Social Media Security based on OTP and Biometric System

Journal Title: EAI Endorsed Transactions on Cloud Systems - Year 2017, Vol 3, Issue 11

Abstract

One-time passwords are a method for validating yourself to a framework using a solitary utilize mystery that is particular to you and may have a restricted day and age of legitimacy. At the end of the day, you have two passwords. One that you know. One that is produced for you or sent to you. You need to have the two passwords to login. Digital assaults are continually advancing, so security masters must remain occupied in the lab coming up with new plans to keep them under control. Master onlookers are cheerful that another strategy called Honey Encryption will stop programmers by serving up counterfeit information for each wrong figure of the key code. This special approach backs assailants off, as well as possibly covers the right key in a sheaf of false expectations. At that point there are developing strategies like quantum key circulation, which shares keys inserted in photons over fiber optic, that may have reasonability now and numerous years into the future too. Making an OTP in an any Social media Application have turned out to be normal yet Authenticating the Application with OTP when you login each time in any online networking site. OTP code will get when you login your record in some other gadget, it request portable number and we have enter the substantial number with the goal that we will get a check code. This is one method for securing the Social media Website from Unauthorized clients.

Authors and Affiliations

A Karmel, Gulshon

Keywords

Related Articles

Modeling user and topic interactions in social networks using Hawkes processes

We present in this paper a framework to model information diffusion in social networks based on linear multivariate Hawkes processes. Our model exploits the effective broadcasting times of information by users, which gua...

Necessary & Sufficient Conditions for Consistency of Haar Wavelet Expressions to their resizable Hadoop Cluster Channels and Complexity

Abstract—We develop a novel technique for resizable Hadoop cluster’s lower bounds, the bipartite matching rectangular array of Haar Wavelet expressions. Specifically, fix an arbitrary hybrid kernel function 𝒇 ∶ {𝟎, 𝟏}𝒏 →...

A performance model of the Trusted Cloud Computing Platform VM Launch Protocol

The adoption of the cloud computing paradigm is associated with increasing security concerns. Cloud computing service models (SaaS, PaaS and IaaS) are exposed to different security threats in each level of services. The...

Fighting packet storms in mobile networks with information-centrism

Mobile application development for smartphones is a trend in the telecommunications industry. However, their deployment is not seamless since many applications are not mobile network-friendly. A key problem that frequent...

Multipath Bandwidth Scavenging in the Internet of Things

To meet the infrastructure coverage and capacity needed by future IoT applications, service providers may engage in mutually-beneficial modes of collaboration such as cooperative packet forwarding and gatewaying through...

Download PDF file
  • EP ID EP45599
  • DOI http://dx.doi.org/10.4108/eai.11-4-2018.154462
  • Views 227
  • Downloads 0

How To Cite

A Karmel, Gulshon (2017). Social Media Security based on OTP and Biometric System. EAI Endorsed Transactions on Cloud Systems, 3(11), -. https://europub.co.uk/articles/-A-45599