Title:
Privacy Preserving Grapevines: Capturing Social Network Interactions Using Delegatable Anonymous Credentials

dc.contributor.author Balasubramaniyan, Vijay A.
dc.contributor.author Lee, Younho
dc.contributor.author Ahamad, Mustaque
dc.contributor.corporatename Georgia Institute of Technology. College of Computing
dc.contributor.corporatename Georgia Institute of Technology. School of Computer Science
dc.contributor.corporatename Yeungnam University. Dept. of Information and Communication Engineering
dc.date.accessioned 2009-10-29T20:28:49Z
dc.date.available 2009-10-29T20:28:49Z
dc.date.issued 2009
dc.description.abstract A wide variety of services allow users to meet online and communicate with each other, building new social relationships and reinforcing older ones. Unfortunately, malicious entities can exploit such services for fraudulent activities such as spamming. It is critical that these services protect users from unwanted interactions, especially when new relationships are being established - the introduction problem. The problem of assessing that a social network connection is no longer beneficial is also important due to the dynamic nature of such networks. A large number of new connections are established through existing, weak social ties (for example, friend of a friend). On the other hand, the willingness of a user to continue interactions with an existing relationship is an indication of his or her endorsement of that relationship. The interaction history of a user provides valuable information about both new social network connections and the validity of established ones. However, capturing this interaction history is rife with privacy concerns. In this paper, we create a transferable token framework, based on delegatable anonymous credentials (DAC - Crypto 2009), that captures interaction history in a privacy preserving manner. By using the Groth Sahai proof system, we extend DACs to allow for single use tokens with the ability to identify token double spenders. We show that such tokens can, simultaneously, demonstrate the existence of a social network path and capture the continued validity of a social network connection. We present an implementation of this DAC based token framework and utilize it in a Voice over IP (VoIP) setting to enable legitimate user interactions in the presence of a spammer threat model. Our results indicate that we are able to achieve low false positive and false negative rates for realistic threat scenarios without disclosing a user’s social network connections. en
dc.identifier.uri http://hdl.handle.net/1853/31036
dc.language.iso en_US en
dc.publisher Georgia Institute of Technology en
dc.relation.ispartofseries SCS Technical Report ; GT-CS-09-12 en
dc.subject Interactions en
dc.subject Social networks en
dc.subject Spammers en
dc.subject Tokens en
dc.subject Transactions en
dc.subject Voice over IP (VoIP) en
dc.title Privacy Preserving Grapevines: Capturing Social Network Interactions Using Delegatable Anonymous Credentials en
dc.type Text
dc.type.genre Technical Report
dspace.entity.type Publication
local.contributor.author Ahamad, Mustaque
local.contributor.corporatename College of Computing
local.contributor.corporatename School of Computer Science
local.relation.ispartofseries College of Computing Technical Report Series
local.relation.ispartofseries School of Computer Science Technical Report Series
relation.isAuthorOfPublication ff12601d-fe5b-4a48-8669-1e1e1bc16440
relation.isOrgUnitOfPublication c8892b3c-8db6-4b7b-a33a-1b67f7db2021
relation.isOrgUnitOfPublication 6b42174a-e0e1-40e3-a581-47bed0470a1e
relation.isSeriesOfPublication 35c9e8fc-dd67-4201-b1d5-016381ef65b8
relation.isSeriesOfPublication 26e8e5bc-dc81-469c-bd15-88e6f98f741d
Files
Original bundle
Now showing 1 - 1 of 1
Thumbnail Image
Name:
GT-CS-09-12.pdf
Size:
472.1 KB
Format:
Adobe Portable Document Format
Description:
License bundle
Now showing 1 - 1 of 1
No Thumbnail Available
Name:
license.txt
Size:
1.86 KB
Format:
Item-specific license agreed upon to submission
Description: