PRIVACY PROTECTION FOR SECURE DATA ENCRYPTION IN ONLINE SOCIAL NETWORKS
Journal Title: Elysium Journal of Engineering Research and Management - Year 2015, Vol 2, Issue 2
Abstract
Network security is an act of protecting the information from unauthorized access; it controls and monitors the security of the whole network. The threats to network security are alarmingly increasing day by day and it creates a need to protect the information stored in the network securely. If the network security is weak, it is prone to get attacked by hackers who steals the original information and sells it into the black market for their gain. To overcome this network security is used in all types of data transactions between the sender and the receiver. Now a day’s data sharing through social network is a difficult in concern with security. The data transferred from one node to another through network should be more efficient and secured. There are various mechanism proposed to avoid secure issues in the network transmission of data. The Key based Authentication provides security for data transmission in social network. The data transmitted from one end user is encrypted using the Blowfish algorithm and is decrypted by the server. It uses public key cryptography for secure purposes. The server then again encrypts the data using the rijndael algorithm and stores it securely so that the information is more secure and doesn’t attract hackers to steal the information.
Authors and Affiliations
Shridhish R. S. , Shibin Abraham shibin633@gmail. com, Subbulakshmi Mrs
A NOVEL VISUAL CRYPTOGRAPHY APPROACH FOR MEDICAL IMAGE TRANSACTIONS USING VIDEO STEGANOGRAPHY
Visual Cryptography is very essential to transfer important secret information like medical images, military secrets, bank account details and other secret information in a secure manner. This pap...
AN EFFICIENT AND SECURE POLICY UPDATE OUTSOURCING SCHEME FOR BIG DATA STORAGE IN CLOUD
Store the big data in cloud is a best and an effective option due to its high volume and velocity. Generally, the cloud has the capability to store the big data and to process the high volume of user access requests. In...
DESIGN OF LOW POWER 32-BIT CSKA FOR HIGH SPEED APPLICATIONS
Research in Very Large Scale Integration (VLSI) based design of Integrated Circuits (IC) addresses the issues of power, area and time consumption by the components used. These violates the spee...
HIGHLY ACCURATE RECOGNITION OF BODY MASS INDEX AND HUMAN DIABETICS THROUGH SENSORS
Monitoring of diabetics and BMI (Body Mass Index) is used in many medical field and research applications. This paper suggests a method for performing highly accurate recognition of pressure, sugar, he...
ANALYSIS OF BLOOD VESSEL CLASSIFICATION ALGORITHM ON RETINAL IMAGE USING C++
The proposed work is an automated system for the detection of Glaucoma which is done by using the algorithms CDR and ISNT ratio of a retinal fundus image. In general for the Glaucoma patient the s...