Establishing a Trust-Worthy Social Authentications
Journal Title: International Journal of Science Engineering and Advance Technology - Year 2015, Vol 3, Issue 8
Abstract
Among the several backup authentication mechanisms, authenticating users with the help of their friends (i.e., trustee-based social authentication) has been shown to be a promising backup authentication mechanism. A user in this system is associated with a few trustees that were selected from the user’s friends. When the user wants to regain access to the account, the service provider sends different verification codes to the user’s trustees. The user must obtain at least k (i.e., recovery threshold) verification codes from the trustees before being directed to reset his or her password. In this paper, we provide the first systematic study about the security of trusteebased social authentications. In particular, we first introduce a novel framework of attacks, which we call forest fire attacks. In these attacks, an attacker initially obtains a small number of compromised users, and then the attacker iteratively attacks the rest of users by exploiting trustee-based social authentications. Then, we construct a probabilistic model to formalize the threats of forest fire attacks and their costs for attackers. Moreover, we introduce various defense strategies. Finally, we apply our framework to extensively evaluate various concrete attack and defense strategies using three real-world social network datasets. Our results have strong implications for the design of more secure trustee-based social authentications.
Authors and Affiliations
Dakupati Omprakash| M.Tech (Information Technology), S.R.K.R ENGINEERING COLLEGE, A.P., India, K. Satyanarayana Raju| ASSISTANT PROFESSOR, Dept. Of Information Technology, S.R.K.R ENGINEERING COLLEGE, A.P., India
We propose a customized web look (PWS) framework called UPS that can adaptively entirety up profiles by request while with respect to customer demonstrated assurance requirements. Our runtime hypothesis goes for stri...
A Deniable Cp-Abe Scheme For An Audit-Free Cloud Storage Service
To brawl against outside coercion, we meant to build an encryption scheme that could help cloud storage providers keep away from this quandary. In our move toward, we present cloud storage providers means to create f...
We propose a shared data based algorithm that analytically chooses the optimal feature for classification. This common information based component choice calculation can manage straightly and nonlinearly subordinate...
A Reconfigurable Less Power Asynchronous FPGA Design with Power Gating and Level encoding dual rail technique
The implementation of a low power logic based asynchronous circuit with the help of power gated logic. In asynchronous power gated logic (APL) circuit, each pipeline stage was incorporated with efficient charge recov...
Development Of Antirigging Voting System Using Biometrics Based On Adharcard Numbering
Now a days voting process is exercised by using EVM(Electronic voting machine). In this paper we present and use implementation is to implement the development of anti rigging voting system using finger print .The pu...