skip to main content
10.1145/2567948.2577208acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
poster

Defending against user identity linkage attack across multiple online social networks

Published:07 April 2014Publication History

ABSTRACT

We study the first countermeasure against user identity linkage attack across multiple online social networks (OSNs). Our goal is to keep as much as user's information in public and meanwhile prevent their identities from being linked on different OSNs via k-anonymity. We develop a novel greedy algorithm, incorporating an efficient manner to compute the greedy function, and validate it in terms of both solution quality and robustness using real-world datasets.

References

  1. L. Bilge, T. Strufe, D. Balzarotti, and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of WWW '09, pages 551--560, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. D. Irani, S. Webb, K. Li, and C. Pu. Large online social footprints--an emerging threat. In Proceedings of CSE '09}, pages 271--276, Washington, DC, USA, 200 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Defending against user identity linkage attack across multiple online social networks

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      WWW '14 Companion: Proceedings of the 23rd International Conference on World Wide Web
      April 2014
      1396 pages
      ISBN:9781450327459
      DOI:10.1145/2567948

      Copyright © 2014 Copyright is held by the owner/author(s)

      Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for third-party components of this work must be honored. For all other uses, contact the Owner/Author.

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 7 April 2014

      Check for updates

      Qualifiers

      • poster

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader