Identifying Users Across Multiple Online Social Networks

Authors

  • N. Chandramouli  CSEIT1726267,Department of CSE, Vaageswari College of engineering, Karimnagar, Telangana , India
  • Velpula Mounica  M.Tech, Department of CSE, Vaageswari College of engineering, Karimnagar, Telangana , India

Keywords:

Online Social Networks, Identity search, Identity resolution, Privacy, Digital footprint.

Abstract

An online customer joins different casual groups to acknowledge assorted organizations. On each joined relational association, she makes an identity and constitutes its three imperative estimations specifically profile, substance and affiliation orchestrate. She, as it were, supervises her character definition on any casual group and likewise can control various parts of it. With no overall identifier to stamp her quality especially in the online space, her online identities remain unlinked, isolated and difficult to look for. Composing has proposed identity look for methods in view of profile properties, yet has left the other character estimations e.g. substance and framework, unexplored. In this work, we exhibit two novel character look estimations in perspective of substance and framework qualities and improve standard identity look for computation in perspective of profile attributes of a customer. We apply proposed character look for estimations to find a customer's identity on Facebook, given her character on Twitter. We report that a blend of proposed character check estimations found Facebook identity for 39% of Twitter customers looked for while standard methodology in light of profile properties found Facebook identity for only 27.4%. Each proposed character look estimation get to straightforwardly accessible properties of a customer on any casual association. We send an identity assurance system, Finding Nemo, which uses proposed character look procedures to find a Twitter customer's identity on Facebook. We assume that fuse of more than one identity look for figuring, each manhandling unmistakable dimensional characteristics of a character, helps in improving the accuracy of a character assurance process.

References

  1. M. Motoyama and G. Varghese, "I seek you: searching and matching individuals in social networks," in Proceedings of the eleventh international workshop on Web information and data management, ser. WIDM, 2009.
  2. C. Grier, K. Thomas, V. Paxson, and M. Zhang, "spam: the underground on 140 characters or less," in Proceedings of the ACM conference on Computer and communications security, ser. CCS, 2010.
  3. F. Benevenuto, G. Magno, T. Rodrigues, and V. Almeida, "Detecting spammers on Twitter," in Proceedings of the Annual Collaboration, Electronic messaging, Anti-Abuse and Spam Conference (CEAS), 2010.
  4. Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia, "Who is tweeting on Twitter: human, bot, or cyborg?" in Proceedings of the 26th Annual Computer Security Applications Conference, ser. ACSAC, 2010.
  5. F. Benevenuto, T. Rodrigues, V. Almeida, J. Almeida, and M. Gon¸calves, "Detecting spammers and content promoters in online video social networks," in Proceedings of the 32nd international ACM SIGIR conference on Research and development in information retrieval, ser. SIGIR, 2009.
  6. D. Irani, S. Webb, and C. Pu, "Study of Static Classification of Social Spam Profiles in MySpace," in ICWSM, 2010.
  7. B. Krishnamurthy and C. E. Wills, "On the leakage of personally identifiable information via online social networks," ser. SIGCOMM, 2010.
  8. T. Chen, M. A. Kaafar, A. Friedman, and R. Boreli, "Is More always Merrier?: a Deep Dive into Online Social Footprints," in Proceedings of the ACM Workshop on online social networks, ser. WOSN, 2012.
  9. E. Zheleva and L. Getoor, "To join or not to join: the illusion of privacy in social networks with mixed public and private user profiles," in Proceedings of the 18th international conference on World wide web, ser. WWW, 2009.
  10. O. Goga, H. Lei, S. H. K. Parthasarathi, G. Friedland, RobinSommer, and R. Teixeira, "On exploiting Innocuous User Activity for Correlating Accounts across Social Network Sites," 2012.
  11. M. Shehab, M. N. Ko, and H. Touati, "Social networks Profile Mapping using Games," in Proceedings of the 3rd USENIX conference on Web Application Development, ser. WebApps, 2012.
  12. A. Malhotra, L. Totti, W. Meira, P. Kumaraguru, and V. Almeida, "Studying User Footprints in Different Online Social Networks," International Workshop on Cybersecurity of Online Social Network (CSOSN), 2012.
  13. D. Irani, S. Webb, K. Li, and C. Pu, "Large Online Social Footprints-An Emerging Threat," in Proceedings of the 2009 International Conference on Computational Science and Engineering, ser. CSE, 2009.
  14. D. Perito, C. Castelluccia, M. A. K aafar, and P. Manils, "How Unique and Traceable Are Usernames?" in PETS, 2011.
  15. M. Szomszor, I. Cantador, E. P. Superior, and H. Alani, "Correlating user profiles from multiple folksonomies," in In Proceedings of International Conference Hypertext (HT ‘08), 2008.

Downloads

Published

2017-12-31

Issue

Section

Research Articles

How to Cite

[1]
N. Chandramouli, Velpula Mounica, " Identifying Users Across Multiple Online Social Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 2, Issue 6, pp.963-969, November-December-2017.