Abstract
With the rise of social network service (SNS) in recent years, the security of SNS users’ private information has been a concern for the public. However, due to the anonymity of SNS, identity impersonation is hard to be detected and prevented since users are free to create an account with any name they want. Until now, there are few studies about this problem, and none of them can perfectly handle this problem. In this paper, based on an idea from previous work, we combine blockchain technology and security protocol to prevent impersonation in SNS. In our scheme, the defects of complex and duplicated operations in the previous work are improved. And the authentication work of SNS server is also adjusted in order to resist single-point attack. Moreover, the smart contract is introduced to help the whole system runs automatically. Afterward, our proposed scheme is implemented and tested on an Ethereum test network and the result suggests that it is acceptable and suitable for nowadays SNS network.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
https://github.com/witnet/elliptic-curve-solidity. Open-source project under the MIT license.
References
Androulaki, E., et al.: Hyperledger fabric: a distributed operating system for permissioned blockchains. In: Proceedings of the Thirteenth EuroSys Conference, pp. 1–15 (2018)
Bünz, B., Agrawal, S., Zamani, M., Boneh, D.: Zether: towards privacy in a smart contract world. In: Bonneau, J., Heninger, N. (eds.) Financial Cryptography and Data Security. FC 2020. LNCS, vol. 12059, pp. 423–443. Springer, Cham (2020). https://doi.org/10.1007/978-3-030-51280-4_23
Chen, Z., Chen, J., Meng, W.: Threshold identity authentication signature: impersonation prevention in social network services. Concurr. Comput. Pract. Exp., e5787 (2020)
Garfinkel, S.: PGP: Pretty Good Privacy. O’Reilly Media, Inc., Sebastopol (1995)
Goga, O., Venkatadri, G., Gummadi, K.P.: The Doppelgänger bot attack: exploring identity impersonation in online social networks. In: Proceedings of the 2015 Internet Measurement Conference, pp. 141–153. ACM (2015)
Gürsoy, G., Brannon, C.M., Gerstein, M.: Using ethereum blockchain to store and query pharmacogenomics data via smart contracts. BMC Med. Genomics 13, 1–11 (2020)
Hammi, M.T., Hammi, B., Bellot, P., Serhrouchni, A.: Bubbles of trust: a decentralized blockchain-based authentication system for iot. Comput. Secur. 78, 126–142 (2018)
Kirkman, S., Newman, R.: A cloud data movement policy architecture based on smart contracts and the ethereum blockchain. In: 2018 IEEE International Conference on Cloud Engineering (IC2E), pp. 371–377. IEEE (2018)
Kochovski, P., Gec, S., Stankovski, V., Bajec, M., Drobintsev, P.D.: Trust management in a blockchain based fog computing platform with trustless smart oracles. Futur. Gener. Comput. Syst. 101, 747–759 (2019)
Mohanta, B.K., Sahoo, A., Patel, S., Panda, S.S., Jena, D., Gountia, D.: DecAuth: decentralized authentication scheme for IoT device using ethereum blockchain. In: TENCON 2019-2019 IEEE Region 10 Conference (TENCON), pp. 558–563. IEEE (2019)
Nakamoto, S.: Bitcoin: a peer-to-peer electronic cash system. Decentralized Business Review, p. 21260 (2008)
Nuakoh, E.B., Anwar, M.: Detecting impersonation in social network sites (SNS) using artificial immune systems (AIS). In: SoutheastCon 2018, pp. 1–3. IEEE (2018)
Patsonakis, C., Samari, K., Kiayiasy, A., Roussopoulos, M.: On the practicality of a smart contract PKI. In: 2019 IEEE International Conference on Decentralized Applications and Infrastructures (DAPPCON), pp. 109–118. IEEE (2019)
Ramesh, V.K.C.: Storing IoT data securely in a private ethereum blockchain. Ph.D. thesis, University of Nevada, Las Vegas (2019)
Robinson, P.: Using ethereum registration authorities to establish trust for ethereum private sidechains. J. Br. Blockchain Assoc. 1(2), 5055 (2018)
Shamir, A.: How to share a secret. Commun. ACM 22(11), 612–613 (1979)
Tsikerdekis, M., Zeadally, S.: Detecting and preventing online identity deception in social networking services. IEEE Internet Comput. 19(3), 41–49 (2015)
Wang, B., Sun, J., He, Y., Pang, D., Lu, N.: Large-scale election based on blockchain. Procedia Comput. Sci. 129, 234–237 (2018)
Wohrer, M., Zdun, U.: Smart contracts: security patterns in the ethereum ecosystem and solidity. In: 2018 International Workshop on Blockchain Oriented Software Engineering (IWBOSE), pp. 2–8. IEEE (2018)
Wood, G., et al.: Ethereum: a secure decentralised generalised transaction ledger. Ethereum Project Yellow Paper 151(2014), 1–32 (2014)
Acknowledgements
This work was supported by the Grant-in-Aid for Scientific Research (B) (19H04107).
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2022 The Author(s), under exclusive license to Springer Nature Switzerland AG
About this paper
Cite this paper
Chen, Z., Omote, K. (2022). Building a Blockchain-Based Social Network Identification System. In: Barolli, L., Hussain, F., Enokido, T. (eds) Advanced Information Networking and Applications. AINA 2022. Lecture Notes in Networks and Systems, vol 450. Springer, Cham. https://doi.org/10.1007/978-3-030-99587-4_39
Download citation
DOI: https://doi.org/10.1007/978-3-030-99587-4_39
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-030-99586-7
Online ISBN: 978-3-030-99587-4
eBook Packages: Intelligent Technologies and RoboticsIntelligent Technologies and Robotics (R0)