Let Only the Right One IN: Privacy Management Scheme for Social Network

(Short Paper)
  • Nagaraja Kaushik Gampa
  • Rohit Ashok Khot
  • Kannan Srinathan
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5905)

Abstract

Current social networking sites protect user data by making it available only to a restricted set of people, often friends. However, the concept of ‘friend’ is illusory in social networks. Adding a person to the friends list without verifying his/her identity can lead to many serious consequences like identity theft, privacy loss, etc. We propose a novel verification paradigm to ensure that a person (Bob) who sends a friend request (to Alice) is actually her friend, and not someone who is faking his identity. Our solution is based on what Bob might know and verify about Alice. We work on the premise that a friend knows a person’s preferences better than a stranger. To verify our premise, we conducted a two stage user study. Results of the user study are encouraging. We believe our solution makes a significant contribution, namely, the way it leverages the benefits of preference based authentication and challenge response schemes.

Keywords

Privacy over social networks preference based authentication friend verification challenge response schemes 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: WWW 2009: Proceedings of the 18th international conference on World wide web, pp. 551–560. ACM, New York (2009)CrossRefGoogle Scholar
  2. 2.
    Boyd, D., Ellison, N.: Social network sites: Definition, history, and scholarship. Journal of Computer-Mediated Communication 13(1), 210–230 (2008)CrossRefGoogle Scholar
  3. 3.
    Boyd, D.: Why Youth (Heart) Social Network Sites: The Role of Networked Publics in Teenage Social Life, pp. 119–142. MIT Press, Cambridge (2007)Google Scholar
  4. 4.
    Grimmelmann, J.: Facebook and the social dynamics of privacy (August 2008)Google Scholar
  5. 5.
    Gross, R., Acquisti, A.: Information revelation and privacy in online social networks (the Facebook case). In: Proceedings of the 2005 ACM workshop on Privacy in the electronic society, pp. 71–80 (2005)Google Scholar
  6. 6.
    Jakobsson, M., Stolterman, E., Wetzel, S., Yang, L.: Love and authentication. In: CHI 2008: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pp. 197–200. ACM, New York (2008)CrossRefGoogle Scholar
  7. 7.
    John, O.P., Srivastava, S.: The big five trait taxonomy: History, measurement, and theoretical perspectives, pp. 102–138. Guilford Press, New York (1999)Google Scholar
  8. 8.
    Just, M.: Designing and evaluating challenge-question systems. IEEE Security and Privacy 2(5), 32–39 (2004)CrossRefMathSciNetGoogle Scholar
  9. 9.
    Lucas, M.M., Borisov, N.: Flybynight: mitigating the privacy risks of social networking. In: WPES 2008: Proceedings of the 7th ACM workshop on Privacy in the electronic society, pp. 1–8. ACM, New York (2008)CrossRefGoogle Scholar
  10. 10.
    Maslow, A.H.: A theory of human motivation. Psychological Review 50, 370–396 (1943)CrossRefGoogle Scholar
  11. 11.
    Rabkin, A.: Personal knowledge questions for fallback authentication: security questions in the era of facebook. In: SOUPS 2008: Proceedings of the 4th symposium on Usable privacy and security, pp. 13–23. ACM, New York (2008)CrossRefGoogle Scholar
  12. 12.
    Toomim, M., Zhang, X., Fogarty, J., Landay, J.A.: Access control by testing for shared knowledge. In: CHI 2008: Proceeding of the twenty-sixth annual SIGCHI conference on Human factors in computing systems, pp. 193–196. ACM, New York (2008)CrossRefGoogle Scholar
  13. 13.
    Yardi, S., Feamster, N., Bruckman, A.: Photo-based authentication using social networks. In: WOSP 2008: Proceedings of the first workshop on Online social networks, pp. 55–60. ACM, New York (2008)CrossRefGoogle Scholar
  14. 14.
    Yu, H., Gibbons, P.B., Kaminsky, M., Xiao, F.: Sybillimit: A near-optimal social network defense against sybil attacks. In: SP 2008: Proceedings of the 2008 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 3–17. IEEE Computer Society, Los Alamitos (2008)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Nagaraja Kaushik Gampa
    • 1
  • Rohit Ashok Khot
    • 1
  • Kannan Srinathan
    • 1
  1. 1.International Institute of Information TechnologyCenter for Security,Theory and Algorithmic Research (CSTAR)Hyderabad

Personalised recommendations