Let Only the Right One IN: Privacy Management Scheme for Social Network
- Cite this paper as:
- Gampa N.K., Khot R.A., Srinathan K. (2009) Let Only the Right One IN: Privacy Management Scheme for Social Network. In: Prakash A., Sen Gupta I. (eds) Information Systems Security. ICISS 2009. Lecture Notes in Computer Science, vol 5905. Springer, Berlin, Heidelberg
Current social networking sites protect user data by making it available only to a restricted set of people, often friends. However, the concept of ‘friend’ is illusory in social networks. Adding a person to the friends list without verifying his/her identity can lead to many serious consequences like identity theft, privacy loss, etc. We propose a novel verification paradigm to ensure that a person (Bob) who sends a friend request (to Alice) is actually her friend, and not someone who is faking his identity. Our solution is based on what Bob might know and verify about Alice. We work on the premise that a friend knows a person’s preferences better than a stranger. To verify our premise, we conducted a two stage user study. Results of the user study are encouraging. We believe our solution makes a significant contribution, namely, the way it leverages the benefits of preference based authentication and challenge response schemes.
KeywordsPrivacy over social networks preference based authentication friend verification challenge response schemes
Unable to display preview. Download preview PDF.