A Design of Secure Confront based Social Network for Exigency and Trade-offs
||International Journal of Computer Trends and Technology (IJCTT)|
|© 2014 by IJCTT Journal|
|Year of Publication : 2014|
|Authors : Vishal Moluguri , Raghavendra Rao , Janapati Venkata Krishna|
Vishal Moluguri , Raghavendra Rao , Janapati Venkata Krishna. "A Design of Secure Confront based Social Network for Exigency and Trade-offs". International Journal of Computer Trends and Technology (IJCTT) V16(4):153-155, Oct 2014. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.
Encounter-based social network and encounter-based systems link users who share a location at the same time, as apprised to the traditional social network model of joining users who have an offline friendship. The new access presents provocations that are basically different from those social network designs tackled by earlier. In this paper we survey the functional and security requirement for the new scheme, such as possibility, safety, and secrecy, for building secure encounter-based social network present several design options. For highlight the challenges we analyse one recently implemented encounter based social network design and match it to a set of idealized security and service requirements. We show that it is ready to many attacks, including imitation, complicity, and secrecy breaching, even though it was designed clearly for security. Attentive of the possible trap, for secure encounter-based social networks we construct a flexible framework; we derived two construction examples for this framework in terms of the ideal exigency. Comparing to previous work our new designs meets more exigencies in terms of system security, reliability, and privacy. Analysis highlights for encrypting and decrypting data we use DES-Algorithm, with that concept the secure data will never take or corrupt by neither some one other nor leakage of data.
 Android Broadcast Documentation. http://goo.gl/FTxzV.
 A. Acquisti, R. Gross, and F. Stutzman. Faces of facebook: Privacy in the age of augmented reality. In lackHat, 2011.
 Android development kit. http://developer.android.com, October 2010.
 Apple Inc. Apple iOS Networking & Internet. http://developer.apple.com/technologies/ios/networking.html, October 2010.
 A. Beach, M. Gartrell, S. Akkala, J. Elston, J. Kelley, K. Nishimoto, B. Ray, S. Razgulin, K. Sundaresan, B. Surendar, M. Terada, and R. Han. Whozthat? evolving an ecosystem for context-aware mobile social networks. IEEE Network, 22(4):50–55, 2008.
 Bluetooth. Bluetooth Specification Version 4.0. Bluetooth SIG, 2010.
 Brightkite. http://brightkite.com/, October 2010.
 Bump. iPhone and Android application. bu.mp/, 10 2010 .
 C.-H. O. Chen, C.-W. Chen, C. Kuo, Y.-H. Lai, J. M.McCune, A. Studer, A. Perrig, B.-Y. Yang, and T.-C. Wu. GAnGS: gather, authenticate ’n group securely. In MOBICOM, pages 92–103, 2008.
 R. J. Clark, E. Zasoski, J. Olson, M. H. Ammar, and E. W. Zegura. Dbook: a mobile social networking application for delay tolerant networks. In Challenged Networks, pages 113–116, 2008.
 CMS Wire. Android dominates burgeoning us smartphone market. http://goo.gl/WZ4tZ, August 2012.
Social network, Location-based services, Privacy