Establishing a Trust-Worthy Social Authentications

Abstract

Among the several backup authentication mechanisms, authenticating users with the help of their friends (i.e., trustee-based social authentication) has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to the user’s trustees. The user must obtain at least k (i.e., recovery threshold) verification codes from the trustees before being directed to reset his or her password. In this paper, we provide the first systematic study about the security of trusteebased social authentications. In particular, we first introduce a novel framework of attacks, which we call forest fire attacks. In these attacks, an attacker initially obtains a small number of compromised users, and then the attacker iteratively attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to formalize the threats of forest fire attacks and their costs for attackers. Moreover, we introduce various defense strategies. Finally, we apply our framework to extensively evaluate various concrete attack and defense strategies using three real-world social network datasets. Our results have strong implications for the design of more secure trustee-based social authentications.

Authors and Affiliations

Dakupati Omprakash| M.Tech (Information Technology), S.R.K.R ENGINEERING COLLEGE, A.P., India, K. Satyanarayana Raju| ASSISTANT PROFESSOR, Dept. Of Information Technology, S.R.K.R ENGINEERING COLLEGE, A.P., India

Keywords

Related Articles

Experimental Investigation of Ice Accretion Effect On NACA 0018 Airfoil

Accretion of ice on aircraft wing is one of the most significant hazards to the safe and efficient operation of aircraft as it can reduce aircraft performance in a number of ways. Ice particles adhere to the wing sur...

Cloud computing services have turned into the worldview of vast scale framework where a provider gives shared virtual computing and storage assets to a customer. The service provider infrastructure converts into cost...

Pv Based Interline Dynamic Voltage Restoring Device For Mitigation Of Power Quality Problems

Now a days the renewable energy sources importance has increased in the distribution system. In this paper an interline dynamic voltage restorer (IDVR) has proposed for the distribution systems to mitigate voltage sa...

We propose a safe information sharing plan for dynamic individuals. Initially, we propose a protected path for key conveyance with no safe correspondence channels, and the clients can safely get their private keys fr...

As innovation quickly increments, various detecting and versatility abilities have turned out to be promptly accessible to gadgets and thusly portable impromptu systems (MANETs) are being conveyed to play out various...

Download PDF file
  • EP ID EP16522
  • DOI -
  • Views 324
  • Downloads 15

How To Cite

Dakupati Omprakash, K. Satyanarayana Raju (2015). Establishing a Trust-Worthy Social Authentications. International Journal of Science Engineering and Advance Technology, 3(8), 312-317. https://europub.co.uk./articles/-A-16522