A Big Data Analytic Identity Management Expert System for Social Media Networks by Kudapana Don Buddhima Hansinie Subasinghe.
A presentation given at APNIC 42's Lightning Talks session on Tuesday, 4 October 2016.
7. Identity Management in Social Media
Research Gap
• Observing usage data for identity management by the
network operator violates user privacy
• This has retarded the development of effective identity
management systems in social media
• There’s a research gap to come up with effective and
robust identity management systems without violating
user privacy rights.
17. Methodology
Training Neuro-Fuzzy Classifier
• 5-6 years of usage data from 3 different users
• 24 event sequences per user extracted per activity log
resulting 24x3=72 legitimate event sequences.
• Each 24 legitimate event sequence of a user applied in the
HMM models of the other two users to generate 2x24x3=144
event sequences considered illegitimate.
• Therefore, in total 72+144 = 216 data points for our analysis.
23. References
• Kaplan, Andreas M. and Haenlein, Michael. (2010). Users of the world, unite! The challenges and opportunities of Social
Media. Business Horizons, 53, 59-68.
• R.Schullich,”Risk Assessment of Social Media” GIAC (GSEC) Gold Certification, December 5th
2011
• The Guardian , available at http://www.theguardian.com/technology/2012/aug/02/facebook-83m-profiles-bogus-fake
• Krog,A.(1998), “An Introduction to hidden Markov models for biological sequences”,Computational Methods in Molecular
Biology, pp. 45-63, Elsevier
• S.S. Joshi and V.V Phoha, ‘Investigating Hidden Markov Models Capabilities in Anomaly Detection,” Proc. 43rd
ACM Ann.
Southeast Regional Conf.,vol. 1, pp.45-55, 2014.
• S. Blake, D.L. Black, M.A. Carlson, E. Davies, Z. Wang,W.Weiss, “An Architecture for Differentiated Services,” RFC2475,
Internet Engineering Task Force, Network Working Group, December 1998. Category:
Informational.http://www.ietf.org/html.charters/diffserv-charter.html.
• A. Cabrera, S. Sánchez-Solano, P. Brox, A. Barriga, R.Senhadji. “Hardware/Software Codesign of Configurable FuzzyControl
Systems”. Applied Soft Computing, Vol. 4, n. 3, pp.271-285, December 2014.
• H.C. Cho, M.S. Fadali, H. Lee, “Dynamic Queue Scheduling using Fuzzy Systems for Internet
• Routers,” IEEE International Conference on Fuzzy Systems (FUZZ-IEEE) 2005, Reno, USA,May 2013.
• Cisco Systems, Inc. “Cisco Series 12000 router performance evaluation. 2005.http://www.cisco.com
• G.-J. Ahn, M. Ko, and M. Shehab. Privacy-enhanced user-centric identity management. In IEEE International Conference on
Communications, pages 1–5, 2009.
• A. Rabkin. Personal knowledge questions for fallback authentication: security questions in the era of Facebook. In SOUPS
’08: Proc. of the 4th symposium on Usable privacy and security, pages 13–23, New York, NY, USA, 2008.
• T. W. van der Horst and K. E. Seamons. Simple authentication for the web. In WWW ’07: Proc. of the 16th international
conference on World Wide Web, pages 1217–1218, New York, NY, USA, 2007. ACM.
• P. J. Windley, D. Daley, B. Cutler, and K. Tew. Using reputation to augment explicit authorization. In DIM ’07: Proc. of the 2007
ACM workshop on Digital identity management, pages 72–81, New York, NY,USA, 2007. ACM.
• S. Kruk, S. Grzonkowski, A. Gzella, T. Woroniecki, and H.-C. Choi. D-foaf: Distributed identity management with access rights
delegation. In The Semantic Web – ASWC 2006, volume 4185 of Lecture Notesin Computer Science, chapter 15, pages 140–
154. Springer Berlin Heidelberg, 2006.
• K. Aberer and Z. Despotovic. On reputation in game theory applicationon online settings, 2004. U. D. Farzad Salim, Jason
Reid and E. Dawson. Towards a game theoretic authorisation model. In Proc. of the 1st IEEE Conference on Decision and
Game Theory for Security, 2010.