strengthening weak identities through inter-domain trust transfer · 2017-11-03 · inter-domain...

42
Strengthening Weak Identities Through Inter-Domain Trust Transfer Giridhari Venkatadri, Oana Goga, Changtao Zhong, Bimal Viswanath, Nishanth Sastry, Krishna Gummadi

Upload: others

Post on 07-Jul-2020

0 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Strengthening Weak IdentitiesThrough

Inter-Domain Trust Transfer

Giridhari  Venkatadri,  Oana  Goga,  Changtao  Zhong,  Bimal  Viswanath,  Nishanth  Sastry,  Krishna  Gummadi    

Page 2: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Trustworthiness of online identities

2

Page 3: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Trustworthiness of online identities

Trustworthiness of an identity: The likelihood that the identity will respect the terms of service (ToS) of its

domain in the future

2

Page 4: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Online identity-infrastructures

3

Trusted certificate weak

identity-infrastructure

Trusted certificate [email protected]

strong identity-infrastructure

Page 5: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Online identity-infrastructures

3

Accountability

Anonymity

Adoption

Resistance to fake identity attacks

Trusted certificate weak

identity-infrastructure

Trusted certificate [email protected]

strong identity-infrastructure

Page 6: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Online identity-infrastructures

3

Accountability

Anonymity

Adoption

Resistance to fake identity attacks

Trusted certificate weak

identity-infrastructure

Trusted certificate [email protected]

strong identity-infrastructure

Up to 40% of newly created identities on

Twitter are malicious!!

Page 7: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Online identity-infrastructures

3

Accountability

Anonymity

Adoption

Resistance to fake identity attacks

Trusted certificate weak

identity-infrastructure

Trusted certificate [email protected]

strong identity-infrastructure

Up to 40% of newly created identities on

Twitter are malicious!!

Challenge: How to reason about the trustworthiness of weak identities?

Page 8: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Trustworthiness of weak identities

Current techniques: Based on the past activity of each identity within the domain

Limitation: Domains need to observe the behavior of weak identities over time (time lag)

• Malicious users can still exploit new identities to misbehave

• Honest users must wait to acquire access to resources (e.g., Reddit posting quotas)

4

Page 9: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Key idea

Strengthen weak identities through

inter-domain trust-transfer

5

Trusted certificate

Page 10: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Key idea

Strengthen weak identities through

inter-domain trust-transfer

5

Trusted certificate

‣ Use the weak identities of users on other domains as external trust certificates

Page 11: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Why would this work?

1. Many hones users maintain weak identities on multiple domains

2. Users already interconnect their identities (e.g., social login)

3. Malicious attackers would incur additional costs

4. More established domains could provide good trust references for newer domains

6

Page 12: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

This talk

1. Potential for inter-domain trust transfer

2. Inter-domain trust transfer framework

3. Leverage inter-domain trust transfer for identity curation

7

Page 13: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

This talk

1. Potential for inter-domain trust transfer

2. Inter-domain trust transfer framework

3. Leverage inter-domain trust transfer for identity curation

7

Page 14: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Potential for inter-domain trust transferCan activity signals from Facebook and Twitter help

Pinterest reason about trustworthiness better?

Dataset• 1.7M random identities on Pinterest, and their

matching identities on Facebook and Twitter• Activity signals computed based on public data on

Twitter and Facebook (e.g., account age, # followers, suspension)

• Diverse set of untrustworthy identities on Pinterest

8

Page 15: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Source domain and trustworthiness

9

(untrustworthiness on Pinterest)

activ

ity s

igna

l

Page 16: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Source domain and trustworthiness

9

Correlation between untrustworthiness on Pinterest and the choice of the source domain!

(untrustworthiness on Pinterest)

activ

ity s

igna

l

Page 17: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Suspension signal and trustworthiness

10

0

0.1

0.2

0.3

0.4

0.5

0.6

>0.2 0 0.05 0.1 0.15

Fra

cti

on

of

ide

nti

tie

s

su

spe

nd

ed

Fraction of blocked pins

FacebookTwitter

(untrustworthiness on Pinterest)

activ

ity s

igna

l

Page 18: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Suspension signal and trustworthiness

10

0

0.1

0.2

0.3

0.4

0.5

0.6

>0.2 0 0.05 0.1 0.15

Fra

cti

on

of

ide

nti

tie

s

su

spe

nd

ed

Fraction of blocked pins

FacebookTwitter

Untrustworthy Pinterest identities are more likely to be suspended on Twitter

(but not on Facebook!)

(untrustworthiness on Pinterest)

activ

ity s

igna

l

Page 19: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

This talk

1. Potential for inter-domain trust transfer

2. Inter-domain trust transfer framework

3. Leverage inter-domain trust transfer for identity curation

11

Page 20: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

This talk

1. Potential for inter-domain trust transfer

2. Inter-domain trust transfer framework

3. Leverage inter-domain trust transfer for identity curation

11

Page 21: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Inter-domain trust transfer framework

12

Target domain

Source domains

SnS2

S1

Page 22: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Inter-domain trust transfer framework

12

Target domain

Source domains

SnS2

S1

What are the challenges?

Page 23: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

1. How to link the matching identities of a user?

13

Target domain

Source domains

SnS2

S1

Page 24: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

1. How to link the matching identities of a user?

13

Target domain

Source domains

SnS2

S1

Page 25: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

1. How to link the matching identities of a user?

13

Target domain

Source domains

SnS2

S1

Solution: single sign-on protocols

Page 26: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

1. How to link the matching identities of a user?

13

Target domain

Source domains

SnS2

S1

this can be done in an anonymous way as well!

Solution: single sign-on protocols

Page 27: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

2. What information to export?

14

Target domain

Source domains

SnS2

S1

Page 28: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

2. What information to export?

14

Target domain

Source domains

SnS2

S1

Inf( )

Page 29: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

2. What information to export?

14

Target domain

Source domains

SnS2

S1

Ideal information:• Useful for the target domain• Do not ruin the privacy of users

Inf( )

Page 30: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

2. What information to export?

14

Target domain

Source domains

SnS2

S1

Ideal information:• Useful for the target domain• Do not ruin the privacy of users

Inf( )

Solution:• Each source domain can choose the

information it wants to transfer• The source domain can ask the

permission of the user (e.g., OAuth)• Break correlation with possible

sensitive information (e.g., l-diversity, t-closeness)

Page 31: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

3. How to interpret and combine the information?

15

Inf( ) Inf( )

100 followers 1000 likes

Page 32: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

3. How to interpret and combine the information?

15

Inf( ) Inf( )

100 followers 1000 likes

Solution: Target domain needs to do a calibration step (e.g. using a classifier and all available activity signals)

Page 33: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

This talk

1. Potential for inter-domain trust transfer

2. Inter-domain trust transfer framework

3. Leverage inter-domain trust transfer for identity curation

16

Page 34: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

This talk

1. Potential for inter-domain trust transfer

2. Inter-domain trust transfer framework

3. Leverage inter-domain trust transfer for identity curation

16

Page 35: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Identity curation

Curated set of identities: a set of identities with high probability to be trustworthy

Why curate?I. Early access to elevated privileges II. Sybil-resilient content recommendation

Question: Can activity signals from Facebook/Twitter help Pinterest:

• Curate more identities?• Curate identities early-on?

17

Page 36: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Pinterest can curate more identities

18

0.93

0.94

0.95

0.96

0.97

0.98

0.99

0 10 20 30 40 50 60 70 80 90 100

Purity

leve

l

Coverage

All signalsPinterest signals

Random

Page 37: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Pinterest can curate more identities

18

0.93

0.94

0.95

0.96

0.97

0.98

0.99

0 10 20 30 40 50 60 70 80 90 100

Purity

leve

l

Coverage

All signalsPinterest signals

Random0.975

Page 38: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Pinterest can curate more identities

18

0.93

0.94

0.95

0.96

0.97

0.98

0.99

0 10 20 30 40 50 60 70 80 90 100

Purity

leve

l

Coverage

All signalsPinterest signals

Random

Trust transfer allows to curate more than twice as many identities !!

0.975

Page 39: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Pinterest can curate identities early-on

19

0

0.2

0.4

0.6

0.8

1

-5 0 5 10 15 20 25 30

CD

F of

iden

titie

s

Age in months on Pinterest

Pinterest curatedAdditionally curated

Page 40: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Pinterest can curate identities early-on

19

0

0.2

0.4

0.6

0.8

1

-5 0 5 10 15 20 25 30

CD

F of

iden

titie

s

Age in months on Pinterest

Pinterest curatedAdditionally curated

Page 41: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Pinterest can curate identities early-on

19

0

0.2

0.4

0.6

0.8

1

-5 0 5 10 15 20 25 30

CD

F of

iden

titie

s

Age in months on Pinterest

Pinterest curatedAdditionally curated

Trust transfer allows to curate identities up to 15 months in advance !!

Page 42: Strengthening Weak Identities Through Inter-Domain Trust Transfer · 2017-11-03 · Inter-Domain Trust Transfer Giridhari’Venkatadri, ... Accountability Anonymity Adoption Resistance

Conclusions

• Lack of external trust certificates for weak identities could be mitigated by user’s weak identities on other domains

• Users can keep their identities anonymous!• Inter-domain trust transfer framework

• Low deployment overheads• Without significant loss of privacy

• Evaluation on real-world domains is very promising!• Even simple activity signals go a long way

20