skip to main content
10.1145/2675682.2676395acmconferencesArticle/Chapter ViewAbstractPublication PagesgisConference Proceedingsconference-collections
research-article

Venue attacks in location-based social networks

Published:04 November 2014Publication History

ABSTRACT

Location-Based Social Networks (LBSNs), such as Foursquare, Yelp and Facebook Place, have attracted many people, including business owners who use LBSNs to promote their businesses. A physical location is called a venue or a place of interest in an LBSN. Associated with each venue are several attributes, such as its latitude and longitude values, and the discounts/coupons users can use. LBSN users usually tend to trust venues, which is becoming a key focus of various attacks [7, 10]. By manipulating attributes related to venues, however, an attacker can deceive users, compromise their privacy and destroy the reputation of the venues in an LBSN. In this paper, we call the attacks targeting venues as venue attacks. We first investigate and characterize such attacks in Foursquare, Yelp and Facebook Place. We then study what makes such attacks successful and discuss potential defense approaches against these attacks. To the best of our knowledge, we are the first to characterize various venue attacks in LBSNs.

References

  1. Foursquare, https://foursquare.com/aboutGoogle ScholarGoogle Scholar
  2. C. R. Vicente, D. Freni, C. Bettini and C. S. Jensen. Location-Related Privacy in Geo- Social Networks, IEEE Internet Computing, vol. 15, no. 3, pp. 20--27, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. L. Jin, X. Long and J. Joshi. Towards understanding Residential Privacy by Analyzing User' Activities in Foursquare. In 2012 Workshop on Building Analysis Datasets and Gathering Experience Returns for Security, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. L. Jin, X. Long, J. Joshi and M. Anwar. Analysis of Access Control Mechanisms for Users' Check-ins in Location-Based Social Network Systems. In Proceedings Of 13th IEEE Information Reuse and Integration, 2012.Google ScholarGoogle ScholarCross RefCross Ref
  5. L. Bilge, T. Strufe, D. Balzarotti and E. Kirda. All your contacts are belong to us: automated identity theft attacks on social networks. In Proceedings of the 18th international conference on World Wide Web, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. L Jin, J. Joshi and M. Anwar. Mutual-friend Based Attacks in Social Network Systems. Computer & Security, vol. 37, pp-15--30, 2013. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. W. He, X. Liu and M. Ren. Location Cheating: A Security Challenge to Location-Based Social Network Services. In Proceedings of the 31st International Conference on Distributed Computing Systems, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. K. Zhang, W. Jeng, F. Fofie, K. Pelechrinis and P. Krishnamurthy. Towards reliable spatial information in LBSNs. In Proceedings of the 2012 International Workshop on Location Based Social Networks, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. L. Jin, H. Takibi, and J. Joshi. Towards active detection of identity clone attacks on online social networks. In Proceedings of the first ACM conference on Data and application security and privacy, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. B. Carbunar, M. Rahman, N. Pissinou, and A. V. Vasilakos. A Survey of Privacy Vulnerabilities and Defenses in GeoSocial Networks. Consumer Communications and Networking, 2013.Google ScholarGoogle ScholarCross RefCross Ref
  11. B. Carbunar, R. Sion, R. Potharaju and M. Ehsan. Private Badges for Geosocial Networks. IEEE Transactions on Mobile Computing, 2013.Google ScholarGoogle Scholar
  12. B. Carbunar and R. Potharaju. You Unlocked the Mt. Everest Badge on Foursquare! Countering Location Fraud in GeoSocial Networks. In Proceedings of the 9th IEEE International Conference on Mobile Ad hoc and Sensor Systems, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Saroiu and A. Wolman. Enabling New Mobile Applications with Location Proofs. In Proceedings of the 10th workshop on Mobile Computing Systems and Applications, 2009. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. G. Barbier, R. Zafarani, H. Gao, G. Fung, H. Liu. Maximizing benefits from crowdsourced data. Computational and Mathematical Organization Theory, V.18, I. 3, pp-257--279, 2012. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Venue attacks in location-based social networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Conferences
          GeoPrivacy '14: Proceedings of the 1st ACM SIGSPATIAL International Workshop on Privacy in Geographic Information Collection and Analysis
          November 2014
          55 pages
          ISBN:9781450331340
          DOI:10.1145/2675682

          Copyright © 2014 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 4 November 2014

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          GeoPrivacy '14 Paper Acceptance Rate5of8submissions,63%Overall Acceptance Rate5of8submissions,63%

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader