CFP last date
20 January 2025
Call for Paper
February Edition
IJCA solicits high quality original research papers for the upcoming February edition of the journal. The last date of research paper submission is 20 January 2025

Submit your paper
Know more
Reseach Article

Disambiguation of Identities using User Ranking in Social Networks

by Mohnish Naidu, Sri Khetwat Sarita
International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Volume 48 - Number 24
Year of Publication: 2012
Authors: Mohnish Naidu, Sri Khetwat Sarita
10.5120/7530-0604

Mohnish Naidu, Sri Khetwat Sarita . Disambiguation of Identities using User Ranking in Social Networks. International Journal of Computer Applications. 48, 24 ( June 2012), 29-32. DOI=10.5120/7530-0604

@article{ 10.5120/7530-0604,
author = { Mohnish Naidu, Sri Khetwat Sarita },
title = { Disambiguation of Identities using User Ranking in Social Networks },
journal = { International Journal of Computer Applications },
issue_date = { June 2012 },
volume = { 48 },
number = { 24 },
month = { June },
year = { 2012 },
issn = { 0975-8887 },
pages = { 29-32 },
numpages = {9},
url = { https://ijcaonline.org/archives/volume48/number24/7530-0604/ },
doi = { 10.5120/7530-0604 },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Journal Article
%1 2024-02-06T20:44:57.787741+05:30
%A Mohnish Naidu
%A Sri Khetwat Sarita
%T Disambiguation of Identities using User Ranking in Social Networks
%J International Journal of Computer Applications
%@ 0975-8887
%V 48
%N 24
%P 29-32
%D 2012
%I Foundation of Computer Science (FCS), NY, USA
Abstract

An approach to disambiguate the identity information between a Sybil and a Non-Sybil by using the social circles and weighted graphs is being presented in this paper. The disambiguation is done in two phases the Static phase and the Dynamic phase. In Static phase, the social circles are generated through the extraction and pruning of social networks. In Dynamic phase, the initial parameters are further refined by the use of polling from the other users. The approach provides a methodology to monitor existing identity information, applicable to addressing issues like identity theft, online fraud and lateral surveillance.

References
  1. G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In Proc. NDSS'09, San Diego, CA, Feb 2009.
  2. N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-Resilient Online Content Voting. In Proc. NSDI'09, Boston, MA, Apr 2009.
  3. H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks. In Proc. IEEE S&P, Oakland, CA, May 2008.
  4. H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. SybilGuard: Defending Against Sybil Attacks via Social Networks. In Proc. SIGCOMM'06, Pisa, Italy, Sep 2006.
  5. B. Vishwanath, K. P. Gummadi, A. Post, Alan Mislove : An Analysis of Social Network-Based Sybil Defeses , sep 2010.
  6. S. Fortunato. Community detection in graphs. Physics Reports, 486:75, 2010.
  7. M Rowe, Fabio C. Disambiguating Identity through Social Circles and Social Data.
  8. L Zhang, Z Qin, The improved Pagerank in web crawler.
  9. M. Castro, P. Druschel, A. J. Ganesh, A. I. T. Rowstron, and D. S. Wallach. Secure Routing for Structured Peer-to-Peer Overlay Networks. OSDI, Boston, MA, Dec. 2002.
  10. R. Rodrigues and B. Liskov. Rosebud: A Scalable Byzantine-Fault-Tolerant Storage Architecture. MIT CSAIL, Technical Report TR/932, Dec. 2003.
  11. J. R. Douceur. The Sybil Attack. IPTPS, Cambridge, MA, Mar. 2002.
  12. B. N. Levine, C. Shields, and N. B. Margolin. A Survey of Solutions to the Sybil Attack. University of Massachusetts Amherst, Amherst, MA, 2006.
  13. K. Thirunarayan and P. Anantharam. Trust Networks: Interpersonal, Sensor, and Social. Ohio Center of Excellence in Knowledge-enabled Computing.
  14. M. Rowe, F. Ciravegna. Disambiguating identity web references using Web 2. 0 data and semantics. Web Semantics: Science, Services and Agents on the WWW8(2010) 125-142.
  15. A. Cheng, E. Friedman. Manipulability of Page Rank under Sybil Strategies.
  16. S. Qiao, T. Li, H. Li, Y. Zhu, J. Peng, J. Qiu. Simrank: A Page Rank Approach based on Similarity Measure.
  17. L. Zhang, Z. Qin. The improved Page Rank in Web Crawler. ICISE 2009.
  18. A. K. Pal, D. Nath,S. Chakraborty. A Discriminatory Rewarding Mechanism For Sybil Defense with Application to Tor. WASET 63. ET 63, 2010.
Index Terms

Computer Science
Information Sciences

Keywords

Sybil Defense Pagerank Semantic Web Social Network User Rank.