A Authentication model to Trustees based Social Networks

Abstract

authenticating users with the help of their friends has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to user’s trustees. The user must obtain at least k reset his or her password. In this paper, we provide the first systematic study about the security of trustee based social authentications. In particular, we first introduce verification codes from the trustees before being directed to small framework of attacks, which attacks. In these attacks, an attacker initially obtains we call forest fire iteratively, attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to for attackers. Moreover, we introduce number of compromised users, and then the attacker a novel various defense formalize the threats of forest fire attacks and their costs strategies. Evaluate various concrete attack and defense our results have finally, we apply our framework to strategies using three real world social network datasets. Extensively strong implications for the design of more secure trustee-based social authentications.

Authors and Affiliations

Sravya Lakshmi Malyala| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: r sravya.malayala@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

Combustion Analysis on HCCI Engine By Using Blended Fuel With Varying Injection Timing Of PCCI

There are two sorts of inside burning motors in particular the sparkle ignition (SI) and the pressure ignition (CI). Petrol and diesel are at present rule powers for SI and CI motors. These energizes are very nearly...

Mobile Ad hoc networks in the Global system of Interconnected Computer Networks

Computers capable of attaching to the Internet from many places are likely to grow in popularity until they dominate the population of the Internet. Consequently, protocol research has shifted into high gear to devel...

In FSW, a rotating cylindrical pin tool is forced to plunge in to the plates to be welded and moved along their contact line. The tool penetrates into the work pieces. During this operation, frictional heat that is g...

Real Time Automatic Number Plate Recognition Using Morphological Algorithm

The rising increase of up to date urban and national road networks over the last three decades become known the need of capable monitoring and management of road traffic. Expected techniques for traffic measurements,...

An Efficient and Scalable Cloud Approach for Managing the Data in the Cloud

In spite of late advances in dispersed Resource Description Frame work (RDF) information administration, preparing a lot of RDF information in the cloud is still extremely difficult. Disregarding its apparently strai...

Download PDF file
  • EP ID EP16703
  • DOI -
  • Views 312
  • Downloads 12

How To Cite

Sravya Lakshmi Malyala, D. Ramesh (2015). A Authentication model to Trustees based Social Networks. International Journal of Science Engineering and Advance Technology, 3(12), 1374-1378. https://europub.co.uk/articles/-A-16703