A Authentication model to Trustees based Social Networks
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 12
Abstract
authenticating users with the help of their friends has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to user’s trustees. The user must obtain at least k reset his or her password. In this paper, we provide the first systematic study about the security of trustee based social authentications. In particular, we first introduce verification codes from the trustees before being directed to small framework of attacks, which attacks. In these attacks, an attacker initially obtains we call forest fire iteratively, attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to for attackers. Moreover, we introduce number of compromised users, and then the attacker a novel various defense formalize the threats of forest fire attacks and their costs strategies. Evaluate various concrete attack and defense our results have finally, we apply our framework to strategies using three real world social network datasets. Extensively strong implications for the design of more secure trustee-based social authentications.
Authors and Affiliations
Sravya Lakshmi Malyala| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: r sravya.malayala@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India
Doubly Fed Induction Generator Based Wind Energy Conversion Systems
Doubly Fed Induction Generator for Wind Energy Conversion Systems manages the operation of doubly fed induction generator (DFIG) with an incorporated dynamic channel abilities utilizing lattice side converter (GSC)....
Tweet Mining from General Elections of a Country
In previous election of a country for its democratic elections in which social media was targeted as a way to convince the social media users to attract their votes, an analysis of BigData on these elections tweets is...
Design and Analysis of Dry Cylinder Liners Used in Diesel Engines
A Cylinder liner is a cylindrical part to be fitted in to an engine block to form a cylindrical space in which the piston reciprocates very smoothly. It is one of the most important functional parts to make up the int...
Mining Of Web Information Utilizing Spatial Web Mining
In this paper we ponder and exhibit truths about how to extricate the helpful data on the web furthermore give the shallow learning and examinations about data mining. Web mining is the utilization of data mining pro...
Interpreting Pursuit Outcomes from Data Web Bases
The Internet presents a huge amount of useful information which is usually formatted for its users, which makes it difficult to extract relevant data from various sources. Therefore, the availability of robust, flexib...