Information revelation and privacy in online social networks
Proceedings of the 2005 ACM workshop on Privacy in the electronic society
Privacy-enhanced sharing of personal content on the web
Proceedings of the 17th international conference on World Wide Web
Proceedings of the 18th international conference on World wide web
All your contacts are belong to us: automated identity theft attacks on social networks
Proceedings of the 18th international conference on World wide web
Strategies and struggles with privacy in an online social networking community
BCS-HCI '08 Proceedings of the 22nd British HCI Group Annual Conference on People and Computers: Culture, Creativity, Interaction - Volume 1
Privacy stories: confidence in privacy behaviors through end user programming
Proceedings of the 5th Symposium on Usable Privacy and Security
A formal model for emerging coalitions under network influence in humanitarian relief coordination
SpringSim '09 Proceedings of the 2009 Spring Simulation Multiconference
Privacy wizards for social networking sites
Proceedings of the 19th international conference on World wide web
Abusing social networks for automated user profiling
RAID'10 Proceedings of the 13th international conference on Recent advances in intrusion detection
SOCIALCOM '10 Proceedings of the 2010 IEEE Second International Conference on Social Computing
Towards active detection of identity clone attacks on online social networks
Proceedings of the first ACM conference on Data and application security and privacy
Exploiting innocuous activity for correlating users across sites
Proceedings of the 22nd international conference on World Wide Web
Hi-index | 12.05 |
Recently, on-line social networking sites become more and more popular. People like to share their personal information such as their name, birthday and photos on these public sites. However, personal information could be misused by attackers. One kind of attacks called Identity Theft Attack is addressed in on-line social networking sites. After collecting the personal information of a victim, the attacker can create a fake identity to impersonate this victim and cheat the victim's friends in order to destroy the trust relationships on the on-line social networking sites. In this paper, we propose a scheme to protect users from Identity Theft Attacks. In our work, users' personal information can be still kept public. It means that this scheme does not violate the nature of the social networks. Compared with previous works, the proposed scheme incurs less overhead for users. Experimental results also demonstrate the practicality of the proposed scheme.