Privacy on Inference Leaking of URL Shortening Service on Twitter

Authors(2) :-Anuhya Koormachalam, P.V. Ramana Murthy

Twitter is a well-known online genial system settlement for sharing succinct messages (tweets) among companions. Its clients every now and again utilize URL truncating facilities that give (i) a short nom de plume of a long URL for sharing it using tweets and (ii) open snap investigation of truncated URLs. The general population click examination is given in an accumulated frame to safeguard the security of individual clients. In this paper, we propose handy assault strategies deriving who clicks which limited URLs on Twitter using the cumulating of open data: Twitter metadata and open snap investigation. Not at all like the ordinary program history purloining assaults, have our assailants just requested openly accessible data given by Twitter and URL limiting lodging. The assessment comes about demonstrate that our assailant can bargain Twitter client’s security with high accuracy.

Authors and Affiliations

Anuhya Koormachalam
M.TECH, Department of Computer Science and Engineering, Malla Reddy Engineering College (Autonomous), Hyderabad, Telangana, India
P.V. Ramana Murthy
Associate professor, Department of Computer Science and Engineering, Malla Reddy Engineering College (Autonomous), Hyderabad, Telangana, India

URL Shortening Service, Twitter, Privacy Leak, Inference

  1. Jonghyuk Song, Sangho Lee, Member, IEEE, and Jong Kim, Member, IEEE Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata IEEE transactions on dependable and secure computing, vol. 13, no. 3, may/june 2016
  2. D. Boyd, S. Golder, and G. Lotan. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In Proc. 43rd Hawaii International Conference on System Sciences (HICSS), 2010.
  3. Bugzilla. Bug 57351: CSS on a:visited can load an image and reveal if visitor been to a site,2000. bug.cgi?id=57351.
  4. Bugzilla. Bug 147777: visited support allows queries into global history, 2002. bug.cgi?id=147777
  5. J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov. "you might also like:" privacy risks of collaborative filtering. In Proc. IEEE Symp. Security and Privacy (S&P), 2011.
  6. A. Chaabane, G. Acs, and M. A. Kaafar. You are what you like! Information leakage through users’ interests. In Proc. 19th Network and Distributed System Security Symp. (NDSS), 2012.
  7. Z. Cheng, J. Caverlee, and K. Lee. You are where you tweet: A content-based approach to geo-locating twitter users. In Proc. 19th ACM International Conference on Information and Knowledge Management (CIKM), 2010.
  8. A. Clover. CSS visited pages disclosure, 2002.
  9. C. Dwork. Di_erential privacy. In Proc. 33rd International Colloquium on Automata, Languages, and Programming (ICALP), 2006.
  10. E. W. Felten and M. A. Schneider. Timing attacks on web privacy. In Proc. 7th ACM Conf. Computer and Comm. Security (CCS), 2000.

Publication Details

Published in : Volume 3 | Issue 5 | July-August 2017
Date of Publication : 2017-08-31
License:  This work is licensed under a Creative Commons Attribution 4.0 International License.
Page(s) : 586-590
Manuscript Number : IJSRSET1734155
Publisher : Technoscience Academy

Print ISSN : 2395-1990, Online ISSN : 2394-4099

Cite This Article :

Anuhya Koormachalam, P.V. Ramana Murthy, " Privacy on Inference Leaking of URL Shortening Service on Twitter , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.586-590, July-August-2017.
Journal URL :

Article Preview