A Multi Secret Sharing Approach for Vulnerability Identification in Social Media
DOI:
https://doi.org/10.25212/lfu.qzj.2.2.05الكلمات المفتاحية:
Social Media, OSN, Vulnerability, Shamir Access Sharingالملخص
Online Social Networks (OSN)s become a suitable channel for attackers and threats to break system’s security and disclose privacies. In the few years, the demand on keeping OSN users safe from attackers was the trend of researchers. However, it was not a challenge-less process. The most significant challenge was the awareness of the OSN users about their vulnerability level. Works have been achieved to identify relations between OSN user vulnerability and the policies that used by attackers to penetrate systems, and then providing solutions, which were in the form of awareness that difficult for OSN users understand them. Different techniques, such as statistical and datamining tools, have been provided utilized to provide solutions for identifying vulnerabilities, however, target formation was still in primitive stages. This work presents a secrete sharing approach for computing the vulnerability percent of OSN users. The approach computes the rate of the vulnerability of an OSN user based on a polynomial equation.
التنزيلات
المراجع
Contributors:, et al. Security Issues and Recommendations for Online Social Networks. 2007. 1, 36.
Franchi, E., A. Poggi, and M. Tomaiuolo, Information and password attacks on social networks: An argument for cryptography. Journal of Information Technology Research (JITR), 2015. 8(1): p. 25-42.
Savage, D., et al., Anomaly detection in online social networks. Social Networks, 2014. 39: p. 62-70.
Hassanzadeh, R., Anomaly detection in online social networks: using data-mining techniques and fuzzy logic. 2014.
Abubaker, F.R. and P.S. Boluk. An Intelligent Model for Vulnerability Analysis of Social Media User. in Future Internet of Things and Cloud Workshops (FiCloudW), IEEE International Conference on. 2016. IEEE.
Sadeghian, A., M. Zamani, and B. Shanmugam. Security threats in online social networks. in Informatics and Creative Multimedia (ICICM), 2013 International Conference on. 2013. IEEE.
Fire, M., R. Goldschmidt, and Y. Elovici, Online Social Networks: Threats and Solutions. 2013.
Fire, M., R. Goldschmidt, and Y. Elovici, Online Social Networks: Threats and Solutions. Communications Surveys & Tutorials, IEEE, 2014. 16(4): p. 2019-2036.
Gao, H., et al., Security issues in online social networks. Internet Computing, IEEE, 2011. 15(4): p. 56-63.
Daniel, W., et al., PRIVACY ISSUES IN ONLINE SOCIAL NETWORKS: USER BEHAVIORS AND THIRD-PARTY APPLICATIONS. 2014.
Zhang, C., et al., Privacy and security for online social networks: challenges and opportunities. Network, IEEE, 2010. 24(4): p. 13-18.
Guha, S., K. Tang, and P. Francis. NOYB: Privacy in online social networks. in Proceedings of the first workshop on Online social networks. 2008. ACM.
Daniel, W., et al., PRIVACY ISSUES IN ONLINE SOCIAL NETWORKS: USER BEHAVIORS AND THIRD-PARTY APPLICATIONS.
التنزيلات
منشور
كيفية الاقتباس
إصدار
القسم
الرخصة
الحقوق الفكرية (c) 2017 Saman Mirza Abdullah
هذا العمل مرخص بموجب Creative Commons Attribution-NonCommercial-ShareAlike 4.0 International License.
Qalaai Zanist Journal allows the author to retain the copyright in their articles. Articles are instead made available under a Creative Commons license to allow others to freely access, copy and use research provided the author is correctly attributed.
Creative Commons is a licensing scheme that allows authors to license their work so that others may re-use it without having to contact them for permission