential privacy. CoRR 49:55 arXiv:1101.2604

    Google Scholar 

  • Low Y, Bickson D, Gonzalez J, Guestrin C, Kyrola A, Hellerstein JM (2012) Distributed graphlab: a framework for machine learning and data mining in the cloud. Proc VLDB Endow 5:716–727

    Article  Google Scholar 

  • Luo W, Liu J, Liu J, Fan C (2009) An analysis of security in social networks. In: Eighth IEEE international conference on dependable, autonomic and secure computing, 2009. DASC’09. IEEE, pp 648–651

  • Lynch MJ, Michalowski RJ, Groves WB (2000) The new primer in radical criminology: critical perspectives on crime, power, and identity. Criminal Justice Press, Monsey

    Google Scholar 

  • Newman ME (2006) Modularity and community structure in networks. Proc Natl Acad Sci 103(23):8577–8582

    Article  Google Scholar 

  • Nilizadeh S, Jahid S, Mittal P, Borisov N, Kapadia A (2012) Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Proceedings of the 8th international conference on emerging networking experiments and technologies. ACM, pp 337–348

  • Rahimian F, Girdzijauskas S, Haridi S (2014) Parallel community detection for cross-document coreference. In: IEEE/WIC/ACM international joint conferences on web intelligence (WI) and Intelligent Agent Technologies (IAT), 2014, vol 2. IEEE, pp 46–53

  • Robinson RM (2015) Social engineering attackers deploy fake social media profiles. Secur Intell

  • Roffo G, Segalin C, Vinciarelli A, Murino V, Cristani M (2013) Reading between the turns: Statistical modeling for identity recognition and verification in chats. In: 10th IEEE international conference on advanced video and signal based surveillance (AVSS), 2013. IEEE, pp 99–104

  • Sirivianos M, Kim K, Gan JW, Yang X (2012) Assessing the veracity of identity assertions via osns. In: Fourth international conference on communication systems and networks (COMSNETS), 2012. IEEE, pp 1–10

  • Soliman A, Bahri L, Carminati B, Ferrari E, Girdzijauskas S (2015) Diva: decentralized identity validation for social networks. In: IEEE/ACM international conference on advances in social network analysis and mining (ASONAM), 2015. IEEE/ACM, pp 383–391

  • Spears RE, Oakes PJ, Ellemers NE, Haslam S (1997) The social psychology of stereotyping and group life. Blackwell Publishing

  • Stets JE, Burke PJ (2003) A sociological approach to self and identity. Handbook of self and identity pp 128–152

  • Stringhini G (2014) Stepping up the cybersecurity game: protecting online services from malicious activity. Ph.D. thesis, University of California, Santa Barbara

  • Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267–278

    Article  Google Scholar 

  • Yu H, Gibbons PB, Kaminsky M, Xiao F (2008) Sybillimit: a near-optimal social network defense against sybil attacks. In: IEEE symposium on security and privacy, 2008. SP 2008. IEEE, pp 3–17

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Amira Soliman.

Additional information

This work is under the umbrella of the iSocial EU Marie Curie ITN Project (FP7-PEOPLE-2012-ITN).

Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from permissions@acm.org.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Soliman, A., Bahri, L., Girdzijauskas, S. et al. CADIVa: cooperative and adaptive decentralized identity validation model for social networks. Soc. Netw. Anal. Min. 6, 36 (2016). https://doi.org/10.1007/s13278-016-0343-z

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1007/s13278-016-0343-z

Keywords