Title
Limiting Fake Accounts In Large-Scale Distributed Systems Through Adaptive Identity Management
Abstract
Various online, networked systems offer a lightweight process for obtaining identities (e.g., confirming a valid e-mail address), so that users can easily join them. Such convenience comes with a price, however: with minimum effort, an attacker can subvert the identity management scheme in place, obtain a multitude of fake accounts, and use them for malicious purposes. In this work, we approach the issue of fake accounts in large-scale, distributed systems, by proposing a framework for adaptive identity management. Instead of relying on users' personal information as a requirement for granting identities (unlike existing proposals), our key idea is to estimate a trust score for identity requests, and price them accordingly using a proof of work strategy. The research agenda that guided the development of this framework comprised three main items: (i) investigation of a candidate trust score function, based on an analysis of users' identity request patterns, (ii) combination of trust scores and proof of work strategies (e.g. cryptograhic puzzles) for adaptively pricing identity requests, and (iii) reshaping of traditional proof of work strategies, in order to make them more resource-efficient, without compromising their effectiveness (in stopping attackers).
Year
Venue
Keywords
2015
PROCEEDINGS OF THE 2015 IFIP/IEEE INTERNATIONAL SYMPOSIUM ON INTEGRATED NETWORK MANAGEMENT (IM)
Identity management, peer-to-peer, fake accounts, collusion attacks, proof of work, and sybil attack
Field
DocType
Citations 
Internet privacy,Computer security,Cryptography,Computer science,Computer network,Identity management,Personally identifiable information,Score,Distributed computing,Proof-of-work system,Multitude,Sybil attack,Limiting
Conference
0
PageRank 
References 
Authors
0.34
40
2
Name
Order
Citations
PageRank
Weverton Luis da Costa Cordeiro19912.10
Luciano Paschoal Gaspary243352.11