A Authentication model to Trustees based Social Networks

Abstract

authenticating users with the help of their friends has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to user’s trustees. The user must obtain at least k reset his or her password. In this paper, we provide the first systematic study about the security of trustee based social authentications. In particular, we first introduce verification codes from the trustees before being directed to small framework of attacks, which attacks. In these attacks, an attacker initially obtains we call forest fire iteratively, attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to for attackers. Moreover, we introduce number of compromised users, and then the attacker a novel various defense formalize the threats of forest fire attacks and their costs strategies. Evaluate various concrete attack and defense our results have finally, we apply our framework to strategies using three real world social network datasets. Extensively strong implications for the design of more secure trustee-based social authentications.

Authors and Affiliations

Sravya Lakshmi Malyala| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: r sravya.malayala@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

An Additive Order and Privacy Preserving Function Family (AOPPF)

The abundant advantages of cloud computing, for protection concerns, people and venture clients are reluctant to outsource their susceptible data, including E- mail, individual health records and government private d...

A Study on Goodness of Fit For The Linear Model of Index Numbers of Jute Productivity In India

A linear trend is fitted to the index numbers of Jute productivity in India from 1993-94 to 2011-12. The line is tested for its goodness of fit by studying standard error, closeness of fit, confidence region, and som...

DC Link Voltage Control For Node Interface in 3-Phase Grid Tied Solar PVS using Adaptive Fuzzy

This paper deals with a three-organize twoorchestrate matrix tied SPV (sun powered photograph voltaic) system. The key stage is a lift converter, which fills the need of MPPT (most noteworthy power point taking after)...

A Simplified Space -Vector Pwm For Three Level Inverters Applied To Passive And Motor Load

Increase in renewable energy resources like solar , fuel cells had created a need for inverters which can work on higher operating voltages efficiently Advances in power electronics technology allowed the vide invest...

To Achieve Perfect Resilience To Packet Loss In Lossy Channels Through Mabs

Authentication is one of the decisive subjects in protecting multicast in a situation attractive to malicious attacks. Multicast is a competent method to transport multimedia content from a sender to a group of recei...

Download PDF file
  • EP ID EP16703
  • DOI -
  • Views 327
  • Downloads 12

How To Cite

Sravya Lakshmi Malyala, D. Ramesh (2015). A Authentication model to Trustees based Social Networks. International Journal of Science Engineering and Advance Technology, 3(12), 1374-1378. https://europub.co.uk/articles/-A-16703