Skip to main content
Top
Published in: Social Network Analysis and Mining 1/2016

01-12-2016 | Original Article

CADIVa: cooperative and adaptive decentralized identity validation model for social networks

Authors: Amira Soliman, Leila Bahri, Sarunas Girdzijauskas, Barbara Carminati, Elena Ferrari

Published in: Social Network Analysis and Mining | Issue 1/2016

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Online social networks (OSNs) have successfully changed the way people interact. Online interactions among people span geographical boundaries and interweave with different human life activities. However, current OSNs identification schemes lack guarantees on quantifying the trustworthiness of online identities of users joining them. Therefore, driven from the need to empower users with an identity validation scheme, we introduce a novel model, cooperative and adaptive decentralized identity validation CADIVa, that allows OSN users to assign trust levels to whomever they interact with. CADIVa exploits association rule mining approach to extract the identity correlations among profile attributes in every individual community in a social network. CADIVa is a fully decentralized and adaptive model that exploits fully decentralized learning and cooperative approaches not only to preserve users privacy, but also to increase the system reliability and to make it resilient to mono-failure. CADIVa follows the ensemble learning paradigm to preserve users privacy and employs gossip protocols to achieve efficient and low-overhead communication. We provide two different implementation scenarios of CADIVa. Results confirm CADIVa’s ability to provide fine-grained community-aware identity validation with average improvement up to 36 and 50 % compared to the semi-centralized or global approaches, respectively.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Footnotes
5
We exploit the community detection algorithm suggested in Rahimian et al. (2014) as it provides a fully decentralized solution.
 
6
R depends on the topological properties of the underlying graph.
 
Literature
go back to reference Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. In: ACM SIGMOD record, vol 22. ACM, pp 207–216 Agrawal R, Imieliński T, Swami A (1993) Mining association rules between sets of items in large databases. In: ACM SIGMOD record, vol 22. ACM, pp 207–216
go back to reference Agrawal R, Srikant R, et al (1994) Fast algorithms for mining association rules. In: Proceedings of 20th international conference on very large data bases, VLDB, vol 1215, pp 487–499 Agrawal R, Srikant R, et al (1994) Fast algorithms for mining association rules. In: Proceedings of 20th international conference on very large data bases, VLDB, vol 1215, pp 487–499
go back to reference Akcora CG, Carminati B, Ferrari E (2012) Privacy in social networks: how risky is your social graph? In: ICDE’12. IEEE, pp 9–19 Akcora CG, Carminati B, Ferrari E (2012) Privacy in social networks: how risky is your social graph? In: ICDE’12. IEEE, pp 9–19
go back to reference Bahri L, Carminati B, Ferrari E (2014) Community-based identity validation on online social networks. In: IEEE 34th international conference on distributed computing systems (ICDCS), 2014. IEEE, pp 21–30 Bahri L, Carminati B, Ferrari E (2014) Community-based identity validation on online social networks. In: IEEE 34th international conference on distributed computing systems (ICDCS), 2014. IEEE, pp 21–30
go back to reference Brandes U, Delcling D, Gaertler M, Gorke R, Hoefer M, Nikoloski Z, Wagner D (2008) On modularity clustering. IEEE Trans Knowl Data Eng 20(2):172–188CrossRef Brandes U, Delcling D, Gaertler M, Gorke R, Hoefer M, Nikoloski Z, Wagner D (2008) On modularity clustering. IEEE Trans Knowl Data Eng 20(2):172–188CrossRef
go back to reference Cai X, Bain M, Krzywicki A, Wobcke W, Kim YS, Compton P, Mahidadia A (2011) Collaborative filtering for people to people recommendation in social networks. In: AI 2010: advances in artificial intelligence. Springer, pp 476–485 Cai X, Bain M, Krzywicki A, Wobcke W, Kim YS, Compton P, Mahidadia A (2011) Collaborative filtering for people to people recommendation in social networks. In: AI 2010: advances in artificial intelligence. Springer, pp 476–485
go back to reference Chairunnanda P, Pham N, Hengartner U (2011) Privacy: Gone with the typing! identifying web users by their typing patterns. In: IEEE third international conference on privacy, security, risk and trust (passat), 2011 and 2011 IEEE third international conference on social computing (socialcom). IEEE, pp 974–980 Chairunnanda P, Pham N, Hengartner U (2011) Privacy: Gone with the typing! identifying web users by their typing patterns. In: IEEE third international conference on privacy, security, risk and trust (passat), 2011 and 2011 IEEE third international conference on social computing (socialcom). IEEE, pp 974–980
go back to reference Datta A, Buchegger S, Vu L-H, Strufe T, Rzadca K (2010) Decentralized online social networks. In: Handbook of social network technologies and applications. Springer, pp 349–378 Datta A, Buchegger S, Vu L-H, Strufe T, Rzadca K (2010) Decentralized online social networks. In: Handbook of social network technologies and applications. Springer, pp 349–378
go back to reference Debatin B, Lovejoy JP, Horn A-K, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput Mediat Commun 15(1):83–108CrossRef Debatin B, Lovejoy JP, Horn A-K, Hughes BN (2009) Facebook and online privacy: attitudes, behaviors, and unintended consequences. J Comput Mediat Commun 15(1):83–108CrossRef
go back to reference Dwyer C (2011) Privacy in the age of google and facebook. Technol Soc Mag IEEE 30(3):58–63CrossRef Dwyer C (2011) Privacy in the age of google and facebook. Technol Soc Mag IEEE 30(3):58–63CrossRef
go back to reference Ferrara E (2012) Community structure discovery in facebook. Int J Soc Netw Min 1:67–90CrossRef Ferrara E (2012) Community structure discovery in facebook. Int J Soc Netw Min 1:67–90CrossRef
go back to reference Goga O, Lei H, Parthasarathi SHK, Friedland G, Sommer R, Teixeira R (2013) Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd international conference on World Wide Web. International World Wide Web conferences steering committee, pp 447–458 Goga O, Lei H, Parthasarathi SHK, Friedland G, Sommer R, Teixeira R (2013) Exploiting innocuous activity for correlating users across sites. In: Proceedings of the 22nd international conference on World Wide Web. International World Wide Web conferences steering committee, pp 447–458
go back to reference Gong NZ, Talwalkar A, Mackey L, Huang L, Shin ECR, Stefanov E, Song D, et al. (2011) Jointly predicting links and inferring attributes using a social-attribute network (san). arXiv preprint arXiv:1112.3265 Gong NZ, Talwalkar A, Mackey L, Huang L, Shin ECR, Stefanov E, Song D, et al. (2011) Jointly predicting links and inferring attributes using a social-attribute network (san). arXiv preprint arXiv:​1112.​3265
go back to reference He B-Z, Chen C-M, Su Y-P, Sun H-M (2014) A defence scheme against identity theft attack based on multiple social networks. Expert Syst Appl 41(5):2345–2352CrossRef He B-Z, Chen C-M, Su Y-P, Sun H-M (2014) A defence scheme against identity theft attack based on multiple social networks. Expert Syst Appl 41(5):2345–2352CrossRef
go back to reference Hipp J, Güntzer U, Nakhaeizadeh G (2000) Algorithms for association rule mining a general survey and comparison. ACM Sigkdd Explor Newsl 2(1):58–64CrossRef Hipp J, Güntzer U, Nakhaeizadeh G (2000) Algorithms for association rule mining a general survey and comparison. ACM Sigkdd Explor Newsl 2(1):58–64CrossRef
go back to reference Hope C (2013) Facebook is a ‘major location for online child sexual grooming’, head of child protection agency says. Telegr Hope C (2013) Facebook is a ‘major location for online child sexual grooming’, head of child protection agency says. Telegr
go back to reference Huber M, Mulazzani M, Weippl E, Kitzler G, Goluch S (2011) Friend-in-the-middle attacks: exploiting social networking sites for spam. Internet Comput IEEE 15(3):28–34CrossRef Huber M, Mulazzani M, Weippl E, Kitzler G, Goluch S (2011) Friend-in-the-middle attacks: exploiting social networking sites for spam. Internet Comput IEEE 15(3):28–34CrossRef
go back to reference Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100CrossRef Jagatic TN, Johnson NA, Jakobsson M, Menczer F (2007) Social phishing. Commun ACM 50(10):94–100CrossRef
go back to reference Jin L, Takabi H, Joshi JB (2011) Towards active detection of identity clone attacks on online social networks. In: Proceedings of the first ACM conference on data and application security and privacy. ACM, pp 27–38 Jin L, Takabi H, Joshi JB (2011) Towards active detection of identity clone attacks on online social networks. In: Proceedings of the first ACM conference on data and application security and privacy. ACM, pp 27–38
go back to reference Kapanipathi P, Anaya J, Sheth A, Slatkin B, Passant A (2011) Privacy-aware and scalable content dissemination in distributed social networks. Semant Web-ISWC 2011:157–172 Kapanipathi P, Anaya J, Sheth A, Slatkin B, Passant A (2011) Privacy-aware and scalable content dissemination in distributed social networks. Semant Web-ISWC 2011:157–172
go back to reference Koll D, Li J, Fu X (2014) Soup: an online social network by the people, for the people. In: Proceedings of the 15th international middleware conference. ACM, pp 193–204 Koll D, Li J, Fu X (2014) Soup: an online social network by the people, for the people. In: Proceedings of the 15th international middleware conference. ACM, pp 193–204
go back to reference Kotsiantis S, Kanellopoulos D (2006) Association rules mining: a recent overview. GESTS Int Trans Comput Sci Eng 32(1):71–82 Kotsiantis S, Kanellopoulos D (2006) Association rules mining: a recent overview. GESTS Int Trans Comput Sci Eng 32(1):71–82
go back to reference Krivitsky PN, Handcock MS, Raftery AE, Hoff PD (2009) Representing degree distributions, clustering, and homophily in social networks with latent cluster random effects models. Soc Netw 31(3):204–213CrossRef Krivitsky PN, Handcock MS, Raftery AE, Hoff PD (2009) Representing degree distributions, clustering, and homophily in social networks with latent cluster random effects models. Soc Netw 31(3):204–213CrossRef
go back to reference Li N, Qardaji WH, Su D (2011) Provably private data anonymization: or, k-anonymity meets differential privacy. CoRR 49:55 arXiv:1101.2604 Li N, Qardaji WH, Su D (2011) Provably private data anonymization: or, k-anonymity meets differential privacy. CoRR 49:55 arXiv:​1101.​2604
go back to reference Low Y, Bickson D, Gonzalez J, Guestrin C, Kyrola A, Hellerstein JM (2012) Distributed graphlab: a framework for machine learning and data mining in the cloud. Proc VLDB Endow 5:716–727CrossRef Low Y, Bickson D, Gonzalez J, Guestrin C, Kyrola A, Hellerstein JM (2012) Distributed graphlab: a framework for machine learning and data mining in the cloud. Proc VLDB Endow 5:716–727CrossRef
go back to reference Luo W, Liu J, Liu J, Fan C (2009) An analysis of security in social networks. In: Eighth IEEE international conference on dependable, autonomic and secure computing, 2009. DASC’09. IEEE, pp 648–651 Luo W, Liu J, Liu J, Fan C (2009) An analysis of security in social networks. In: Eighth IEEE international conference on dependable, autonomic and secure computing, 2009. DASC’09. IEEE, pp 648–651
go back to reference Lynch MJ, Michalowski RJ, Groves WB (2000) The new primer in radical criminology: critical perspectives on crime, power, and identity. Criminal Justice Press, Monsey Lynch MJ, Michalowski RJ, Groves WB (2000) The new primer in radical criminology: critical perspectives on crime, power, and identity. Criminal Justice Press, Monsey
go back to reference Newman ME (2006) Modularity and community structure in networks. Proc Natl Acad Sci 103(23):8577–8582CrossRef Newman ME (2006) Modularity and community structure in networks. Proc Natl Acad Sci 103(23):8577–8582CrossRef
go back to reference Nilizadeh S, Jahid S, Mittal P, Borisov N, Kapadia A (2012) Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Proceedings of the 8th international conference on emerging networking experiments and technologies. ACM, pp 337–348 Nilizadeh S, Jahid S, Mittal P, Borisov N, Kapadia A (2012) Cachet: a decentralized architecture for privacy preserving social networking with caching. In: Proceedings of the 8th international conference on emerging networking experiments and technologies. ACM, pp 337–348
go back to reference Rahimian F, Girdzijauskas S, Haridi S (2014) Parallel community detection for cross-document coreference. In: IEEE/WIC/ACM international joint conferences on web intelligence (WI) and Intelligent Agent Technologies (IAT), 2014, vol 2. IEEE, pp 46–53 Rahimian F, Girdzijauskas S, Haridi S (2014) Parallel community detection for cross-document coreference. In: IEEE/WIC/ACM international joint conferences on web intelligence (WI) and Intelligent Agent Technologies (IAT), 2014, vol 2. IEEE, pp 46–53
go back to reference Robinson RM (2015) Social engineering attackers deploy fake social media profiles. Secur Intell Robinson RM (2015) Social engineering attackers deploy fake social media profiles. Secur Intell
go back to reference Roffo G, Segalin C, Vinciarelli A, Murino V, Cristani M (2013) Reading between the turns: Statistical modeling for identity recognition and verification in chats. In: 10th IEEE international conference on advanced video and signal based surveillance (AVSS), 2013. IEEE, pp 99–104 Roffo G, Segalin C, Vinciarelli A, Murino V, Cristani M (2013) Reading between the turns: Statistical modeling for identity recognition and verification in chats. In: 10th IEEE international conference on advanced video and signal based surveillance (AVSS), 2013. IEEE, pp 99–104
go back to reference Sirivianos M, Kim K, Gan JW, Yang X (2012) Assessing the veracity of identity assertions via osns. In: Fourth international conference on communication systems and networks (COMSNETS), 2012. IEEE, pp 1–10 Sirivianos M, Kim K, Gan JW, Yang X (2012) Assessing the veracity of identity assertions via osns. In: Fourth international conference on communication systems and networks (COMSNETS), 2012. IEEE, pp 1–10
go back to reference Soliman A, Bahri L, Carminati B, Ferrari E, Girdzijauskas S (2015) Diva: decentralized identity validation for social networks. In: IEEE/ACM international conference on advances in social network analysis and mining (ASONAM), 2015. IEEE/ACM, pp 383–391 Soliman A, Bahri L, Carminati B, Ferrari E, Girdzijauskas S (2015) Diva: decentralized identity validation for social networks. In: IEEE/ACM international conference on advances in social network analysis and mining (ASONAM), 2015. IEEE/ACM, pp 383–391
go back to reference Spears RE, Oakes PJ, Ellemers NE, Haslam S (1997) The social psychology of stereotyping and group life. Blackwell Publishing Spears RE, Oakes PJ, Ellemers NE, Haslam S (1997) The social psychology of stereotyping and group life. Blackwell Publishing
go back to reference Stets JE, Burke PJ (2003) A sociological approach to self and identity. Handbook of self and identity pp 128–152 Stets JE, Burke PJ (2003) A sociological approach to self and identity. Handbook of self and identity pp 128–152
go back to reference Stringhini G (2014) Stepping up the cybersecurity game: protecting online services from malicious activity. Ph.D. thesis, University of California, Santa Barbara Stringhini G (2014) Stepping up the cybersecurity game: protecting online services from malicious activity. Ph.D. thesis, University of California, Santa Barbara
go back to reference Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267–278CrossRef Yu H, Kaminsky M, Gibbons PB, Flaxman A (2006) Sybilguard: defending against sybil attacks via social networks. ACM SIGCOMM Comput Commun Rev 36(4):267–278CrossRef
go back to reference Yu H, Gibbons PB, Kaminsky M, Xiao F (2008) Sybillimit: a near-optimal social network defense against sybil attacks. In: IEEE symposium on security and privacy, 2008. SP 2008. IEEE, pp 3–17 Yu H, Gibbons PB, Kaminsky M, Xiao F (2008) Sybillimit: a near-optimal social network defense against sybil attacks. In: IEEE symposium on security and privacy, 2008. SP 2008. IEEE, pp 3–17
Metadata
Title
CADIVa: cooperative and adaptive decentralized identity validation model for social networks
Authors
Amira Soliman
Leila Bahri
Sarunas Girdzijauskas
Barbara Carminati
Elena Ferrari
Publication date
01-12-2016
Publisher
Springer Vienna
Published in
Social Network Analysis and Mining / Issue 1/2016
Print ISSN: 1869-5450
Electronic ISSN: 1869-5469
DOI
https://doi.org/10.1007/s13278-016-0343-z

Other articles of this Issue 1/2016

Social Network Analysis and Mining 1/2016 Go to the issue

Original Article

Hashtags and followers

Premium Partner