{"id":"https://openalex.org/W4392845560","doi":"https://doi.org/10.1145/3625007.3627722","title":"Combating Identity Attacks in Online Social Networks: A Multi-Layered Framework Using Zero-Knowledge Proof and Permissioned Blockchain","display_name":"Combating Identity Attacks in Online Social Networks: A Multi-Layered Framework Using Zero-Knowledge Proof and Permissioned Blockchain","publication_year":2023,"publication_date":"2023-11-06","ids":{"openalex":"https://openalex.org/W4392845560","doi":"https://doi.org/10.1145/3625007.3627722"},"language":"en","primary_location":{"id":"doi:10.1145/3625007.3627722","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3625007.3627722","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3625007.3627722","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Advances in Social Networks Analysis and Mining","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://dl.acm.org/doi/pdf/10.1145/3625007.3627722","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077259148","display_name":"Md Jahangir Alam","orcid":"https://orcid.org/0009-0000-8417-9316"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Md Jahangir Alam","raw_affiliation_strings":["Southern Illinois University, Carbondale, United States"],"raw_orcid":"https://orcid.org/0009-0000-8417-9316","affiliations":[{"raw_affiliation_string":"Southern Illinois University, Carbondale, United States","institution_ids":["https://openalex.org/I110378019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5041928943","display_name":"Ismail Hossain","orcid":"https://orcid.org/0009-0004-7572-9557"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Ismail Hossain","raw_affiliation_strings":["Southern Illinois University, Carbondale, United States"],"raw_orcid":"https://orcid.org/0009-0004-7572-9557","affiliations":[{"raw_affiliation_string":"Southern Illinois University, Carbondale, United States","institution_ids":["https://openalex.org/I110378019"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5072307876","display_name":"Sai Puppala","orcid":"https://orcid.org/0009-0008-0334-5756"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sai Puppala","raw_affiliation_strings":["Southern Illinois University, Carbondale, United States"],"raw_orcid":"https://orcid.org/0009-0008-0334-5756","affiliations":[{"raw_affiliation_string":"Southern Illinois University, Carbondale, United States","institution_ids":["https://openalex.org/I110378019"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5014369148","display_name":"Sajedul Talukder","orcid":"https://orcid.org/0000-0001-8054-9770"},"institutions":[{"id":"https://openalex.org/I110378019","display_name":"Southern Illinois University Carbondale","ror":"https://ror.org/049kefs16","country_code":"US","type":"education","lineage":["https://openalex.org/I110378019","https://openalex.org/I2801502357"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Sajedul Talukder","raw_affiliation_strings":["Southern Illinois University, Carbondale, United States"],"raw_orcid":"https://orcid.org/0000-0001-8054-9770","affiliations":[{"raw_affiliation_string":"Southern Illinois University, Carbondale, United States","institution_ids":["https://openalex.org/I110378019"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5077259148"],"corresponding_institution_ids":["https://openalex.org/I110378019"],"apc_list":null,"apc_paid":null,"fwci":1.3453,"has_fulltext":true,"cited_by_count":3,"citation_normalized_percentile":{"value":0.86718885,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":96},"biblio":{"volume":null,"issue":null,"first_page":"636","last_page":"643"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10270","display_name":"Blockchain Technology Applications and Security","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11644","display_name":"Spam and Phishing Detection","score":0.9993000030517578,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10237","display_name":"Cryptography and Data Security","score":0.9976999759674072,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/zero-knowledge-proof","display_name":"Zero-knowledge proof","score":0.8257334232330322},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7347058653831482},{"id":"https://openalex.org/keywords/identity","display_name":"Identity (music)","score":0.6878149509429932},{"id":"https://openalex.org/keywords/blockchain","display_name":"Blockchain","score":0.6222513318061829},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.6140390038490295},{"id":"https://openalex.org/keywords/proof-of-concept","display_name":"Proof of concept","score":0.5452350974082947},{"id":"https://openalex.org/keywords/trustworthiness","display_name":"Trustworthiness","score":0.5365123748779297},{"id":"https://openalex.org/keywords/government","display_name":"Government (linguistics)","score":0.5267395973205566},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4872854948043823},{"id":"https://openalex.org/keywords/identity-theft","display_name":"Identity theft","score":0.4364834129810333},{"id":"https://openalex.org/keywords/internet-privacy","display_name":"Internet privacy","score":0.4116877615451813},{"id":"https://openalex.org/keywords/anonymity","display_name":"Anonymity","score":0.41162651777267456},{"id":"https://openalex.org/keywords/cryptography","display_name":"Cryptography","score":0.25232234597206116}],"concepts":[{"id":"https://openalex.org/C176329583","wikidata":"https://www.wikidata.org/wiki/Q191943","display_name":"Zero-knowledge proof","level":3,"score":0.8257334232330322},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7347058653831482},{"id":"https://openalex.org/C2778355321","wikidata":"https://www.wikidata.org/wiki/Q17079427","display_name":"Identity (music)","level":2,"score":0.6878149509429932},{"id":"https://openalex.org/C2779687700","wikidata":"https://www.wikidata.org/wiki/Q20514253","display_name":"Blockchain","level":2,"score":0.6222513318061829},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.6140390038490295},{"id":"https://openalex.org/C124978682","wikidata":"https://www.wikidata.org/wiki/Q1201019","display_name":"Proof of concept","level":2,"score":0.5452350974082947},{"id":"https://openalex.org/C153701036","wikidata":"https://www.wikidata.org/wiki/Q659974","display_name":"Trustworthiness","level":2,"score":0.5365123748779297},{"id":"https://openalex.org/C2778137410","wikidata":"https://www.wikidata.org/wiki/Q2732820","display_name":"Government (linguistics)","level":2,"score":0.5267395973205566},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4872854948043823},{"id":"https://openalex.org/C522325796","wikidata":"https://www.wikidata.org/wiki/Q471880","display_name":"Identity theft","level":2,"score":0.4364834129810333},{"id":"https://openalex.org/C108827166","wikidata":"https://www.wikidata.org/wiki/Q175975","display_name":"Internet privacy","level":1,"score":0.4116877615451813},{"id":"https://openalex.org/C178005623","wikidata":"https://www.wikidata.org/wiki/Q308859","display_name":"Anonymity","level":2,"score":0.41162651777267456},{"id":"https://openalex.org/C178489894","wikidata":"https://www.wikidata.org/wiki/Q8789","display_name":"Cryptography","level":2,"score":0.25232234597206116},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.0},{"id":"https://openalex.org/C24890656","wikidata":"https://www.wikidata.org/wiki/Q82811","display_name":"Acoustics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3625007.3627722","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3625007.3627722","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3625007.3627722","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Advances in Social Networks Analysis and Mining","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3625007.3627722","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3625007.3627722","pdf_url":"https://dl.acm.org/doi/pdf/10.1145/3625007.3627722","source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the International Conference on Advances in Social Networks Analysis and Mining","raw_type":"proceedings-article"},"sustainable_development_goals":[{"score":0.7200000286102295,"id":"https://metadata.un.org/sdg/10","display_name":"Reduced inequalities"}],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"grobid_xml":true,"pdf":true},"content_urls":{"pdf":"https://content.openalex.org/works/W4392845560.pdf","grobid_xml":"https://content.openalex.org/works/W4392845560.grobid-xml"},"referenced_works_count":24,"referenced_works":["https://openalex.org/W185290757","https://openalex.org/W1564285798","https://openalex.org/W1963872805","https://openalex.org/W1970606468","https://openalex.org/W2773293410","https://openalex.org/W2798775852","https://openalex.org/W2806313788","https://openalex.org/W2808595109","https://openalex.org/W2900862354","https://openalex.org/W3005719348","https://openalex.org/W3011385309","https://openalex.org/W3045850514","https://openalex.org/W3089741453","https://openalex.org/W3095400055","https://openalex.org/W3103344813","https://openalex.org/W3164343013","https://openalex.org/W3206199955","https://openalex.org/W4213429827","https://openalex.org/W4235049351","https://openalex.org/W4236458081","https://openalex.org/W4253273171","https://openalex.org/W4300127641","https://openalex.org/W4376876516","https://openalex.org/W6783778027"],"related_works":["https://openalex.org/W1870614684","https://openalex.org/W194387157","https://openalex.org/W2000850689","https://openalex.org/W59628553","https://openalex.org/W1483984920","https://openalex.org/W2376228871","https://openalex.org/W1966494590","https://openalex.org/W1593132758","https://openalex.org/W4402375269","https://openalex.org/W4392845560"],"abstract_inverted_index":{"Identity":[0],"attacks,":[1],"such":[2],"as":[3],"impersonation,":[4],"identity":[5,61],"theft,":[6],"and":[7,17,31,51,86],"fraudulent":[8],"account":[9,88],"creation,":[10],"pose":[11],"significant":[12],"threats":[13],"to":[14,34,110],"the":[15],"security":[16],"trustworthiness":[18],"of":[19],"Online":[20],"Social":[21],"Networks":[22],"(OSNs).":[23],"In":[24],"this":[25],"paper,":[26],"we":[27],"propose":[28],"a":[29,44,58,66,99],"robust":[30],"secure":[32],"framework":[33,46],"verify":[35],"user":[36,77],"identities":[37,78],"without":[38],"compromising":[39],"their":[40],"privacy":[41],"by":[42],"developing":[43],"multi-layered":[45],"leveraging":[47],"zero-knowledge":[48,67],"proof":[49],"(ZKP)":[50],"Hyperledger":[52],"Fabric":[53],"private":[54],"blockchain.":[55],"We":[56],"introduce":[57],"blockchain-based":[59],"government":[60],"provider":[62],"system,":[63,105],"coupled":[64],"with":[65,92],"proof-based":[68],"signup":[69],"process":[70],"for":[71,103],"social":[72],"networks.":[73],"Our":[74,90],"prototype":[75],"authenticates":[76],"in":[79],"multiple":[80,87],"layers,":[81],"effectively":[82],"mitigating":[83],"fraudulent,":[84],"cloned,":[85],"creations.":[89],"experiments":[91],"n":[93],"(n":[94],"=":[95],"50)":[96],"users":[97],"showed":[98],"100%":[100],"success":[101],"rate":[102],"our":[104],"highlighting":[106],"its":[107],"effectiveness":[108],"compared":[109],"other":[111],"OSNs.":[112]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
