ABSTRACT
An online user joins multiple social networks in order to enjoy different services. On each joined social network, she creates an identity and constitutes its three major dimensions namely profile, content and connection network. She largely governs her identity formulation on any social network and therefore can manipulate multiple aspects of it. With no global identifier to mark her presence uniquely in the online domain, her online identities remain unlinked, isolated and difficult to search. Literature has proposed identity search methods on the basis of profile attributes, but has left the other identity dimensions e.g. content and network, unexplored. In this work, we introduce two novel identity search algorithms based on content and network attributes and improve on traditional identity search algorithm based on profile attributes of a user. We apply proposed identity search algorithms to find a user's identity on Facebook, given her identity on Twitter. We report that a combination of proposed identity search algorithms found Facebook identity for 39% of Twitter users searched while traditional method based on profile attributes found Facebook identity for only 27.4%. Each proposed identity search algorithm access publicly accessible attributes of a user on any social network. We deploy an identity resolution system, Finding Nemo, which uses proposed identity search methods to find a Twitter user's identity on Facebook. We conclude that inclusion of more than one identity search algorithm, each exploiting distinct dimensional attributes of an identity, helps in improving the accuracy of an identity resolution process.
- M. Motoyama and G. Varghese, "I seek you: searching and matching individuals in social networks," in Proceedings of the eleventh international workshop on Web information and data management, ser. WIDM, 2009. Google ScholarDigital Library
- C. Grier, K. Thomas, V. Paxson, and M. Zhang, "@spam: the underground on 140 characters or less," in Proceedings of the ACM conference on Computer and communications security, ser. CCS, 2010. Google ScholarDigital Library
- F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, "Detecting spammers on Twitter," in Proceedings of the Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010.Google Scholar
- Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, "Who is tweeting on Twitter: human, bot, or cyborg?" in Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC, 2010. Google ScholarDigital Library
- F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gonçalves, "Detecting spammers and content promoters in online video social networks," in Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, ser. SIGIR, 2009. Google ScholarDigital Library
- D. Irani, S. Webb, and C. Pu, "Study of Static Classification of Social Spam Profiles in MySpace," in ICWSM, 2010.Google Scholar
- B. Krishnamurthy and C. E. Wills, "On the leakage of personally identifiable information via online social networks," ser. SIGCOMM, 2010. Google ScholarDigital Library
- T. Chen, M. A. Kaafar, A. Friedman, and R. Boreli, "Is More always Merrier?: a Deep Dive into Online Social Footprints," in Proceedings of the ACM Workshop on online social networks, ser. WOSN, 2012. Google ScholarDigital Library
- E. Zheleva and L. Getoor, "To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles," in Proceedings of the 18th international conference on World wide web, ser. WWW, 2009. Google ScholarDigital Library
- O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, RobinSommer, and R. Teixeira, "On exploiting Innocuous User Activity for Correlating Accounts across Social Network Sites," 2012.Google Scholar
- M. Shehab, M. N. Ko, and H. Touati, "Social networks Profile Mapping using Games," in Proceedings of the 3rd USENIX conference on Web Application Development, ser. WebApps, 2012. Google ScholarDigital Library
- A. Malhotra, L. Totti, W. Meira, P. Kumaraguru, and V. Almeida, "Studying User Footprints in Different Online Social Networks," International Workshop on Cybersecurity of Online Social Network (CSOSN), 2012. Google ScholarDigital Library
- D. Irani, S. Webb, K. Li, and C. Pu, "Large Online Social Footprints - An Emerging Threat," in Proceedings of the 2009 International Conference on Computational Science and Engineering, ser. CSE, 2009. Google ScholarDigital Library
- D. Perito, C. Castelluccia, M. A. Kâafar, and P. Manils, "How Unique and Traceable Are Usernames?" in PETS, 2011. Google ScholarDigital Library
- M. Szomszor, I. Cantador, E. P. Superior, and H. Alani, "Correlating user profiles from multiple folksonomies," in In Proceedings of International Conference Hypertext (HT '08), 2008. Google ScholarDigital Library
- T. Iofciu, P. Fankhauser, F. Abel, and K. Bischoff, "Identifying Users Across Social Tagging Systems," in ICWSM, 2011.Google Scholar
- E. Raad, R. Chbeir, and A. Dipanda, "User Profile Matching in Social Networks," in Network-Based Information Systems (NBiS), 2010 13th International Conference on, 2010. Google ScholarDigital Library
- K. Cortis, S. Scerri, I. Rivera, and S. Handschuh, "Discovering semantic equivalence of people behind online profiles," in In Proceedings of the Resource Discovery (RED) Workshop, ser. ESWC, 2012.Google Scholar
- A. Doan and A. Y. Halevy, "Semantic-integration research in the database community," AI Magazine., 2005. Google ScholarDigital Library
- J. Golbeck and M. Rothstein, "Linking social networks on the web with FOAF: a semantic web case study," in Proceedings of the National conference on Artificial intelligence -, ser. AAAI, 2008. Google ScholarDigital Library
- A. Narayanan and V. Shmatikov, "De-anonymizing Social Networks," in Proceedings of IEEE Symposium on Security and Privacy, ser. SP, 2009. Google ScholarDigital Library
- S. Bartunov, A. Korshunov, S. Park, W. Ryu, and H. Lee, "Joint Link-Attribute User Identity Resolution in Online Social Networks," in SNAKDD, 2012.Google Scholar
- D. Correa, A. Sureka, and R. Sethi, "WhACKY! - What anyone could know about you from Twitter," in PST, 2012. Google ScholarDigital Library
- P. Jain, T. Rodrigues, G. Magno, P. Kumaraguru, and V. Almeida, "Cross-Pollination of Information in Online Social Media: A Case Study on Popular Social Networks," in SocialCom/PASSAT, 2011.Google Scholar
- M. Rowe, "The credibility of digital identity information on the social web: a user study," in WICOW, 2010. Google ScholarDigital Library
- M. A. Jaro, Unimatch: A record linkage system: Users manual. Bureau of the Census, 1978.Google Scholar
- "We're getting less friendly on Facebook," 2012. {Online}. Available: Accessed on 02/24/2013 - http://www.boston.com/business/technology/articles/2012/02/24/study_were_getting_less_friendly_on_facebook/Google Scholar
- P. Kumaraguru and N. Sachdeva, "Privacy in India: Attitudes and Awareness V 2.0," PreCog-TR-12-001, PreCog@IIIT-Delhi, Tech. Rep., 2012, http://precog.iiitd.edu.in/research/privacyindia/.Google Scholar
Index Terms
- @i seek 'fb.me': identifying users across multiple online social networks
Recommendations
Do online social network friends still threaten my privacy?
CODASPY '13: Proceedings of the third ACM conference on Data and application security and privacyA user's online social network (OSN) friends commonly share information on their OSN profiles that might also characterize the user him-/herself. Therefore, OSN friends are potentially jeopardizing users' privacy. Previous studies demonstrated that ...
On the leakage of personally identifiable information via online social networks
WOSN '09: Proceedings of the 2nd ACM workshop on Online social networksFor purposes of this paper, we define "Personally identifiable information" (PII) as information which can be used to distinguish or trace an individual's identity either alone or when combined with other information that is linkable to a specific ...
Privacy attacks in social media using photo tagging networks: a case study with Facebook
PSOSM '12: Proceedings of the 1st Workshop on Privacy and Security in Online Social MediaSocial-networking users unknowingly reveal certain kinds of personal information that malicious attackers could profit from to perpetrate significant privacy breaches. This paper quantitatively demonstrates how the simple act of tagging pictures on the ...
Comments