Photo-based authentication using social networks

Sarita Yardi, Nick Feamster, Amy Bruckman

Research output: Chapter in Book/Report/Conference proceedingConference contribution

21 Scopus citations

Abstract

We present Lineup, a system that uses the social network graph in Facebook and auxiliary information (e.g., "tagged" user photos) to build a photo-based Web site authentication framework. Lineup's underlying mechanism leverages the concept of CAPTCHAs, programs that are designed to distinguish bots from human users. Lineup extends this functionality to help a Web site ascertain a user's identity or membership in a certain group (e.g., an interest group, invitees to a certain event) in order to infer some level of trust. Lineup works by presenting a user with photographs and asking the user to identify subjects in the photo whom a user with the appropriate identity or group membership should know. We present the design and implementation for Lineup, describe a preliminary prototype implementation, and discuss Lineup's security properties, including possible guarantees and threats.

Original languageEnglish (US)
Title of host publicationProceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08
Pages55-59
Number of pages5
DOIs
StatePublished - Dec 1 2008
EventACM SIGCOMM 2008 Conference on Computer Communications - 1st Workshop on Online Social Networks, WOSP'08 - Seattle, WA, United States
Duration: Aug 17 2008Aug 22 2008

Publication series

NameProceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08

Other

OtherACM SIGCOMM 2008 Conference on Computer Communications - 1st Workshop on Online Social Networks, WOSP'08
CountryUnited States
CitySeattle, WA
Period8/17/088/22/08

All Science Journal Classification (ASJC) codes

  • Computer Networks and Communications

Keywords

  • Social networks
  • Trust

Fingerprint Dive into the research topics of 'Photo-based authentication using social networks'. Together they form a unique fingerprint.

  • Cite this

    Yardi, S., Feamster, N., & Bruckman, A. (2008). Photo-based authentication using social networks. In Proceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08 (pp. 55-59). (Proceedings of the ACM SIGCOMM 2008 Conference on Computer Communications -1st Workshop on Online Social Networks, WOSP'08). https://doi.org/10.1145/1397735.1397748