A Framework for User Identity Resolutions across Social Networks

Authors

  • Suhail Iqbal Bhat  PG Department of IT, BGSB University, Rajouri, Jammu and Kashmir,India
  • Tasleem Arif  PG Department of IT, BGSB University, Rajouri, Jammu and Kashmir,India
  • Majid Bashir Malik  Department of Computer Sciences, BGSB University, Rajouri, Jammu and Kashmir, India

Keywords:

Online Social Network(OSN); Identity Resolution; Profile; Machile Learning; Facebook; Twitter

Abstract

Today, over 2.62 billion people are active social media users accounting to one-third of the world’s population. There exist hundreds of online social networking sites offering different services and functionality to their fellow user, however few among them are the most popular like Facebook, Twitter, Instagram and LinkedIn. Social networks are designed to address specific social needs, offering a distinct set of services and functionality. In order to enjoy the diverse range of services and to cover different facets of life, a user often registers on multiple social networks resulting in dissimilar identities of same users. The process of finding and linking those similar but disconnected identities of an individual scattered across social networks is termed as Identity Resolution or User identity Linkage. It has a significant impact on various problem domains such as recommendations, target marketing, user profiling, impersonator detection, etc. In this paper we propose a framework to the identity resolution problem. We also discuss various challenges of linking user’s identities across online social networks.

References

  1. Amrendra, S, “Visualization and Detection of Multiple Aliases in Social Media”. Master’s Thesis, Upsala University, Sweden, 2013
  2. Arvind N., and Vitaly S., “Deanonymizing social networks.”, In ISSP, 2009
  3. Arvind. N., Hristo, P., Neil, Z., G., and John, B.,“On the feasibility of internet-scale author identification,” in 2012 IEEE Symposium on Security and privacy (SP), 2012, pp. 300 –314
  4. Bilgic, M., Licamele, L., Getoor, L., and Shneiderman. B., “D-dupe: An interactive tool for entity resolution in social networks”, In2006 IEEE Symposium on Visual Analytics Science and Technology, 2006
  5. Brocardo, M. L., Traore, I., Saad, S. and Woungan, I., "Authorship verification for short messages using stylometry". 2013 International Conference on Computer, Information and Telecommunication Systems (CITS), Athens, 2013, pp. 1-6.
  6. Christopher R., Yunsung K., Augustin C., Nitish K., and Silvio L., “Linking users across domains with location data: Theory and validation”. In WWW, 2016
  7. Fedrick, J., Lisa, K., and Amrendra, S., "Time Profiles for Identifying Users in Online Environments," 2014 IEEE Joint Intelligence and Security Informatics Conference, The Hague, 2014, pp. 83-90.
  8. Fong, S., Zhuang, Y., and J. He, "Not every friend on a social network can be trusted: Classifying imposters using decision trees," The First International Conference on Future Generation Communication Technologies, London,2012,pp.58-6
  9. Goga, O., Perito, D., Lei, H., Teixeira, R., & Sommer, R, “Large-scale correlation of accounts across social networks”. University of California at Berkeley, Berkeley, California, Tech. Rep. TR-13-002, 2013
  10. Jain, P., “Automated Methods for Identity Resolution across Online Social Networks”. Doctorate Thesis, Indraprastha Institute of Information Technology Delhi, 2016
  11. Jiexun, L., and Alan, W., "Criminal identity resolution using social behavior and relationship attributes," Proceedings of 2011 IEEE International Conference on Intelligence and Security Informatics, Beijing, 2016, pp. 173-175
  12. Limgfenu, Niu, Jiamin, W., and Yong, S.,"Entity Resolution with Attribute and Connection Graph," 2011 IEEE 11th International Conference on Data Mining Workshops, Vancouver, BC, 2011, pp. 267-271
  13. Michail, T., "Identity Deception Prevention Using Common Contribution Network Data," in IEEE Transactions on Information Forensics and Security, vol. 12, no. 1, Jan. 2015, pp. 188-199
  14. Michail, T., and Sherali, Z., "Multiple Account Identity Deception Detection in Social Media Using Nonverbal Behavior," in IEEE Transactions on Information Forensics and Security, vol. 9, no. 8, Aug. 2014, pp. 1311-1321,
  15. Neil, Z., G, Wenchang, X., Ling H., Prateek, M., Emil S., Vyas, S., and Dawn S.,”Evolution of social-attribute networks: Measurements modeling, and implications using google+”. In Proceedings of the 2012 ACM Conference on Internet Measurement Conference, IMC ’12, 2012,pp. 131–144
  16. Novak J., Raghavan P., and Tomkins A., “Anti-aliasing on the web,” in Proceedings of the 13th international conference on World Wide Web. New York, NY, USA: ACM, ,2004, pp. 30–39
  17. Nunes, A., Calado, P., & Martins, B. “Resolving User Identities over Social Networks Through Supervised Learning and Rich Similarity Features”. In Proceedings of the 27th Annual ACM Symposium on Applied Computing, 2012, pp. 728–729.
  18. Oana G., Howard L., Sree H., Gerald F., Robin S., and Renata F. “Exploiting innocuous activity for correlating users across sites”, In WWW, 2013
  19. Oana G., Patrick L., Robin S., Renata T., and Krishna P G., “On the reliability of profile matching across large online social networks”. In KDD, 2015
  20. Pew Research Center, Social Media Matrix. http://www.pewinternet.org/2015/01/09/social-media-update- 014/pi_2015- 01-09_social-media_10/ [Online; accessed 18-March-2018]
  21. Reza Z., and Huan L., Connecting users across social media sites: a behavioral-modeling approach, In KDD, 2013
  22. Reza, S. and Abdolreza, A., "Identity matching in social media platforms," 2013 International Symposium on Performance Evaluation of Computer and Telecommunication Systems (SPECTS), Toronto, ON, 2013, 2013, pp. 64-7
  23. Rong, Z., Jiexun, L., Hsinchun, C., and Zan, H.,”A framework for authorship identification of online messages: Writing-style features and classification techniques”. J. Am. Soc. Inf. Sci. Technol., 57(3):378 -393, ISSN 1532-2882, 2006
  24. Lebastian L., Irina T., and Hannes H.’” What your friends tell others about you: Low cost linkability of social network profiles”.In KDD, 2011
  25. Sergey B., Anton K., Seung P., Wonho R., and HyungdongLee., “Joint Link-attribute user identity resolution in online social networks”. In SNAKDD Workshop, 2012
  26. Soryani, and Minaei, B., “Social Networks Research Aspects: A Vast and Fast Survey Focused on the Issue of Privacy in Social Network Sites”, arXiv preprint arXiv:1201.3745, 2012
  27. Stastista, Most famous social network sites worldwide as of January 2018. https://www.statista.com/statistics/272014/global-social-networks-ranked by-number-of-Users/ [Online; accessed 18-March-2018]
  28. Tereza I., Peter F., Fabian A., and Kerstin B., “Identifying users across social tagging systems”, In ICWSM, 2011
  29. Vosoughi, S., Zhou, H., and Roy, D.,“Digital Stylometry: Linking Profiles Across Social Networks”. Social Informatics: 7th International Conference, SocInfo 2015, Beijing, China, December 9-12, 2015, Proceedings pp. 164–177.inbook, Cham: Springer International Publishin
  30. William C., Pradeep R., and Stephen F., “A comparison of string metrics for matching names and records”.In KDD, 2003
  31. Xiaoping Z., Xun L., Haiyan Z., and Yuefege M., “Cross-platform identification of anonymous identical users in multiple social media networks”. IN TKDE, 2016
  32. Xin M., Feida Z., Zhi-Hua Z., and Jianzong W., “User identity linkage by latent user space modeling” In KDD, 2013
  33. [33] Yilin S., and Hongxia J., “Controllable information sharing for user accounts linkage across multiple online social networks”. In CIKM, 2014

Downloads

Published

2018-04-25

Issue

Section

Research Articles

How to Cite

[1]
Suhail Iqbal Bhat, Tasleem Arif, Majid Bashir Malik, " A Framework for User Identity Resolutions across Social Networks, IInternational Journal of Scientific Research in Computer Science, Engineering and Information Technology(IJSRCSEIT), ISSN : 2456-3307, Volume 4, Issue 1, pp.307-313, March-April-2018.