FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.

Slides:



Advertisements
Similar presentations
Measuring OSNs: Things Id Like to Know Nick Feamster Georgia Tech.
Advertisements

Defending against large-scale crawls in online social networks Mainack Mondal Bimal Viswanath Allen Clement Peter Druschel Krishna Gummadi Alan Mislove.
If Harry Met Sally Online, Could He Trust Her? A Discussion of Honesty in Online Dating Rachel Kern Techno-Identity MAS 964 Spring 2005.
Trust Management of Services in Cloud Environments:
Self-Organized Anonymous Authentication in Mobile Ad Hoc Networks Julien Freudiger, Maxim Raya and Jean-Pierre Hubaux SECURECOMM, 2009.
P RIVACY, T RUST, AND R EPUTATION Jose Miguel Such July 27th, 2011.
D EFENSE A GAINST S PECTRUM S ENSING D ATA F ALSIFICATION A TTACKS I N C OGNITIVE R ADIO N ETWORKS Li Xiao Department of Computer Science & Engineering.
Social Networking Safety. Dangers of online social networking Facebook Twitter Instagram.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
Authors Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, Abraham Flaxman Presented by: Jonathan di Costanzo & Muhammad Atif Qureshi 1.
Qiang Cao Duke University
Propagation of Trust and Distrust Antti Sorjamaa Propagation of Trust and Distrust R. Guha, R. Kumar, P. Raghavan and A. Tomkins New York, 2004 Antti Sorjamaa.
Daniela Oliveira 1, Dhiraj Murthy 1, Henric Johnson 2, S. Felix Wu 3, Roozbeh Nia 3 and Jeff Rowe 3 1 Bowdoin College 2 Blekinge Institute of Technology.
An Approach to Evaluate Data Trustworthiness Based on Data Provenance Department of Computer Science Purdue University.
Assessing the Veracity of Identity Assertions via OSNs Michael Sirivianos Telefonica Research Telefonica Researchwith: Kyunbaek Kim (UC Irvine), Jian W.
Hongyu Gao, Tuo Huang, Jun Hu, Jingnan Wang.  Boyd et al. Social Network Sites: Definition, History, and Scholarship. Journal of Computer-Mediated Communication,
1 Preserving Privacy in Collaborative Filtering through Distributed Aggregation of Offline Profiles The 3rd ACM Conference on Recommender Systems, New.
Privacy-Preserving Cross-Domain Network Reachability Quantification
Computing Trust in Social Networks
Gossip-Based Aggregation of Trust in Decentralized Reputation Systems Ariel D. Procaccia, Yoram Bachrach, and Jeffrey S. Rosenschein.
Minas Gjoka, UC IrvineWalking in Facebook 1 Walking in Facebook: A Case Study of Unbiased Sampling of OSNs Minas Gjoka, Maciej Kurant ‡, Carter Butts,
SybilGuard: Defending Against Sybil Attacks via Social Networks Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman Presented by Ryan.
Building Expertise Network by Tagging People Yan Qu iSchool, University of Maryland Jun Zhang Pitney Bowes, Inc.
Structure based Data De-anonymization of Social Networks and Mobility Traces Shouling Ji, Weiqing Li, and Raheem Beyah Georgia Institute of Technology.
Midterm Presentation Undergraduate Researchers: Graduate Student Mentor: Faculty Mentor: Jordan Cowart, Katie Allmeroth Krist Culmer Dr. Wenjun (Kevin)
GAYATRI SWAMYNATHAN, CHRISTO WILSON, BRYCE BOE, KEVIN ALMEROTH AND BEN Y. ZHAO UC SANTA BARBARA Do Social Networks Improve e-Commerce? A Study on Social.
SocialFilter: Introducing Social Trust to Collaborative Spam Mitigation Michael Sirivianos Telefonica Research Telefonica Research Joint work with Kyungbaek.
Security Liaisons Information Presentation. Introduction  What’s the big deal with computer security? Don’t we have an IT security department to take.
TOWARDS IDENTITY ANONYMIZATION ON GRAPHS. INTRODUCTION.
Recommender Systems. >1,000,000,000 Finding Trusted Information How many cows in Texas?
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Finding Reliable Research on the Internet. So where do I start? Your essays will be comprised of a variety of information, but because we live in a digital.
Annual Workshop February 5th, A Formal Approach to Analyze Privacy in Electronic Services MSEC Koen Decroix [Koen Decroix – MSEC - KU Leuven]
Architectural Considerations for GEOPRIV/ECRIT Presentation given by Hannes Tschofenig.
Solutions to Security and Privacy Issues in Mobile Social Networking
Using Transactional Information to Predict Link Strength in Online Social Networks Indika Kahanda and Jennifer Neville Purdue University.
Terminodes and Sybil: Public-key management in MANET Dave MacCallum (Brendon Stanton) Apr. 9, 2004.
WALKING IN FACEBOOK: A CASE STUDY OF UNBIASED SAMPLING OF OSNS junction.
Argumentation and Trust: Issues and New Challenges Jamal Bentahar Concordia University (Montreal, Canada) University of Namur, Belgium, June 26, 2007.
Professor Norah Jones Dr. Esyin Chew Social Software for Learning – The Institutional Policy of the University of Glamorgan ICHL 2012, China
Staying Safe Online A Practical Guide for Middle School Students.
Evaluating Websites… The truth is out there - but so is the lie..
“SybilGuard: Defending Against Sybil Attacks via Social Networks” Authors: Haifeng Yu, Phillip B. Gibbons, and Suman Nath (several slides based on authors’)
Computer Science Department, Peking University
WISTP’08 ©LAM /05/2008 A Self-Certified and Sybil-Free Framework for Secure Digital Identity Domain Buildup Christer Andersson Markulf Kohlweiss.
POP-SNAQ: Privacy-preserving Open Platform for Social Network Application Queries Brian Thompson Huijun Xiong.
Exploit of Online Social Networks with Community-Based Graph Semi-Supervised Learning Mingzhen Mo and Irwin King Department of Computer Science and Engineering.
The Sybil Attack, J. R. Douceur, IPTPS Clifton Forlines CSC2231 Online Social Networks 11/1/2007.
WEBSITES AND ADDRESS RELATIONSHIP By: Nahed Alnahash Dr. Wenjin Zhou.
A Quantitative Trust Model for Negotiating Agents A Quantitative Trust Model for Negotiating Agents Jamal Bentahar, John Jules Ch. Meyer Concordia University.
URP Usage Scenarios for Mobility James Kempf Sun Microsystems, Inc.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Socialbots and its implication On ONLINE SOCIAL Networks Md Abdul Alim, Xiang Li and Tianyi Pan Group 18.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Bloom Cookies: Web Search Personalization without User Tracking Authors: Nitesh Mor, Oriana Riva, Suman Nath, and John Kubiatowicz Presented by Ben Summers.
Click to edit Master title style © by Nat Sakimura. Coping with Information Asymmetry SESSION G: Managing Risk & Reducing Online Fraud Using New.
CMSC 414 Computer and Network Security Lecture 18 Jonathan Katz.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Presented By: Madiha Saleem Sunniya Rizvi.  Collaborative filtering is a technique used by recommender systems to combine different users' opinions and.
Reputation-aware QoS Value Prediction of Web Services Weiwei Qiu, Zhejiang University Zibin Zheng, The Chinese University of HongKong Xinyu Wang, Zhejiang.
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Dieudo Mulamba November 2017
Binghui Wang, Le Zhang, Neil Zhenqiang Gong
Privacy Protection for Social Network Services
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Data Warehousing Data Mining Privacy
Social Network-Based Sybil Defenses
Online rating system credibility
Presentation transcript:

FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W. Gan, C. Carlon and D. Jiang Duke University and UC Irvine Aug HotSec 2009

Motivation  Online world without identity credentials: o Makes determining who and what to believe difficult

Outline  Why do we need a stronger online identity?  Design Social Tagging Assessing Credibility OSN-issued Credentials  Evaluation  Conclusions and work in progress

 Trustworthy online communication: o Dating websites, Craigslist, Amazon reviews, eBay transactions, first contact in OSNs o “I work in...”, “I am a good seller”, “My name is...”  Access control o Age-restricted sites o “I am over 18 years old”  Malware defence o “I am a reputable software author” How can Identity Credentials help?

Our Solution  Relaxed (not absolutely verified) credentials o bind an online statement (assertion) to the probability this assertion is true o for not very critical applications, but they can help users or apps make informed decisions  Online social network users verify their friends’ verifiable identity assertions  OSN providers issue credentials on a user’s assertions using his friends feedback

Outline  Why do we need stronger online identity?  Design Social Tagging Assessing Credibility OSN-issued Credentials  Evaluation  Conclusions and work in progress

Design: Social Tagging  Users post facts/assertions on their OSN profiles: o “Am I really over 18 years old?”  Friends tag those facts as TRUE or FALSE o OSN-based crowd-vetting

o  Challenges: o Friends can collude and lie for each other o Dishonest users may create many fake OSN accounts, aka Sybil attack  Our approach: assess the credibility of taggers using a trust metric

Design: Assessing Credibility (1) Advogato Trust Metric:  Attack-resistant [Levien et al., Security ’98]  Input: Graph with trust edges that indicate a trust level X between nodes.  Output: The nodes that can be trusted by at least X.

Design: Assessing Credibility (1) Advogato Trust Metric:  Input: Graph with trust edges indicating trust level X between nodes.  Output: The nodes that can be trusted by at least X. 100% trusted node 100%75%25% 50%75% 75% trusted node

Design: Assessing Credibility (2)  Trust edges annotated with tagging similarity between friends o #same-tags / #common-tags o e.g., if two friends have tagged 2 common facts of the same user and agree on only one tag, they have similarity 50%

Design: Assessing Credibility (3)  Use Advogato to compute the tagging credibility (or weight) in [0, 1] of tags made by each user i : w i  Use weighted average of tags by friends i of j on j’s assertion (d ij = +1 if TRUE, -1 if FALSE) to compute credibility of j’s assertion: max(  i w i * d ij /  i w i, 0)

Design: OSN-issued Credentials  Relaxed credentials issued by the OSN provider: o {assertion type, assertion, credibility}  idemix [Camenisch et al. EuroCrypt 01, CCS 02] o Obtain cryptographic credential from credential authority o Prove possession of credential to verifying authority without revealing identity o Verifying authorities cannot link credential showings o Firefox plugin based on idemix Java code If unlinkability (surveillance-resistance) not required or if required but the user does not mind creating multiple credentials for the same assertion: o use simple web based credential, e.g.,

An Age Example

Outline  Why do we need a stronger online identity?  Design Social Tagging Assessing Credibility OSN-issued Credentials  Evaluation  Conclusions and work in progress

Evaluation How well do credibility scores correlate with truth?  Can the design withstand dishonest user tagging and Sybil attacks? Experimental Setting :  Honest and dishonest users make one assertion each  Dishonest users tag both dishonest and honest assertions as TRUE  Obtain average credibility of honest and dishonest assertions

The #tags per user matters  10% dishonest  As #tags increase, honest users have more credibility  Dishonest users always have low credibility  Sybils have slightly more credibility than dishonest

Credibility is robust as %dishonest increases  at most 20 tags per user  Honest users always have high credibility  Dishonest user credibility not high even when 50%  Sybils have slightly more credibility than dishonest

Conclusions FaceTrust is:  An OSN-based approach to identity verification: o crowd-vetting through social tagging o relaxed and lightweight credentials  Employs robust trust metric for attack resistance  Employs anonymous credentials to preserve privacy

Work in Progress Need to validate our hypotheses:  That users are willing to tag o do they find tagging fun and useful?  That users mostly tag accurately o are there many honest taggers?  Facebook application up and running o we are collecting usage data, tags and social graph Exploring other trust metrics:  TrustRank [Gyongyi et al. VLDB 04]

Thank You! Facebook application “Am I really?” at: Questions?