International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I

Research Article

Social Authentication Identity: An Alternate to Internet Real Name System

Download
302 downloads
  • @INPROCEEDINGS{10.1007/978-3-319-23829-6_10,
        author={Chengcheng Shao and Liang Chen and Shuo Fan and Xinwen Jiang},
        title={Social Authentication Identity: An Alternate to Internet Real Name System},
        proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I},
        proceedings_a={SECURECOMM},
        year={2015},
        month={11},
        keywords={Online social network Social authentication Real name system Sybil defend Network surveillance},
        doi={10.1007/978-3-319-23829-6_10}
    }
    
  • Chengcheng Shao
    Liang Chen
    Shuo Fan
    Xinwen Jiang
    Year: 2015
    Social Authentication Identity: An Alternate to Internet Real Name System
    SECURECOMM
    Springer
    DOI: 10.1007/978-3-319-23829-6_10
Chengcheng Shao1,*, Liang Chen1,*, Shuo Fan1,*, Xinwen Jiang1,*
  • 1: National University of Defense Technology
*Contact email: sccotte@gmail.com, chl160@163.com, fanshuo_ben@sina.com, xinwenjiang@sina.com

Abstract

Rumors and defamation are now becoming a main threat to Online Social Networks (OSNs). To prevent them, Real Name System (RNS) was proposed, but has been proved vulnerable by the data leakage in South Korea. In this paper, we propose a new identity model, Social Authentication Identity (SAI), to trace rumor-makers. In SAI, only a small number of users (called s) are required to be authenticated by RNS. And the others are authenticated by vouching of friends, called social authentication. We evaluate factors that affect the efficiency of SAI. Results show that selecting s in communities are the best strategy, comparing with random and maximum degree strategies. We also provide an social tracing mechanism to trace down rumor-makes. Analysis shows our social tracing is robust enough to defend Sybil attacks.