Inter-Social-Networking: Accounting for Multiple Identities

  • Dominic PriceEmail author
  • Derek McAuley
  • Richard Mortier
  • Chris Greenhalgh
  • Michael Brown
  • Spyros Angelopoulos
Conference paper
Part of the Lecture Notes in Computer Science book series (LNCS, volume 9182)


We argue that the current approaches to online social networking give rise to numerous challenges regarding the management of the multiple facets of people’s digital identities within and around social networking sites (SNS). We propose an architecture for enabling people to better manage their SNS identities that is informed by the way the core Internet protocols developed to support interoperation of proprietary network protocols, and based on the idea of Separation of Concerns [1]. This does not require modification of existing services but is predicated on providing a connecting layer over them, both as a mechanism to address problems of privacy and identity, and to create opportunities to open up online social networking to a much richer set of possible interactions and applications.


Social-networking Privacy Identity Infrastructure Architecture 



This work is supported by Horizon Digital Economy Research, RCUK grant EP/G065802/1; and by CREATe, the Centre for Copyright and New Business Models, RCUK grant AH/K000179/1. Packages and source are available under open source licenses at


  1. 1.
    Hürsch, W.L., Lopes, C.V.: Separation of concerns. Technical report. North Eastern University (1995)Google Scholar
  2. 2.
    Portes, A.: Social capital: its origins and applications in modern sociology. Ann. Rev. Sociol. 24(1), 1–24 (1998)CrossRefGoogle Scholar
  3. 3.
    Edwards, L., McAuley, D.: What’s in a name? Real name policies and social networks. In: Proceedings of 1st International Workshop on Internet Science and Web Science Synergies (INETWEBSCI), Paris, France, 1 May 2013Google Scholar
  4. 4.
    van der Velden, M., El Emam, K.: “Not all my friends need to know”: a qualitative study of teenage patients, privacy, and social media. J. Am. Med. Inform. Assoc. 20, 16–24 (2012)CrossRefGoogle Scholar
  5. 5.
    O’Brien, C.N.: The top ten NLRB cases on Facebook firings and employer social media policies. Oregon Law Rev. 92(2) (2014).
  6. 6.
    Attia, A.M., Aziz, N., Friedman, B., Elhusseiny, M.F.: Commentary: the impact of social networking tools on political change in Egypt’s “revolution 2.0”. Electron. Commer. Res. Appl. 10(4), 369–374 (2011)CrossRefGoogle Scholar
  7. 7.
    Madejski, M., Johnson, M.L., Bellovin, S.M.: The failure of online social network privacy settings. Technical Report CUCS-010-11, Columbia University Computer Science, Columbia University, New York, USA (2011)Google Scholar
  8. 8.
    Ozenc, F.K., Farnham, S.D.: Life “modes” in social media. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, CHI 2011, Vancouver, BC, Canada, pp. 561–570 (2011)Google Scholar
  9. 9.
    Zheleva, E., Getoor, L.: To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles. In: Proceedings of the 18th International Conference on World Wide Web, WWW 2009, Madrid, Spain, pp. 531–540 (2009)Google Scholar
  10. 10.
    Le Blond, S., Zhang, C., Legout, A., Ross, K., Dabbous, W.: I know where you are and what you are sharing: exploiting p2p communications to invade users’ privacy. In: Proceedings of the 2011 ACM SIGCOMM Conference on Internet Measurement Conference, IMC 2011, Berlin, Germany, pp. 45–60 (2011)Google Scholar
  11. 11.
    Pesce, J.P., Casas, D.L., Rauber, G., Almeida, V.: Privacy attacks in social media using photo tagging networks: a case study with Facebook. In: Proceedings of the 1st Workshop on Privacy and Security in Online Social Media, PSOSM 2012, Lyon, France, pp. 4:1–4:8 (2012)Google Scholar
  12. 12.
    Hu, H., Ahn, G.-J., Jorgensen, J.: Detecting and resolving privacy conflicts for collaborative data sharing in online social networks. In: Proceedings of the 27th Annual Computer Security Applications Conference, ACSAC 2011, Orlando, Florida, pp. 103–112. ACM (2011)Google Scholar
  13. 13.
    Gates, C.E.: Access control requirements for web 2.0 security and privacy. In: Proceedings of Workshop on Web 2.0 Security & Privacy (W2SP 2007) (2007). [15] Halasz, F., Moran, T.P.: Analogy consideredGoogle Scholar
  14. 14.
    Halasz, F., Moran, T.P.: Analogy considered harmful. In: Proceedings of the 1982 Conference on Human Factors in Computing Systems, CHI 1982, Gaithersburg, Maryland, USA, pp. 383–386 (1982)Google Scholar
  15. 15.
    Crocker, S.: Protocol Notes. RFC 36, IETF, March 1970Google Scholar
  16. 16.
    Cerf, V.G., Kahn, R.E.: A protocol for packet network interconnection. IEEE Trans. Commun. 22(5), 637–648 (1974)CrossRefGoogle Scholar
  17. 17.
    Postel, J.: Comments on Internet Protocol and TCP. IEN 2, ISI, 15 August 1977Google Scholar
  18. 18.
    Postel, J.: NCP/TCP transition plan. RFC 801, IETF, November 1981Google Scholar
  19. 19.
    Pouzin, L.: A proposal for interconnecting packet switching networks. In: Proceedings of EUROCOMP, Bronel University, pp. 1023–1036, May 1974Google Scholar
  20. 20.
    Cerf, V.: The catenet model for internetworking. IEN 48, DARPA/IPTO, July 1978Google Scholar
  21. 21.
    Clark, D.: The design philosophy of the DARPA Internet protocols. In: Proceedings of ACM SIGCOMM 1988, Stanford, California, USA, pp. 106–114 (1988)Google Scholar
  22. 22.
    Waitzman, D.: Standard for the transmission of IP datagrams on avian carriers. RFC 1149, IETF, April 1990Google Scholar
  23. 23.
    Resnick, P. (ed.): Internet Message Format. RFC 2822, IETF, April 2001Google Scholar
  24. 24.
    Freed, N., Borenstein, N.: Multipurpose Internet Mail Extensions (MIME) Part One: Format of Internet Message Bodies. RFC 2045, IETF, November 1996Google Scholar

Copyright information

© Springer International Publishing Switzerland 2015

Authors and Affiliations

  • Dominic Price
    • 1
    Email author
  • Derek McAuley
    • 1
  • Richard Mortier
    • 2
  • Chris Greenhalgh
    • 1
  • Michael Brown
    • 1
  • Spyros Angelopoulos
    • 1
  1. 1.Horizon Digital Economy ResearchUniversity of NottinghamNottinghamUK
  2. 2.Systems Research GroupCambridge University Computer LaboratoryCambridgeUK

Personalised recommendations