A Authentication model to Trustees based Social Networks

Abstract

authenticating users with the help of their friends has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to user’s trustees. The user must obtain at least k reset his or her password. In this paper, we provide the first systematic study about the security of trustee based social authentications. In particular, we first introduce verification codes from the trustees before being directed to small framework of attacks, which attacks. In these attacks, an attacker initially obtains we call forest fire iteratively, attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to for attackers. Moreover, we introduce number of compromised users, and then the attacker a novel various defense formalize the threats of forest fire attacks and their costs strategies. Evaluate various concrete attack and defense our results have finally, we apply our framework to strategies using three real world social network datasets. Extensively strong implications for the design of more secure trustee-based social authentications.

Authors and Affiliations

Sravya Lakshmi Malyala| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: r sravya.malayala@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

Habitual Test Packet Generation And Fault Localization

Networks are getting larger and more complex, yet administrators rely on rudimentary tools such as and to debug problems. We propose an automated and systematic approach for testing and debugging networks called “A...

Finite Element Analysis of Wire Drawing Process with different die contours

Finite element method is a numerical analysis tool for analyzing complex problems. It was originally developed as a tool for structural, Thermal; fluent analysis and magnetic, electrical current flow analysis but the...

Concurrent and independent operations to the remote encrypted cloud database from many geographically distributed clients

since data in cloud will be placed anywhere, because of the critical nature of the applications, it is important that clouds be secure. The major security challenge with clouds is that the owner of the data may not h...

DC-DC Energy Conversion with Novel loaded Resonant Converter

This paper presents the direct current (dc)-to-dc energy conversion with novel loaded-resonant converter. Energy shortages and increasing oil prices have created the demand for a high energy conversion efficiency and...

Protection Guarded Secrecy Sustain Access Manipulate Procedure Intended for Relational Data

Access control systems safeguard the touchy information's from unauthenticated clients. Be that as it may, when touchy information's is given and a Privacy Protection Mechanism (PPM) is not set up, an approved client...

Download PDF file
  • EP ID EP16703
  • DOI -
  • Views 310
  • Downloads 12

How To Cite

Sravya Lakshmi Malyala, D. Ramesh (2015). A Authentication model to Trustees based Social Networks. International Journal of Science Engineering and Advance Technology, 3(12), 1374-1378. https://europub.co.uk/articles/-A-16703