Strengthening Weak Identities Through Inter-Domain Trust Transfer - - PowerPoint PPT Presentation

strengthening weak identities through inter domain trust
SMART_READER_LITE
LIVE PREVIEW

Strengthening Weak Identities Through Inter-Domain Trust Transfer - - PowerPoint PPT Presentation

Strengthening Weak Identities Through Inter-Domain Trust Transfer Giridhari Venkatadri, Oana Goga , Changtao Zhong, Bimal Viswanath, Nishanth Sastry, Krishna Gummadi Online


slide-1
SLIDE 1

Strengthening Weak Identities Through Inter-Domain Trust Transfer

Giridhari ¡Venkatadri, ¡Oana ¡Goga, ¡Changtao ¡Zhong, ¡Bimal ¡ Viswanath, ¡Nishanth ¡Sastry, ¡Krishna ¡Gummadi ¡ ¡

slide-2
SLIDE 2

Online identity-infrastructures

2

Trusted certificate

weak identity-infrastructure

Trusted certificate

  • ana.goga@mpi-sws.org

strong identity-infrastructure

slide-3
SLIDE 3

Online identity-infrastructures

2

Accountability Anonymity Adoption Resistance to fake identity attacks

Trusted certificate

weak identity-infrastructure

Trusted certificate

  • ana.goga@mpi-sws.org

strong identity-infrastructure

slide-4
SLIDE 4

Online identity-infrastructures

2

Accountability Anonymity Adoption Resistance to fake identity attacks

Trusted certificate

weak identity-infrastructure

Trusted certificate

  • ana.goga@mpi-sws.org

strong identity-infrastructure

Up to 40% of newly created identities on Twitter are malicious!!

slide-5
SLIDE 5

Online identity-infrastructures

2

Accountability Anonymity Adoption Resistance to fake identity attacks

Trusted certificate

weak identity-infrastructure

Trusted certificate

  • ana.goga@mpi-sws.org

strong identity-infrastructure

Up to 40% of newly created identities on Twitter are malicious!!

Challenge: How to reason about the trustworthiness of weak identities?

slide-6
SLIDE 6

Limitations of current technique

Current techniques: Based on the past activity of each identity within the domain Limitation: Domains need to observe the behavior of weak identities over time (time lag)

  • Malicious users can still exploit new identities to misbehave
  • Honest users must wait to acquire access to resources

(e.g., Reddit posting quotas)

3

slide-7
SLIDE 7

Key idea

Strengthen weak identities through inter-domain trust-transfer

4

Trusted certificate

slide-8
SLIDE 8

Key idea

Strengthen weak identities through inter-domain trust-transfer

4

Trusted certificate

  • Use the weak identities of users on other domains as

external trust certificates

slide-9
SLIDE 9

Why would this actually work?

  • 1. Many hones users maintain weak identities on multiple domains

and they already interconnect their identities (e.g., social login)

  • 2. Malicious attackers would incur additional costs
  • 3. More established domains could provide good trust references

for newer domains

5

slide-10
SLIDE 10

This talk

1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation

6

slide-11
SLIDE 11

This talk

1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation

6

slide-12
SLIDE 12

Potential for inter- domain trust transfer

Can activity signals from Facebook and Twitter help Pinterest reason about trustworthiness better? Dataset

  • 1.7M random identities on Pinterest, and their

matching identities on Facebook and Twitter

  • Activity signals computed based on public data on

Twitter and Facebook (e.g., account age, # followers, suspension)

  • Diverse set of untrustworthy identities on Pinterest

7

slide-13
SLIDE 13

Source domain and trustworthiness

8

(untrustworthiness on Pinterest) activity signal

slide-14
SLIDE 14

Source domain and trustworthiness

8

Correlation between untrustworthiness on Pinterest and the choice of the source domain! (untrustworthiness on Pinterest) activity signal

slide-15
SLIDE 15

Suspension signal and trustworthiness

9

0.1 0.2 0.3 0.4 0.5 0.6 >0.2 0.05 0.1 0.15

Fraction of identities suspended Fraction of blocked pins

Facebook Twitter

(untrustworthiness on Pinterest) activity signal

slide-16
SLIDE 16

Suspension signal and trustworthiness

9

0.1 0.2 0.3 0.4 0.5 0.6 >0.2 0.05 0.1 0.15

Fraction of identities suspended Fraction of blocked pins

Facebook Twitter

Untrustworthy Pinterest identities are more likely to be suspended on Twitter (but not on Facebook!) (untrustworthiness on Pinterest) activity signal

slide-17
SLIDE 17

This talk

1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation

10

slide-18
SLIDE 18

This talk

1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation

10

slide-19
SLIDE 19

Inter-domain trust transfer framework

11

Target domain Source domains Sn S2 S1

slide-20
SLIDE 20

Inter-domain trust transfer framework

11

Target domain Source domains Sn S2 S1

What are the challenges?

slide-21
SLIDE 21
  • 1. How to link the matching

identities of a user?

12

Target domain Source domains Sn S2 S1

slide-22
SLIDE 22
  • 1. How to link the matching

identities of a user?

12

Target domain Source domains Sn S2 S1

slide-23
SLIDE 23
  • 1. How to link the matching

identities of a user?

12

Target domain Source domains Sn S2 S1

Solution: single sign-on protocols

slide-24
SLIDE 24
  • 1. How to link the matching

identities of a user?

12

Target domain Source domains Sn S2 S1

this can be done in an anonymous way as well! Solution: single sign-on protocols

slide-25
SLIDE 25
  • 2. What information to

export?

13

Target domain Source domains Sn S2 S1

slide-26
SLIDE 26
  • 2. What information to

export?

13

Target domain Source domains Sn S2 S1

Inf( )

slide-27
SLIDE 27
  • 2. What information to

export?

13

Target domain Source domains Sn S2 S1

Ideal information:

  • Useful for the target domain
  • Do not ruin the privacy of users

Inf( )

slide-28
SLIDE 28
  • 2. What information to

export?

13

Target domain Source domains Sn S2 S1

Ideal information:

  • Useful for the target domain
  • Do not ruin the privacy of users

Inf( ) Solution:

  • The target domain can ask the

permission of the user (e.g., OAuth)

  • The source domain only exports

coarse grain information

slide-29
SLIDE 29
  • 3. How to interpret and

combine the information?

14

Inf( ) Inf( ) 100 followers 1000 likes

slide-30
SLIDE 30
  • 3. How to interpret and

combine the information?

14

Inf( ) Inf( ) 100 followers 1000 likes Solution: Target domain needs to do a calibration step (e.g. using a classifier and all available activity signals)

slide-31
SLIDE 31

This talk

1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation

15

slide-32
SLIDE 32

This talk

1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation

15

slide-33
SLIDE 33

Identity curation

Curated set of identities: a set of identities with high probability to be trustworthy Why curate? I. Early access to elevated privileges

  • II. Sybil-resilient content recommendation

Question: Can activity signals from Facebook/Twitter help Pinterest:

  • Curate more identities?
  • Curate identities early-on?

16

slide-34
SLIDE 34

Pinterest can curate more identities

17

0.93 0.94 0.95 0.96 0.97 0.98 0.99 10 20 30 40 50 60 70 80 90 100

Purity level Coverage

All signals Pinterest signals Random

slide-35
SLIDE 35

Pinterest can curate more identities

17

0.93 0.94 0.95 0.96 0.97 0.98 0.99 10 20 30 40 50 60 70 80 90 100

Purity level Coverage

All signals Pinterest signals Random

0.975

slide-36
SLIDE 36

Pinterest can curate more identities

17

0.93 0.94 0.95 0.96 0.97 0.98 0.99 10 20 30 40 50 60 70 80 90 100

Purity level Coverage

All signals Pinterest signals Random

Trust transfer allows to curate more than twice as many identities !!

0.975

slide-37
SLIDE 37

Pinterest can curate identities early-on

18

0.2 0.4 0.6 0.8 1

  • 5

5 10 15 20 25 30

CDF of identities Age in months on Pinterest

Pinterest curated Additionally curated

slide-38
SLIDE 38

Pinterest can curate identities early-on

18

0.2 0.4 0.6 0.8 1

  • 5

5 10 15 20 25 30

CDF of identities Age in months on Pinterest

Pinterest curated Additionally curated

slide-39
SLIDE 39

Pinterest can curate identities early-on

18

0.2 0.4 0.6 0.8 1

  • 5

5 10 15 20 25 30

CDF of identities Age in months on Pinterest

Pinterest curated Additionally curated

Trust transfer allows to curate identities up to 15 months in advance !!

slide-40
SLIDE 40

Conclusions

  • Lack of external trust certificates for weak identities could

be mitigated by user’s weak identities on other domains

  • Users can keep their identities anonymous!
  • Inter-domain trust transfer framework
  • Low deployment overheads
  • Without significant loss of privacy
  • Evaluation on real-world domains is very promising!
  • Even simple activity signals go a long way

19