International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064




Downloads: 5 | Views: 101 | Weekly Hits: ⮙2 | Monthly Hits: ⮙2

Research Paper | Computer Science and Information Technology | Bangladesh | Volume 12 Issue 12, December 2023 | Rating: 4.9 / 10


Enhancing Social Network Security: A Cloud - Based Approach to Prevent Profile Cloning Attacks

Fahmida Yesmin Chowdhury [2]


Abstract: The number of social network users is increasing tremendously. Users are increasingly utilizing social sites for various purposes. Normal users use social sites to connect with their friends and family members, students and teachers use them for study purposes, businessmen use them for their business deals, and sellers also use these social sites for their advertisements. Using these sites, users can easily create new friends and share their interest, feelings, etc. with known and unknown persons which create security holes on these networks and help the attackers to perform different types of attacks. One of the common attacks on social sites is a profile cloning attack or identity theft attack where an attacker creates a similar fake profile of any real user of a social site and does some unwanted tasks acting as that real user. Many research works have been done on the detection of profile cloning attacks. But if it is possible to prevent creating fake profiles or fake profile images then the users of social networks will be more secure. This paper proposed a system to stop profile cloning attacks on all social sites by creating the same standard cloud - based globally verified profile which will be maintained by all social networking sites.


Keywords: Cybersecurity, Social Networking, Identity Theft, Profile Cloning, Cloud - Based Verification, Profile verification globally


Edition: Volume 12 Issue 12, December 2023,


Pages: 1651 - 1656



How to Download this Article?

Type Your Valid Email Address below to Receive the Article PDF Link


Verification Code will appear in 2 Seconds ... Wait

Top