A Multi Secret Sharing Approach for Vulnerability Identification in Social Media

Authors

  • Saman Mirza Abdullah Software Engineering, Koya University - Iraq

DOI:

https://doi.org/10.25212/lfu.qzj.2.2.05

Keywords:

Social Media, OSN, Vulnerability, Shamir Access Sharing

Abstract

Online Social Networks (OSN)s become a suitable channel for attackers and threats to break system’s security and disclose privacies. In the few years, the demand on keeping OSN users safe from attackers was the trend of researchers.  However, it was not a challenge-less process. The most significant challenge was the awareness of the OSN users about their vulnerability level. Works have been achieved to identify relations between OSN user vulnerability and the policies that used by attackers to penetrate systems, and then providing solutions, which were in the form of awareness that difficult for OSN users understand them. Different techniques, such as statistical and datamining tools, have been provided utilized to provide solutions for identifying vulnerabilities, however, target formation was still in primitive stages. This work presents a secrete sharing approach for computing the vulnerability percent of OSN users. The approach computes the rate of the vulnerability of an OSN user based on a polynomial equation.

Downloads

Download data is not yet available.

References

Contributors:, et al. Security Issues and Recommendations for Online Social Networks. 2007. 1, 36.

Franchi, E., A. Poggi, and M. Tomaiuolo, Information and password attacks on social networks: An argument for cryptography. Journal of Information Technology Research (JITR), 2015. 8(1): p. 25-42.

Savage, D., et al., Anomaly detection in online social networks. Social Networks, 2014. 39: p. 62-70.

Hassanzadeh, R., Anomaly detection in online social networks: using data-mining techniques and fuzzy logic. 2014.

Abubaker, F.R. and P.S. Boluk. An Intelligent Model for Vulnerability Analysis of Social Media User. in Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on. 2016. IEEE.

Sadeghian, A., M. Zamani, and B. Shanmugam. Security threats in online social networks. in Informatics and Creative Multimedia (ICICM), 2013 International Conference on. 2013. IEEE.

Fire, M., R. Goldschmidt, and Y. Elovici, Online Social Networks: Threats and Solutions. 2013.

Fire, M., R. Goldschmidt, and Y. Elovici, Online Social Networks: Threats and Solutions. Communications Surveys & Tutorials, IEEE, 2014. 16(4): p. 2019-2036.

Gao, H., et al., Security issues in online social networks. Internet Computing, IEEE, 2011. 15(4): p. 56-63.

Daniel, W., et al., PRIVACY ISSUES IN ONLINE SOCIAL NETWORKS: USER BEHAVIORS AND THIRD-PARTY APPLICATIONS. 2014.

Zhang, C., et al., Privacy and security for online social networks: challenges and opportunities. Network, IEEE, 2010. 24(4): p. 13-18.

Guha, S., K. Tang, and P. Francis. NOYB: Privacy in online social networks. in Proceedings of the first workshop on Online social networks. 2008. ACM.

Daniel, W., et al., PRIVACY ISSUES IN ONLINE SOCIAL NETWORKS: USER BEHAVIORS AND THIRD-PARTY APPLICATIONS.

Downloads

Published

2021-01-24

How to Cite

Saman Mirza Abdullah. (2021). A Multi Secret Sharing Approach for Vulnerability Identification in Social Media. QALAAI ZANIST JOURNAL, 2(2), 44–50. https://doi.org/10.25212/lfu.qzj.2.2.05

Issue

Section

Articles