A Authentication model to Trustees based Social Networks

Abstract

authenticating users with the help of their friends has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to user’s trustees. The user must obtain at least k reset his or her password. In this paper, we provide the first systematic study about the security of trustee based social authentications. In particular, we first introduce verification codes from the trustees before being directed to small framework of attacks, which attacks. In these attacks, an attacker initially obtains we call forest fire iteratively, attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to for attackers. Moreover, we introduce number of compromised users, and then the attacker a novel various defense formalize the threats of forest fire attacks and their costs strategies. Evaluate various concrete attack and defense our results have finally, we apply our framework to strategies using three real world social network datasets. Extensively strong implications for the design of more secure trustee-based social authentications.

Authors and Affiliations

Sravya Lakshmi Malyala| PG Scholar, Pydah College of Engineering, Kakinada, AP, India, E-mail: r sravya.malayala@gmail.com, D. Ramesh| Assistant Professor, Pydah College of Engineering, Kakinada, AP, India

Keywords

Related Articles

Precision Controlled Secrecy Stabilization In Relational Data

The precision control approaches characterize choice predicates precision to parts while the secrecy stabilization is to support the k-anonymity or l-diversity. A SSPPM it will full fill the admittance control and lo...

Sheltered Compound Vendor Data Apportioning For Vibrant Clusters In The Cloud

Cloud computing is an emerging computing paradigm in which resources of the computing infrastructure are provided as services over the Internet. Sharing data in a multiowner manner while preserving data and identity...

We propose a novel locality sensitive low-rank model for picture label finishing, which approximates the worldwide nonlinear model with a gathering of neighbourhood direct models. To viably imbue the possibility of t...

In this work, a hierarchical access control method using a modified hierarchical attribute-based encryption (M-HABE) and a modified three-layer structure is proposed. Varying from the current ideal models, for exampl...

Enhancing Inquiry Responsive Time To Discover Spatial Items With Keywords

Routine spatial questions, for example, reach hunt and closest neighbor recovery, include just conditions on objects' geometric properties. Today, numerous cutting edge applications call for novel types of inquiries...

Download PDF file
  • EP ID EP16703
  • DOI -
  • Views 317
  • Downloads 12

How To Cite

Sravya Lakshmi Malyala, D. Ramesh (2015). A Authentication model to Trustees based Social Networks. International Journal of Science Engineering and Advance Technology, 3(12), 1374-1378. https://www.europub.co.uk/articles/-A-16703