Secure Authentication and Cyber Crime Mitigation for Social Networking Sites
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Most Trusted Research Journal Since Year 2012

ISSN: 2319-7064



M.Tech / M.E / PhD Thesis | Computer Science & Engineering | India | Volume 5 Issue 5, May 2016

Secure Authentication and Cyber Crime Mitigation for Social Networking Sites

Anjitha T, Harsha V

With the advent of online social networking sites, its usage has grown dramatically, now rivaling search engines as the most visited Internet sites. Even though these OSNs offer attractive means for digital social interactions and data sharing, they raise a number of cyber issues on security and privacy. Usually OSNs allow users to restrict access shared data but there had not been any mechanism to enforce security and privacy concerns over data associated with multiple users. One of the main issues in todays OSNs is to give users the ability with which they can control the messages posted on their private space to avoid displaying of unwanted contents. The proposed framework creates firewall in network security. It gives close wall security while accessing the Social Network sites. It also enables the protection of shared data with multi users virtual environment in OSNs. And it also allows OSN users to have a direct control on the messages posted on their walls and a secured login method is provided to avoid cyber attacks like hacking, Phishing and Social Engineering. These are achieved by using RSA Algorithm.

Keywords: Social Networking Sites, Hacking, Phishing, Security and Privacy risks, RSA algorithm

Edition: Volume 5 Issue 5, May 2016

Pages: 412 - 414

Share this Article

How to Cite this Article?

Anjitha T, Harsha V, "Secure Authentication and Cyber Crime Mitigation for Social Networking Sites", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163284, Volume 5 Issue 5, May 2016, 412 - 414

50 PDF Views | 50 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Social Networking Sites'

Research Paper, Computer Science & Engineering, India, Volume 2 Issue 4, April 2013

Pages: 342 - 344

Collectional Activities Forecast via Insertion using Social Networking Sites

D. Harika, Y. S. Lakshmi. K, K.V.V. Satyanarayana

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 1, January 2015

Pages: 2442 - 2447

A Smart Real Time Ridesharing and Travel Assistance

Aarthi R

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 1707 - 1708

Survey Paper on Twitter Sentiment Analysis Using Portar Stemming Algorithm

Nishad Patil, Tingre Sayali, Thorat Kalyani, Shivshetty Swapnil, Patil Shwetal

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 11, November 2014

Pages: 514 - 516

Prediction of Group and Individual Behaviours on Social Web Sites

Siriplakota Balaji, Jhansi Lakshmi Vaddelle, B. Lakshmi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1954 - 1957

Proposed Techniques to Remove Flaming Problems from Social Networking Sites and outcome of Na?ve Bayes Classifier for Detection of Flames

Vishakha Mal, Dr. A. J. Agrawal

Share this Article

Similar Articles with Keyword 'Hacking'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 5, May 2016

Pages: 1441 - 1443

A Novel Approach on Multi Factor Authentication

Shivagupta Chandakavathe, Rekha B. S., Sampath Kumar C

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 2395 - 2399

Shoulder Surfing and Keylogger Resistance using Two Step Graphical Password Scheme

Dhanashree R. Chaudhari, Yogesh B. Gurav

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 10, October 2015

Pages: 2084 - 2088

Implementation of Efficient Privacy Preserving Data Analysis for Secure Data Transmission

Shital Gawahale, Rekha Jadhav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 2025 - 2029

Investigation of Security in Cloud Computing

Annu Devi

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1255 - 1257

Designing an Improved KISS Environment

Mohinder Singh, Harmandeep Singh

Share this Article

Similar Articles with Keyword 'Phishing'

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 659 - 661

A Review of Anti Phishing Framework based on Visual Cryptography

D. N. Rewadkar, Asmita D. Abhyankar

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 6, June 2014

Pages: 1488 - 1491

A Survey on: Email Security for Targeted Malicious Attacks

Jagdish R. Yadav, Dr. A. K. Srivastava

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 10, October 2014

Pages: 2323 - 2328

An Enhanced Anti Phishing Approach Based on Threshold Value Differentiation

Komatla. Sasikala, P. Anitha Rani

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 310 - 313

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 12, December 2015

Pages: 112 - 116

Enhanced Framework for Detecting Malicious HTTP Redirections with Supporting Classifier

Thella Vineela, Bondili Balvinder Singh

Share this Article

Similar Articles with Keyword 'RSA algorithm'

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 4 Issue 8, August 2015

Pages: 1681 - 1685

Enabling Public Auditability, Dynamic Storage Security and Integrity Verification in Cloud Storage

Pranita Bakka, Dr. Jayashree Agarkhed

Share this Article

Research Proposals or Synopsis, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 310 - 313

Secure Server Verification by using Encryption Algorithm and Visual Cryptography

Shreya Zarkar, Sayali Vaidya, Achal Bharambe, Arifa Tadvi, Tanashree Chavan

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 4 Issue 3, March 2015

Pages: 2067 - 2072

Review Paper on Secure Data Packet Transmission in Cluster Head and Base Station Using Wireless Sensor Network

Ashutosh S. Patil, Prof. Akhilesh A. Tyade

Share this Article

Survey Paper, Computer Science & Engineering, India, Volume 9 Issue 7, July 2020

Pages: 356 - 358

A Survey on Securing IOT Based Devices Using Cryptanalysis

Saumya Priya

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 2, February 2015

Pages: 2280 - 2284

Significance of Finger Prints in Prevention of Cyber Crimes - An Approach

Bhavana Desai, Sachidananda Joshi

Share this Article
Top