Open Access   Article Go Back

Data Exposure Check and A Comprehensive Login Procedure

Poonam Dabas1 , Sheeba Sharma2

Section:Research Paper, Product Type: Journal Paper
Volume-6 , Issue-6 , Page no. 732-737, Jun-2018

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v6i6.732737

Online published on Jun 30, 2018

Copyright © Poonam Dabas, Sheeba Sharma . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Poonam Dabas, Sheeba Sharma, “Data Exposure Check and A Comprehensive Login Procedure,” International Journal of Computer Sciences and Engineering, Vol.6, Issue.6, pp.732-737, 2018.

MLA Style Citation: Poonam Dabas, Sheeba Sharma "Data Exposure Check and A Comprehensive Login Procedure." International Journal of Computer Sciences and Engineering 6.6 (2018): 732-737.

APA Style Citation: Poonam Dabas, Sheeba Sharma, (2018). Data Exposure Check and A Comprehensive Login Procedure. International Journal of Computer Sciences and Engineering, 6(6), 732-737.

BibTex Style Citation:
@article{Dabas_2018,
author = {Poonam Dabas, Sheeba Sharma},
title = {Data Exposure Check and A Comprehensive Login Procedure},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {6 2018},
volume = {6},
Issue = {6},
month = {6},
year = {2018},
issn = {2347-2693},
pages = {732-737},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=2246},
doi = {https://doi.org/10.26438/ijcse/v6i6.732737}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v6i6.732737}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=2246
TI - Data Exposure Check and A Comprehensive Login Procedure
T2 - International Journal of Computer Sciences and Engineering
AU - Poonam Dabas, Sheeba Sharma
PY - 2018
DA - 2018/06/30
PB - IJCSE, Indore, INDIA
SP - 732-737
IS - 6
VL - 6
SN - 2347-2693
ER -

VIEWS PDF XML
543 355 downloads 135 downloads
  
  
           

Abstract

A Social Network is a network which comprises of countless interactions among people whether they are personal or professional. Social networks provide us with a platform to interconnect with each other through text or media in the name of messages, comments, pictures, posts, tags etc. Nowadays, the number of social networks in on an exponential rise, Facebook and Twitter etc. being the renowned ones. Social networks are vast networks which store and maintain information with respect to each user in their databases. That information is mostly contributed by the users only. That contribution being a voluntary one or an uneducated one is entirely another matter. This was the first key motive for our research. Enforcing a secure and comprehensive login process to secure the access of social accounts was the second one. In this paper, we propose a tool to evaluate the vulnerability of Facebook accounts w.r.t the privacy options provided by the social network. We also propose a reinvented login process with an aim to eradicate the perils of unauthorized access to the accounts.

Key-Words / Index Term

Social networks, SNS, Privacy, Data-exposure, Privacy check, Login Process, Reinvented

References

[1] A. Acquisti and R. Gross, “Imagined communities: Awareness, information sharing, and privacy on the Facebook,” in International workshop on privacy enhancing technologies, 2006.
[2] B. Debatin, J. P. Lovejoy, A.-K. Horn and B. N. Hughes, “Facebook and online privacy: Attitudes, behaviors, and unintended consequences,” Journal of Computer-Mediated Communication, vol. 15, pp. 83-108, 2009.
[3] R. Gross and A. Acquisti, “Information revelation and privacy in online social networks,” in Proceedings of the 2005 ACM workshop on Privacy in the electronic society, 2005.
[4] A. Hannak, P. Sapiezynski, A. Molavi Kakhki, B. Krishnamurthy, D. Lazer, A. Mislove and C. Wilson, “Measuring personalization of web search,” in Proceedings of the 22nd international conference on World Wide Web, 2013.
[5] H. R. Lipford, A. Besmer and J. Watson, “Understanding Privacy Settings in Facebook with an Audience View.,” UPSEC, vol. 8, pp. 1-8, 2008.
[6] F. Stutzman and J. Kramer-Duffield, “Friends only: examining a privacy-enhancing behavior in facebook,” in Proceedings of the SIGCHI conference on human factors in computing systems, 2010.
[7] V. Toubiana, A. Narayanan, D. Boneh, H. Nissenbaum and S. Barocas, “Adnostic: Privacy preserving targeted advertising,” 2010.
[8] A. Korolova, “Protecting privacy when mining and sharing user data,” 2012.
[9] Y. Liu, K. P. Gummadi, B. Krishnamurthy and A. Mislove, “Analyzing facebook privacy settings: user expectations vs. reality,” in Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference, 2011.
[10] K. Raynes-Goldie, “Aliases, creeping, and wall cleaning: Understanding privacy in the age of Facebook,” First Monday, vol. 15, 2010.
[11] C. Castelluccia, E. De Cristofaro and D. Perito, “Private information disclosure from web searches,” in International Symposium on Privacy Enhancing Technologies Symposium, 2010.
[12] N. Wang, H. Xu and J. Grossklags, “Third-party apps on Facebook: privacy and the illusion of control,” in Proceedings of the 5th ACM symposium on computer human interaction for management of information technology, 2011.
[13] F. Aloul, S. Zahidi and W. El-Hajj, “Two factor authentication using mobile phones,” in Computer Systems and Applications, 2009. AICCSA 2009. IEEE/ACS International Conference on, 2009.
[14] C. F. Austin, X. Wan and A. Wright, Two-factor authentication, Google Patents, 2014.
[15] A. T. B. Jin, D. N. C. Ling and A. Goh, “Biohashing: two factor authentication featuring fingerprint data and tokenised random number,” Pattern recognition, vol. 37, pp. 2245-2255, 2004.
[16] W. McKinney and P. D. Team, “Pandas—Powerful Python Data Analysis Toolkit,” Pandas—Powerful Python Data Analysis Toolkit, p. 1625, 2015.
[17] C. Dwyer, S. Hiltz and K. Passerini, “Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace,” AMCIS 2007 proceedings, p. 339, 2007.
[18] U. Maheswari and S. Balaji, “Privacy Preservation on Online Social Networking Issues and Challenges,” International Journal of Computer Sciences and Engineering, vol. 5, no. 8, pp. 215-217, 2017.
[19] B. Kasab, S. Ubale and V. Pottigar, “Enabling Privacy Preservation Technique to Protect Sensitive Data with Access Control Mechanism Using Anonymity,” International Journal of Computer Sciences and Engineering, vol. 3, no. 10, pp. 61-65, 2015.