Abstract
We consider the specific problem of how users can securely authenticate online identities (e.g., associate a Facebook ID with its owner). Based on prior social science research demonstrating that the social tie strength is a useful indicator of trust in many real-world relationships, we explore how tie strength can be visualized using well-defined and measurable parameters. We then apply the visualization in the context of online friend invitations and propose a protocol for secure online identity authentication. We also present an implementation on a popular online social network (i.e., Facebook). We find that tie strength visualization is a useful primitive for online identity authentication.
Keywords
This is a preview of subscription content, log in via an institution.
Buying options
Tax calculation will be finalised at checkout
Purchases are for personal use only
Learn about institutional subscriptionsPreview
Unable to display preview. Download preview PDF.
References
Sophos Facebook ID Probe, http://www.sophos.com/pressoffice/news/articles/2007/08/facebook.html
Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks. In: Proceedings of WWW (2009)
Economist. Duly notarised (September 2011), http://www.economist.com/blogs/babbage/2011/09/internet-security
Granovetter, M.S.: The Strength of Weak Ties. The American Journal of Socialogy 78(6), 1360–1380 (1973)
Hamiel, N., Moyer, S.: Satan Is on My Friends List: Attacking Social Networks. In: Black Hat Conference (2008)
Hu, Q., Xu, Z., Dinev, T., Ling, H.: Does Deterrence Work in Reducing Information Security Policy Abuse by Employees? Communications of the ACM 84(6), 54–60 (2011)
Irani, D., Balduzzi, M., Balzarotti, D., Kirda, E., Pu, C.: Reverse Social Engineering Attacks in Online Social Networks. In: Holz, T., Bos, H. (eds.) DIMVA 2011. LNCS, vol. 6739, pp. 55–74. Springer, Heidelberg (2011)
Kim, T.H.-J., Bauer, L., Newsome, J., Perrig, A., Walker, J.: Challenges in Access Right Assignment for Secure Home Networks. In: Proceedings of USENIX Workshop on Hot Topics in Security, HotSec (August 2010)
Kim, T.H.-J., Gligor, V., Perrig, A.: Street-Level Trust Semantics for Attribute Authentication. In: Christianson, B., Malcolm, J., Stajano, F., Anderson, J. (eds.) Security Protocols 2012. LNCS, vol. 7622, pp. 96–115. Springer, Heidelberg (2012)
Kim, T.H.-J., Yamada, A., Gligor, V., Hong, J.I., Perrig, A.: RelationGrams: Tie-Strength Visualization for User-Controlled Online Identity Authentication. Technical Report CMU-CyLab-11-014, Carnegie Mellon University (2011)
Krackhardt, D.: The Strength of Strong Ties: The Importance of Philos in Organizations. In: Nohria, N., Eccles, R. (eds.) Networks and Organizations: Structure, Form, and Action, pp. 216–239 (1992)
Levin, D.Z., Cross, R.: The Strength of Weak Ties You Can Trust: The Mediating Role of Trust in Effective Knowledge Transfer. Management Science 50(11), 1477–1490 (2004)
Reagans, R., McEvily, B.: Network Structure and Knowledge Transfer: The Effects of Cohesion and Range. Administrative Science Quarterly 48(2), 240–267 (2003)
Ryan, T.: Getting in Bed with Robin Sage. In: Black Hat Conference (2010)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Kim, T.HJ., Yamada, A., Gligor, V., Hong, J., Perrig, A. (2013). RelationGram: Tie-Strength Visualization for User-Controlled Online Identity Authentication. In: Sadeghi, AR. (eds) Financial Cryptography and Data Security. FC 2013. Lecture Notes in Computer Science, vol 7859. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-39884-1_7
Download citation
DOI: https://doi.org/10.1007/978-3-642-39884-1_7
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-642-39883-4
Online ISBN: 978-3-642-39884-1
eBook Packages: Computer ScienceComputer Science (R0)