PRIVACY PROTECTION FOR SECURE DATA ENCRYPTION IN ONLINE SOCIAL NETWORKS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 2
Abstract
Network security is an act of protecting the information from unauthorized access; it controls and monitors the security of the whole network. The threats to network security are alarmingly increasing day by day and it creates a need to protect the information stored in the network securely. If the network security is weak, it is prone to get attacked by hackers who steals the original information and sells it into the black market for their gain. To overcome this network security is used in all types of data transactions between the sender and the receiver. Now a day’s data sharing through social network is a difficult in concern with security. The data transferred from one node to another through network should be more efficient and secured. There are various mechanism proposed to avoid secure issues in the network transmission of data. The Key based Authentication provides security for data transmission in social network. The data transmitted from one end user is encrypted using the Blowfish algorithm and is decrypted by the server. It uses public key cryptography for secure purposes. The server then again encrypts the data using the rijndael algorithm and stores it securely so that the information is more secure and doesn’t attract hackers to steal the information.
Authors and Affiliations
Shridhish R. S. , Shibin Abraham shibin633@gmail. com, Subbulakshmi Mrs
Monitoring Aggression In Adolescents: Chandra Namaskara As A Panacea
Aggression in adolescence is a key point of focus for psychologists, educationists, parents, and teachers. On the other hand, interdisciplinary researches with special reference to yoga and psychology are growing rapidly...
A SURVEY ON LUNG SEGMENTATION TECHNIQUES
The cancer in the lung is the common cancer and leads to dead often. The cells which are affected are difficult to analyze in the early stage of cancer because they are overlapped. Many techniques are u...
WEAK INDIAN RUPEE – ISSUES AND CHALLENGES
Investors usually won’t spend much time on studying the currency movement. Many skipped the news of the Indian rupee hitting as low of against the dollar, even though it would hurt the econ...
COMMUNITY DISCOVERY: COMPARITIVE SURVEY BETWEEN PAGE RANK, HITS, SALSA AND HEIGEN
his paper presents the comparative study of ranking algorithm such as PageRank, HITS, SALSA and Heigen. These algorithms share a common factor that is it finds the principal eigen vector. We experimented the...
A MOBILE MULTIMEDIA CLOUD COMPUTING ON THE WEB
The terms “Corporate governance” is a new buzzword of the 21st century. In fact the word “governance” is used for addressing all the issues. Generally the word “governance” is used for governing the country or a state wh...