CFP last date
20 May 2024
Reseach Article

Review on Security Networking Site with Issues

Published on November 2015 by Shilpa A. Jadhao
National Conference on Recent Trends in Mobile and Cloud Computing
Foundation of Computer Science USA
NCRMC2015 - Number 2
November 2015
Authors: Shilpa A. Jadhao
6656eb43-31fa-446a-8866-9acb2f63f0df

Shilpa A. Jadhao . Review on Security Networking Site with Issues. National Conference on Recent Trends in Mobile and Cloud Computing. NCRMC2015, 2 (November 2015), 11-14.

@article{
author = { Shilpa A. Jadhao },
title = { Review on Security Networking Site with Issues },
journal = { National Conference on Recent Trends in Mobile and Cloud Computing },
issue_date = { November 2015 },
volume = { NCRMC2015 },
number = { 2 },
month = { November },
year = { 2015 },
issn = 0975-8887,
pages = { 11-14 },
numpages = 4,
url = { /proceedings/ncrmc2015/number2/23317-2915/ },
publisher = {Foundation of Computer Science (FCS), NY, USA},
address = {New York, USA}
}
%0 Proceeding Article
%1 National Conference on Recent Trends in Mobile and Cloud Computing
%A Shilpa A. Jadhao
%T Review on Security Networking Site with Issues
%J National Conference on Recent Trends in Mobile and Cloud Computing
%@ 0975-8887
%V NCRMC2015
%N 2
%P 11-14
%D 2015
%I International Journal of Computer Applications
Abstract

Person to person communication locales, for example, Myspace, Facebook and Flickr, are increasing more fame among Internet clients. As clients are getting a charge out of this new style of systems administration, protection concerns are likewise drawing in expanding open consideration because of reports about security breaks on long range informal communication locales. We propose FaceCloak, a structural planning that ensures client security on an interpersonal interaction site by protecting a client's close to home data from the site and from different clients that were not expressly approved by the client. In the meantime, FaceCloak consistently keeps up ease of use of the site's administrations. FaceCloak accomplishes these objectives by giving fake data to the long range informal communication site and by putting away delicate data in encoded structure on a different server. We executed a Firefox program augmentation for the Facebook stage. Here investigations demonstrate that an answer effectively hides a client's close to home data, while permitting the client and her companions to investigate Facebook pages and administrations of course.

References
  1. A. Mislove, M. Marcon, K. P. Gummadi, P. Druschel, and B. Bhattacharjee,"Measurement and analysis of online social networks," in Proceedings of the 5th ACM/USENIX Internet Measurement Conference (IMC'07), October 2007.
  2. "Global internet use reaches 1 billion," http://www. comscore. com/press/release. asp?press=2698.
  3. "Facebookstatistics",http://www. facebook. com/press/info. php?statistics.
  4. A. Tootoonchian, K. K. Gollu, S. Saroiu, Y. Ganjali, and A. Wolman,"Lockr: social access control for web 2. 0," in WOSP '08: Proceedings of the first workshop on Online social networks. New York, NY, USA: ACM, 2008, pp. 43–48.
  5. Becker,"Bluetoothsecurity&hacks,"http://gsyc. es/_anto/ubicuos2/bluetooth security and hacks. pdf.
  6. L. Sweeney, "k-anonymity: a model for protecting privacy," International Journal on Uncertainty, Fuzziness and Knowledge-based Systems, vol. 10, no. 5, pp. 557–570, 2002.
  7. TechCrunch, "Facebook Now Nearly Twice The Size Of MySpace Worldwide," http://www. techcrunch. com/2009/01/22/facebook-now-nearly-twice-the-size-of-myspace-worldwide, January2009, accessed April 2009.
  8. M. M. Lucas and N. Borisov, "flyByNight: Mitigating the Privacy Risks of Social Networking," in Proc. of 7th ACM Workshop on Privacy in the Electronic Society (WPES 2008), October 2008, pp. 1–8.
  9. S. Guha, K. Tang, and P. Francis, "NOYB: Privacy in Online Social Networks," in Proc. of 1st Workshop on Online Social Networks(WOSN 2008), August 2008, pp. 49–54.
  10. A. Felt and D. Evans, "Privacy Protection for Social Networking Platforms," in Proc. of Web 2. 0 Security and Privacy (W2SP 2009),May 2008.
  11. A. Acquisti and R. Gross, "Imagined Communities:
  12. Awareness, Information Sharing, and Privacy on the Facebook," in Proc. of 6thWorkshop on Privacy Enhancing Technologies (PET 2006), June 2006,pp. 36–58
Index Terms

Computer Science
Information Sciences

Keywords

Security Issues Facecloak Facebook Etc.