Research Article
Social Authentication Identity: An Alternate to Internet Real Name System
@INPROCEEDINGS{10.1007/978-3-319-23829-6_10, author={Chengcheng Shao and Liang Chen and Shuo Fan and Xinwen Jiang}, title={Social Authentication Identity: An Alternate to Internet Real Name System}, proceedings={International Conference on Security and Privacy in Communication Networks. 10th International ICST Conference, SecureComm 2014, Beijing, China, September 24-26, 2014, Revised Selected Papers, Part I}, proceedings_a={SECURECOMM}, year={2015}, month={11}, keywords={Online social network Social authentication Real name system Sybil defend Network surveillance}, doi={10.1007/978-3-319-23829-6_10} }
- Chengcheng Shao
Liang Chen
Shuo Fan
Xinwen Jiang
Year: 2015
Social Authentication Identity: An Alternate to Internet Real Name System
SECURECOMM
Springer
DOI: 10.1007/978-3-319-23829-6_10
Abstract
Rumors and defamation are now becoming a main threat to Online Social Networks (OSNs). To prevent them, Real Name System (RNS) was proposed, but has been proved vulnerable by the data leakage in South Korea. In this paper, we propose a new identity model, Social Authentication Identity (SAI), to trace rumor-makers. In SAI, only a small number of users (called s) are required to be authenticated by RNS. And the others are authenticated by vouching of friends, called social authentication. We evaluate factors that affect the efficiency of SAI. Results show that selecting s in communities are the best strategy, comparing with random and maximum degree strategies. We also provide an social tracing mechanism to trace down rumor-makes. Analysis shows our social tracing is robust enough to defend Sybil attacks.