COIP—Continuous, Operable, Impartial, and Privacy-Aware Identity Validity Estimation for OSN Profiles

Identity validation of Online Social Networks’ (OSNs’) peers is a critical concern to the insurance of safe and secure online socializing environments. Starting from the vision of empowering users to determine the validity of OSN identities, we suggest a framework to estimate the trustworthiness of online social profiles based only on the information they contain. Our framework is based on learning identity correlations between profile attributes in an OSN community and on collecting ratings from OSN community members to evaluate the trustworthiness of target profiles. Our system guarantees utility, user anonymity, impartiality in rating, and operability within the dynamics and continuous evolution of OSNs. In this article, we detail the system design, and we prove its correctness against these claimed quality properties. Moreover, we test its effectiveness, feasibility, and efficiency through experimentation on real-world datasets from Facebook and Google+, in addition to using the Adults UCI dataset.

[1]  Daqiang Zhang,et al.  CRUC: Cold-start Recommendations Using Collaborative Filtering in Internet of Things , 2013, ArXiv.

[2]  Xiaohui Liang,et al.  Sybil Attacks and Their Defenses in the Internet of Things , 2014, IEEE Internet of Things Journal.

[3]  Panagiotis G. Ipeirotis,et al.  Quality-Based Pricing for Crowdsourced Workers , 2013 .

[4]  Bo Zhao,et al.  The wisdom of minority: discovering and targeting the right group of workers for crowdsourcing , 2014, WWW.

[5]  Yi Li,et al.  In a World That Counts: Clustering and Detecting Fake Social Engagement at Scale , 2015, WWW.

[6]  Alon Y. Halevy,et al.  Crowdsourcing systems on the World-Wide Web , 2011, Commun. ACM.

[7]  Víctor M. Eguíluz,et al.  Dynamics in online social networks , 2012, ArXiv.

[8]  Ben Y. Zhao,et al.  Uncovering social network sybils in the wild , 2011, IMC '11.

[9]  Tom Leinster,et al.  A Characterization of Entropy in Terms of Information Loss , 2011, Entropy.

[10]  Barbara Carminati,et al.  Network and profile based measures for user similarities on social networks , 2011, 2011 IEEE International Conference on Information Reuse & Integration.

[11]  J. Wolak,et al.  Use of social networking sites in online sex crimes against minors: an examination of national incidence and means of utilization. , 2010, The Journal of adolescent health : official publication of the Society for Adolescent Medicine.

[12]  Ninghui Li,et al.  t-Closeness: Privacy Beyond k-Anonymity and l-Diversity , 2007, 2007 IEEE 23rd International Conference on Data Engineering.

[13]  Xiao Wang,et al.  Understanding Sybil Groups in the Wild , 2015, Journal of Computer Science and Technology.

[14]  István Hegedüs,et al.  Gossip learning with linear models on fully distributed data , 2011, Concurr. Comput. Pract. Exp..

[15]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[16]  Marián Boguñá,et al.  Trade-off between virality and mass media influence in the topological evolution of online social networks , 2014, ArXiv.

[17]  Qishan Zhang,et al.  Fast clustering-based anonymization approaches with time constraints for data streams , 2013, Knowl. Based Syst..

[18]  Barbara Carminati,et al.  DIVa: Decentralized identity validation for social networks , 2015, 2015 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM).

[19]  Gang Wang,et al.  Man vs. Machine: Practical Adversarial Detection of Malicious Crowdsourcing Workers , 2014, USENIX Security Symposium.

[20]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[21]  Qiang Cao,et al.  Uncovering Large Groups of Active Malicious Accounts in Online Social Networks , 2014, CCS.

[22]  ASHWIN MACHANAVAJJHALA,et al.  L-diversity: privacy beyond k-anonymity , 2006, 22nd International Conference on Data Engineering (ICDE'06).

[23]  Michael Sirivianos,et al.  Leveraging Social Feedback to Verify Online Identity Claims , 2014, TWEB.

[24]  Moni Naor,et al.  Differential privacy under continual observation , 2010, STOC '10.

[25]  Jianneng Cao,et al.  Publishing Microdata with a Robust Privacy Guarantee , 2012, Proc. VLDB Endow..

[26]  Gang Wang,et al.  Social Turing Tests: Crowdsourcing Sybil Detection , 2012, NDSS.

[27]  Lakshminarayanan Subramanian,et al.  Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.

[28]  Vitaly Shmatikov,et al.  The cost of privacy: destruction of data-mining utility in anonymized data publishing , 2008, KDD.

[29]  Markus Strohmaier,et al.  Understanding the impact of socialbot attacks in online social networks , 2014, ArXiv.

[30]  Barbara Carminati,et al.  Graph Based Local Risk Estimation in Large Scale Online Social Networks , 2015, 2015 IEEE International Conference on Smart City/SocialCom/SustainCom (SmartCity).

[31]  Cao Xiao,et al.  Detecting Clusters of Fake Accounts in Online Social Networks , 2015, AISec@CCS.

[32]  Kian-Lee Tan,et al.  CASTLE: A delay-constrained scheme for ks-anonymizing data streams , 2008, 2008 IEEE 24th International Conference on Data Engineering.

[33]  Michael Sirivianos,et al.  Aiding the Detection of Fake Accounts in Large Scale Social Online Services , 2012, NSDI.

[34]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[35]  Krishna P. Gummadi,et al.  Towards Detecting Anomalous User Behavior in Online Social Networks , 2014, USENIX Security Symposium.

[36]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[37]  Xiongcai Cai,et al.  Collaborative Filtering for People to People Recommendation in Social Networks , 2010, Australasian Conference on Artificial Intelligence.

[38]  Urs Gasser,et al.  Teens, social media, and privacy , 2013 .

[39]  Thomas M. Cover,et al.  Elements of Information Theory , 2005 .

[40]  Brendan T. O'Connor,et al.  Cheap and Fast – But is it Good? Evaluating Non-Expert Annotations for Natural Language Tasks , 2008, EMNLP.

[41]  Vitaly Shmatikov,et al.  Myths and fallacies of "Personally Identifiable Information" , 2010, Commun. ACM.

[42]  Cynthia Dwork,et al.  Differential Privacy: A Survey of Results , 2008, TAMC.

[43]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[44]  S. Vijayarani,et al.  Analysis of privacy preserving K-anonymity methods and techniques , 2010, 2010 International Conference on Communication and Computational Intelligence (INCOCCI).

[45]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).

[46]  Konstantin Beznosov,et al.  The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.

[47]  Beng Chin Ooi,et al.  CDAS: A Crowdsourcing Data Analytics System , 2012, Proc. VLDB Endow..

[48]  Stathes Hadjiefthymiades,et al.  Facing the cold start problem in recommender systems , 2014, Expert Syst. Appl..

[49]  Ninghui Li,et al.  Provably Private Data Anonymization: Or, k-Anonymity Meets Differential Privacy , 2011, ArXiv.

[50]  Ling Huang,et al.  Predicting Links and Inferring Attributes using a Social-Attribute Network (SAN) , 2011, ArXiv.

[51]  Gang Wang,et al.  Northeastern University , 2021, IEEE Pulse.

[52]  Yufei Tao,et al.  Dynamic anonymization: accurate statistical analysis with privacy preservation , 2008, SIGMOD Conference.

[53]  Thomas J. Carter,et al.  An introduction to information theory and entropy , 2007 .

[54]  Derek E. Bambauer Privacy Versus Security , 2013 .

[55]  Prateek Mittal,et al.  SybilBelief: A Semi-Supervised Learning Approach for Structure-Based Sybil Detection , 2013, IEEE Transactions on Information Forensics and Security.

[56]  Joseph S. Dumas,et al.  User-based evaluations , 2002 .

[57]  Christos Faloutsos,et al.  CatchSync: catching synchronized behavior in large directed graphs , 2014, KDD.

[58]  Narendra M. Shekokar,et al.  At a Glance of Sybil Detection in OSN , 2015, 2015 IEEE International Symposium on Nanoelectronic and Information Systems.

[59]  Silvio Lattanzi,et al.  SoK: The Evolution of Sybil Defense via Social Networks , 2013, 2013 IEEE Symposium on Security and Privacy.

[60]  Chris Clifton,et al.  On syntactic anonymity and differential privacy , 2013, 2013 IEEE 29th International Conference on Data Engineering Workshops (ICDEW).

[61]  Vijay S. Iyengar,et al.  Transforming data to satisfy privacy constraints , 2002, KDD.

[62]  Gianluca Stringhini,et al.  Stepping Up the Cybersecurity Game: Protecting Online Services from Malicious Activity , 2014 .

[63]  Anh Duc Duong,et al.  Addressing cold-start problem in recommendation systems , 2008, ICUIMC '08.

[64]  Gang Wang,et al.  Serf and turf: crowdturfing for fun and profit , 2011, WWW.

[65]  Barbara Carminati,et al.  Community-Based Identity Validation on Online Social Networks , 2014, 2014 IEEE 34th International Conference on Distributed Computing Systems.

[66]  Philip S. Yu,et al.  Top-down specialization for information and privacy preservation , 2005, 21st International Conference on Data Engineering (ICDE'05).