Skip to main content

RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 7859))

Abstract

We consider the specific problem of how users can securely authenticate online identities (e.g., associate a Facebook ID with its owner). Based on prior social science research demonstrating that the social tie strength is a useful indicator of trust in many real-world relationships, we explore how tie strength can be visualized using well-defined and measurable parameters. We then apply the visualization in the context of online friend invitations and propose a protocol for secure online identity authentication. We also present an implementation on a popular online social network (i.e., Facebook). We find that tie strength visualization is a useful primitive for online identity authentication.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Sophos Facebook ID Probe, http://www.sophos.com/pressoffice/news/articles/2007/08/facebook.html

  2. Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: Proceedings of WWW (2009)

    Google Scholar 

  3. Economist. Duly notarised (September 2011), http://www.economist.com/blogs/babbage/2011/09/internet-security

  4. Granovetter, M.S.: The Strength of Weak Ties. The American Journal of Socialogy 78(6), 1360–1380 (1973)

    Article  Google Scholar 

  5. Hamiel, N., Moyer, S.: Satan Is on My Friends List: Attacking Social Networks. In: Black Hat Conference (2008)

    Google Scholar 

  6. Hu, Q., Xu, Z., Dinev, T., Ling, H.: Does Deterrence Work in Reducing Information Security Policy Abuse by Employees? Communications of the ACM 84(6), 54–60 (2011)

    Article  Google Scholar 

  7. Irani, D., Balduzzi, M., Balzarotti, D., Kirda, E., Pu, C.: Reverse Social Engineering Attacks in Online Social Networks. In: Holz, T., Bos, H. (eds.) DIMVA 2011. LNCS, vol. 6739, pp. 55–74. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  8. Kim, T.H.-J., Bauer, L., Newsome, J., Perrig, A., Walker, J.: Challenges in Access Right Assignment for Secure Home Networks. In: Proceedings of USENIX Workshop on Hot Topics in Security, HotSec (August 2010)

    Google Scholar 

  9. Kim, T.H.-J., Gligor, V., Perrig, A.: Street-Level Trust Semantics for Attribute Authentication. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2012. LNCS, vol. 7622, pp. 96–115. Springer, Heidelberg (2012)

    Chapter  Google Scholar 

  10. Kim, T.H.-J., Yamada, A., Gligor, V., Hong, J.I., Perrig, A.: RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication. Technical Report CMU-CyLab-11-014, Carnegie Mellon University (2011)

    Google Scholar 

  11. Krackhardt, D.: The Strength of Strong Ties: The Importance of Philos in Organizations. In: Nohria, N., Eccles, R. (eds.) Networks and Organizations: Structure, Form, and Action, pp. 216–239 (1992)

    Google Scholar 

  12. Levin, D.Z., Cross, R.: The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer. Management Science 50(11), 1477–1490 (2004)

    Article  Google Scholar 

  13. Reagans, R., McEvily, B.: Network Structure and Knowledge Transfer: The Effects of Cohesion and Range. Administrative Science Quarterly 48(2), 240–267 (2003)

    Article  Google Scholar 

  14. Ryan, T.: Getting in Bed with Robin Sage. In: Black Hat Conference (2010)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Kim, T.HJ., Yamada, A., Gligor, V., Hong, J., Perrig, A. (2013). RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. In: Sadeghi, AR. (eds) Financial Cryptography and Data Security. FC 2013. Lecture Notes in Computer Science, vol 7859. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39884-1_7

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-39884-1_7

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-39883-4

  • Online ISBN: 978-3-642-39884-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics