Online Identities and Social Networking

  • Muthucumaru Maheswaran
  • Bader Ali
  • Hatice Ozguven
  • Julien Lord


Online identities play a critical role in the social web that is taking shape on the Internet. Despite many technical proposals for creating and managing online identities, none has received widespread acceptance. Design and implementation of online identities that are socially acceptable on the Internet remains an open problem. This chapter discusses the interplay between online identities and social networking. Online social networks (OSNs) are growing at a rapid pace and has millions of members in them. While the recent trend is to create explicit OSNs such as Facebook and MySpace, we also have implicit OSNs such as interaction graphs created by email and instant messaging services. Explicit OSNs allow users to create profiles and use them to project their identities on the web. There are many interesting identity related issues in the context of social networking including how OSNs help and hinder the definition of online identities.


Identity Management Online Social Network Attachment Point Malicious User Social Graph 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


  1. 1.
    Ba, S.: Establishing online trust through a community responsibility system. Decision Support Systems 31(3), 323–336 (2001)CrossRefGoogle Scholar
  2. 2.
    Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: Automated identity theft attacks on social networks. In: 18th International Conference on World Wide Web, pp. 551–560 (2009)Google Scholar
  3. 3.
    Bonneau, J., Anderson, J., Anderson, R., Stajano, F.: Eight friends are enough: Social graph approximation via public listings. In: SNS ’09: Second ACM EuroSys Workshop on Social Network Systems, pp. 13–18 (2009)Google Scholar
  4. 4.
    Boyd, D.M., Ellison, N.B.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1) (2007)Google Scholar
  5. 5.
    Brainard, J., Juels, A., Rivest, R.L., Szydlo, M., Yung, M.: Fourth-factor authentication: Somebody you know. In: CCS ’06: 13th ACM conference on Computer and communications security, pp. 168–178 (2006)Google Scholar
  6. 6.
    Burkhalter, B.: Reading race online: Discovering racial identity in usenet discussions. In: M.A. Smith, P. Kollock (eds.) Communities in Cyberspace, pp. 60–75. Routledge, London (1999)Google Scholar
  7. 7.
    Cameron, K., Jones, M.B.: Design rationale behind the identity metasystem architecture. In: ISSE/SECURE 2007 Securing Electronic Business Processes, pp. 117–129 (2007)Google Scholar
  8. 8.
    Carter, D.: Living in virtual communities: An ethnography of human relationships in cyberspace. Information, Communication and Society 8(2), 148–167 (2005)CrossRefGoogle Scholar
  9. 9.
    Chi, E.H.: The social web: Research and opportunities. IEEE Computer 41(9), 88–91 (2008)MathSciNetGoogle Scholar
  10. 10.
    Clarke, R.: Human identification in information systems: Management challenges and public policy issues. Information Technology and People 7(4), 6–34 (1994)CrossRefGoogle Scholar
  11. 11.
    Craik, K.H.: Reputation: A Network Interpretation. Oxford University Press, NY (2009)Google Scholar
  12. 12.
    Dhamija, R., Dusseault, L.: The seven flaws of identity management: Usability and security challenges. IEEE Security and Privacy 6(2), 24–29 (2008)CrossRefGoogle Scholar
  13. 13.
    Donath, J.: Identity and deception in the virtual community. In: M.A. Smith, P. Kollock (eds.) Communities in Cyberspace, pp. 27–58. Routledge, London (1999)Google Scholar
  14. 14.
    Douceur, J.R.: The sybil attack. In: First international Workshop on Peer-To-Peer Systems (2002)Google Scholar
  15. 15.
    Ellison, C.M.: The nature of a useable PKI. Computer Networks: The International Journal of Computer and Telecommunications Networking 31(9), 823–830 (1999)Google Scholar
  16. 16.
    Figueiredo, R., Boykin, P.O., Juste, P.S., Wolinsky, D.: Social VPNs: Integrating overlay and social networks for seamless P2P networking. In: IEEE WETICE/COPS 2008 (2008)Google Scholar
  17. 17.
    Gutwirth, S.: Beyond identity? Identity in the Information Society 1(1), 123–133 (2008)CrossRefGoogle Scholar
  18. 18.
    Jagatic, T.N., Johnson, N.A., Jakobsson, M., Menczer, F.: Social phishing. Communications of the ACM 50(10), 94–100 (2007)CrossRefGoogle Scholar
  19. 19.
    Krasnova, H., Gnther, O., Spiekermann, S., Koroleva, K.: Privacy concerns and identity in online social networks. Identity in the Information Society 2(1), 39–63 (2009)CrossRefGoogle Scholar
  20. 20.
    Marshall, A.M., Tompsett, B.C.: Identity theft in an online world. Computer Law and Security Report 21(2), 128–137 (2005)CrossRefGoogle Scholar
  21. 21.
    Mitnick, K.D., Simon, W.L., Wozniak, S.: The Art of Deception. Wiley, NY (2002)Google Scholar
  22. 22.
    Nabeth, T.: Social web and identity: A likely encounter. Identity in the Information Society 2(1), 1–5 (2009)CrossRefGoogle Scholar
  23. 23.
    Nagaraja, S., Anderson, R.: The snooping dragon: Social-malware surveillance of the Tibetan movement. Tech. Rep. UCAM-CL-TR-746, University of Cambridge Computer Laboratory (2009)Google Scholar
  24. 24.
    O’Hara, K., Tuffield, M.M., Shadbolt, N.: Lifelogging: Privacy and empowerment with memories for life. Identity in the Information Society 1(1), 155–172 (2008)CrossRefGoogle Scholar
  25. 25.
    Ramachandran, A.V., Feamster, N.: Authenticated out-of-band communication over social links. In: First Workshop on Online Social Networks, pp. 61–66 (2008)Google Scholar
  26. 26.
    Recordon, D., Fitzpatrick, B.: Openid authentication 1.1. (2006)
  27. 27.
    Soleymani, B., Maheswaran, M.: Social authentication protocol for mobile phones. In: 2009 International Conference on Computational Science and Engineering, pp. 436–441 (2009)Google Scholar
  28. 28.
    Stutzman, F.: An evaluation of identity-sharing behavior in social network communities. Journal of the International Digital Media and Arts Association 3(1) (2006)Google Scholar
  29. 29.
    Tran, N., Min, B., Li, J., Subramanian, L.: Sybil-resilient online content voting. In: 6th USENIX Symposium on Networked Systems Design and Implementation, pp. 15–28 (2009)Google Scholar
  30. 30.
    Tufekci, Z.: Can you see me now? Audience and disclosure regulation in online social network sites. Bulletin of Science Technology Society 28(1), 20–36 (2008)Google Scholar
  31. 31.
    Xie, B.: The mutual shaping of online and offline social relationships. Information Research 13(3) (2008)Google Scholar
  32. 32.
    Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. SIGCOMM Computer Communication Review 36(4), 267–278 (2006)CrossRefGoogle Scholar
  33. 33.
    Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: IEEE Symposium on Security and Privacy, pp. 3–17 (2008)Google Scholar

Copyright information

© Springer Science+Business Media, LLC 2010

Authors and Affiliations

  • Muthucumaru Maheswaran
    • 1
  • Bader Ali
  • Hatice Ozguven
  • Julien Lord
  1. 1.School of Computer ScienceMcGill UniversityMontrealCanada

Personalised recommendations