Privacy on Inference Leaking of URL Shortening Service on Twitter

Authors

  • Anuhya Koormachalam  M.TECH, Department of Computer Science and Engineering, Malla Reddy Engineering College (Autonomous), Hyderabad, Telangana, India
  • P.V. Ramana Murthy  Associate professor, Department of Computer Science and Engineering, Malla Reddy Engineering College (Autonomous), Hyderabad, Telangana, India

Keywords:

URL Shortening Service, Twitter, Privacy Leak, Inference

Abstract

Twitter is a well-known online genial system settlement for sharing succinct messages (tweets) among companions. Its clients every now and again utilize URL truncating facilities that give (i) a short nom de plume of a long URL for sharing it using tweets and (ii) open snap investigation of truncated URLs. The general population click examination is given in an accumulated frame to safeguard the security of individual clients. In this paper, we propose handy assault strategies deriving who clicks which limited URLs on Twitter using the cumulating of open data: Twitter metadata and open snap investigation. Not at all like the ordinary program history purloining assaults, have our assailants just requested openly accessible data given by Twitter and URL limiting lodging. The assessment comes about demonstrate that our assailant can bargain Twitter client’s security with high accuracy.

References

  1. Jonghyuk Song, Sangho Lee, Member, IEEE, and Jong Kim, Member, IEEE Inference Attack on Browsing History of Twitter Users Using Public Click Analytics and Twitter Metadata IEEE transactions on dependable and secure computing, vol. 13, no. 3, may/june 2016
  2. D. Boyd, S. Golder, and G. Lotan. Tweet, tweet, retweet: Conversational aspects of retweeting on twitter. In Proc. 43rd Hawaii International Conference on System Sciences (HICSS), 2010.
  3. Bugzilla. Bug 57351: CSS on a:visited can load an image and reveal if visitor been to a site,2000. https://bugzilla.mozilla.org/show bug.cgi?id=57351.
  4. Bugzilla. Bug 147777: visited support allows queries into global history, 2002.https://bugzilla.mozilla.org/show bug.cgi?id=147777
  5. J. A. Calandrino, A. Kilzer, A. Narayanan, E. W. Felten, and V. Shmatikov. "you might also like:" privacy risks of collaborative filtering. In Proc. IEEE Symp. Security and Privacy (S&P), 2011.
  6. A. Chaabane, G. Acs, and M. A. Kaafar. You are what you like! Information leakage through users’ interests. In Proc. 19th Network and Distributed System Security Symp. (NDSS), 2012.
  7. Z. Cheng, J. Caverlee, and K. Lee. You are where you tweet: A content-based approach to geo-locating twitter users. In Proc. 19th ACM International Conference on Information and Knowledge Management (CIKM), 2010.
  8. A. Clover. CSS visited pages disclosure, 2002. http://seclists.org/bugtraq/2002/Feb/271.
  9. C. Dwork. Di_erential privacy. In Proc. 33rd International Colloquium on Automata, Languages, and Programming (ICALP), 2006.
  10. E. W. Felten and M. A. Schneider. Timing attacks on web privacy. In Proc. 7th ACM Conf. Computer and Comm. Security (CCS), 2000.

Downloads

Published

2017-08-31

Issue

Section

Research Articles

How to Cite

[1]
Anuhya Koormachalam, P.V. Ramana Murthy, " Privacy on Inference Leaking of URL Shortening Service on Twitter , International Journal of Scientific Research in Science, Engineering and Technology(IJSRSET), Print ISSN : 2395-1990, Online ISSN : 2394-4099, Volume 3, Issue 5, pp.586-590, July-August-2017.