strengthening weak identities through inter domain trust
play

Strengthening Weak Identities Through Inter-Domain Trust Transfer - PowerPoint PPT Presentation

Strengthening Weak Identities Through Inter-Domain Trust Transfer Giridhari Venkatadri, Oana Goga , Changtao Zhong, Bimal Viswanath, Nishanth Sastry, Krishna Gummadi Online


  1. Strengthening Weak Identities Through Inter-Domain Trust Transfer Giridhari ¡Venkatadri, ¡ Oana ¡Goga , ¡Changtao ¡Zhong, ¡Bimal ¡ Viswanath, ¡Nishanth ¡Sastry, ¡Krishna ¡Gummadi ¡ ¡

  2. Online identity-infrastructures oana.goga@mpi-sws.org Trusted certificate Trusted certificate weak strong identity-infrastructure identity-infrastructure 2

  3. Online identity-infrastructures oana.goga@mpi-sws.org Trusted certificate Trusted certificate weak strong identity-infrastructure identity-infrastructure Accountability Anonymity Adoption Resistance to fake identity attacks 2

  4. Online identity-infrastructures oana.goga@mpi-sws.org Trusted certificate Trusted certificate weak strong identity-infrastructure identity-infrastructure Up to 40% of newly Accountability created identities on Twitter are malicious!! Anonymity Adoption Resistance to fake identity attacks 2

  5. Online identity-infrastructures oana.goga@mpi-sws.org Challenge: How to reason about the Trusted certificate Trusted certificate weak strong identity-infrastructure trustworthiness of weak identities? identity-infrastructure Up to 40% of newly Accountability created identities on Twitter are malicious!! Anonymity Adoption Resistance to fake identity attacks 2

  6. Limitations of current technique Current techniques: Based on the past activity of each identity within the domain Limitation: Domains need to observe the behavior of weak identities over time (time lag) • Malicious users can still exploit new identities to misbehave • Honest users must wait to acquire access to resources (e.g., Reddit posting quotas) 3

  7. Key idea Strengthen weak identities through inter-domain trust-transfer Trusted certificate 4

  8. Key idea Strengthen weak identities through inter-domain trust-transfer Trusted certificate ‣ Use the weak identities of users on other domains as external trust certificates 4

  9. Why would this actually work? 1. Many hones users maintain weak identities on multiple domains and they already interconnect their identities (e.g., social login) 2. Malicious attackers would incur additional costs 3. More established domains could provide good trust references for newer domains 5

  10. This talk 1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation 6

  11. This talk 1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation 6

  12. Potential for inter- domain trust transfer Can activity signals from Facebook and Twitter help Pinterest reason about trustworthiness better? Dataset • 1.7M random identities on Pinterest, and their matching identities on Facebook and Twitter • Activity signals computed based on public data on Twitter and Facebook (e.g., account age, # followers, suspension) • Diverse set of untrustworthy identities on Pinterest 7

  13. Source domain and trustworthiness activity signal (untrustworthiness on Pinterest) 8

  14. Source domain and trustworthiness activity signal Correlation between untrustworthiness on Pinterest and the choice of the source domain! (untrustworthiness on Pinterest) 8

  15. Suspension signal and trustworthiness 0.6 Fraction of identities Facebook 0.5 Twitter activity signal suspended 0.4 0.3 0.2 0.1 0 0 0.05 0.1 0.15 >0.2 Fraction of blocked pins (untrustworthiness on Pinterest) 9

  16. Suspension signal and trustworthiness 0.6 Fraction of identities Facebook 0.5 Twitter activity signal suspended 0.4 Untrustworthy Pinterest identities are more likely to be suspended on Twitter 0.3 (but not on Facebook!) 0.2 0.1 0 0 0.05 0.1 0.15 >0.2 Fraction of blocked pins (untrustworthiness on Pinterest) 9

  17. This talk 1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation 10

  18. This talk 1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation 10

  19. Inter-domain trust transfer framework Source domains S2 Sn S1 Target domain 11

  20. Inter-domain trust transfer framework Source domains S2 Sn S1 What are the challenges? Target domain 11

  21. 1. How to link the matching identities of a user? Source domains S2 Sn S1 Target domain 12

  22. 1. How to link the matching identities of a user? Source domains S2 Sn S1 Target domain 12

  23. 1. How to link the matching identities of a user? Solution: single sign-on protocols Source domains S2 Sn S1 Target domain 12

  24. 1. How to link the matching identities of a user? Solution: single sign-on protocols Source domains S2 Sn S1 this can be done in an anonymous way as well! Target domain 12

  25. 2. What information to export? Source domains S2 Sn S1 Target domain 13

  26. 2. What information to export? Source domains S2 Sn S1 Inf( ) Target domain 13

  27. 2. What information to export? Ideal information: • Useful for the target domain Source domains • Do not ruin the privacy of users S2 Sn S1 Inf( ) Target domain 13

  28. 2. What information to export? Ideal information: • Useful for the target domain Source domains • Do not ruin the privacy of users S2 Sn S1 Inf( ) Solution: • The target domain can ask the permission of the user (e.g., OAuth) • The source domain only exports coarse grain information Target domain 13

  29. 3. How to interpret and combine the information? Inf( ) Inf( ) 1000 likes 100 followers 14

  30. 3. How to interpret and combine the information? Solution: Target domain needs to do a calibration step Inf( ) (e.g. using a classifier and all available activity signals) Inf( ) 1000 likes 100 followers 14

  31. This talk 1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation 15

  32. This talk 1. Potential for inter-domain trust transfer 2. Inter-domain trust transfer framework 3. Leverage inter-domain trust transfer for identity curation 15

  33. Identity curation Curated set of identities: a set of identities with high probability to be trustworthy Why curate? I. Early access to elevated privileges II. Sybil-resilient content recommendation Question: Can activity signals from Facebook/Twitter help Pinterest: • Curate more identities? • Curate identities early-on? 16

  34. Pinterest can curate more identities 0.99 All signals Pinterest signals 0.98 Purity level Random 0.97 0.96 0.95 0.94 0.93 0 10 20 30 40 50 60 70 80 90 100 Coverage 17

  35. Pinterest can curate more identities 0.99 All signals 0.975 Pinterest signals 0.98 Purity level Random 0.97 0.96 0.95 0.94 0.93 0 10 20 30 40 50 60 70 80 90 100 Coverage 17

  36. Pinterest can curate more identities 0.99 All signals 0.975 Pinterest signals 0.98 Purity level Random 0.97 0.96 Trust transfer allows to curate more than twice as many identities !! 0.95 0.94 0.93 0 10 20 30 40 50 60 70 80 90 100 Coverage 17

  37. Pinterest can curate identities early-on 1 CDF of identities Pinterest curated Additionally curated 0.8 0.6 0.4 0.2 0 -5 0 5 10 15 20 25 30 Age in months on Pinterest 18

  38. Pinterest can curate identities early-on 1 CDF of identities Pinterest curated Additionally curated 0.8 0.6 0.4 0.2 0 -5 0 5 10 15 20 25 30 Age in months on Pinterest 18

  39. Pinterest can curate identities early-on 1 CDF of identities Pinterest curated Additionally curated 0.8 0.6 0.4 0.2 Trust transfer allows to curate identities up to 15 months in advance !! 0 -5 0 5 10 15 20 25 30 Age in months on Pinterest 18

  40. Conclusions • Lack of external trust certificates for weak identities could be mitigated by user’s weak identities on other domains • Users can keep their identities anonymous! • Inter-domain trust transfer framework • Low deployment overheads • Without significant loss of privacy • Evaluation on real-world domains is very promising! • Even simple activity signals go a long way 19

Download Presentation
Download Policy: The content available on the website is offered to you 'AS IS' for your personal information and use only. It cannot be commercialized, licensed, or distributed on other websites without prior consent from the author. To download a presentation, simply click this link. If you encounter any difficulties during the download process, it's possible that the publisher has removed the file from their server.

Recommend


More recommend