Analysis and Evaluation of Security and Privacy in Mobile Social Networks

فایل این در 16 صفحه با فرمت PDF قابل دریافت می باشد

  • من نویسنده این مقاله هستم

استخراج به نرم افزارهای پژوهشی:

لینک ثابت به این :

چکیده :

The revolution in the two dimensions of information and communication has changed and transformed various aspects of human life. In other words, the behaviors and interactions of individuals have been greatly affected by the changes and transformations in the two aforementioned dimensions. The emergence of new technologies in both dimensions has provided very powerful platforms and tools for the formation of thoughts and communication between different people from different places. In line with these remarkable developments, everyone has been able to provide a lot of new information in various ways and in a wide range of dimensions and scope to a wide range of their fellow human beings. One of the most important communication and information tools between individual humans is mobile phones, especially smart phones. Also, the expansion of social networks in the Internet space, which is actually considered one of the foundations of the new revolution, has provided a very powerful and suitable platform for exchanging information and communicating between different people. Mobile social networks are a comprehensive software platform and a cyberspace in which smartphones that are physically close to each other can create a wireless network. So that people can easily carry out a dating process in public spaces such as airports, coffee shops, and theaters by sharing their interests with those who are nearby. With this development and increased use, there is still a concern in the hearts of people. Given that a lot of information and data is stored and shared in people's personal profiles, the most important issue in such situations is security and personalization. In this study, an attempt has been made to introduce and fully investigate a secure dating protocol in mobile social networks. The present study, focusing on a model of a secure dating process in mobile social networks, examines its impact on social networks and analyzes existing problems. So that by using this profile protocol, users are able to communicate with each other without being fully familiar with each other's complete personal details. In the following, to improve the execution time of the protocol, a high-performance encryption algorithm is used and it is shown that by applying this algorithm and the possibility of using a long-length encryption key while maintaining efficiency, the security of the protocol is significantly increased. The results of the implementation and experiments as well as the evaluations indicate that the efficiency of the proposed protocol in terms of execution time has been significantly improved.

نویسندگان

مبین ارتقایی

کارشناس ارشد امنیت شبکه

مراجع و منابع این :

لیست زیر مراجع و منابع استفاده شده در این را نمایش می دهد. این مراجع به صورت کاملا ماشینی و بر اساس هوش مصنوعی استخراج شده اند و لذا ممکن است دارای اشکالاتی باشند که به مرور زمان دقت استخراج این محتوا افزایش می یابد. مراجعی که مقالات مربوط به آنها در سیویلیکا نمایه شده و پیدا شده اند، به خود لینک شده اند :
  • 1. Etuh, E., Bakpo, F. S., and Agozie, H. E. ...
  • Preventive Mechanisms: A Review', Science Direct, Volume 140,14 (2022). ...
  • 2. Yue, H., He, S., & Liu, Z. Social Media ...
  • Legitimate Promotion or Security Vulnerability? IEEE Access, volume 140 , ...
  • 3. Pattnaik, N., Li, S., and Nurse, J. R. C. ...
  • Security and Privacy: An Analysis of Online Discussions on Twitter', ...
  • volume 125 , 15 (2022) ...
  • 4. Gordhan Jethava a, Udai Pratap Rao b ,Exploring security ...
  • social networks: An extensive review, volume 140 ,13 (2023). ...
  • 5. F. Yang, Y. Wang, F.u. Chunlei, H.u. Chunqiang, A. ...
  • Blockchain-Based Bidirectional Friends Matching Scheme in Social Networks IEEE ...
  • Access, 8 (2020), pp. 150902-150913, 10.1109/ACCESS.2020.3016986 ...
  • 6. B. N. S. V. R. S. A. Goparaju, Y. ...
  • S. Kolachana, "Understanding Security and Privacy Issues in Social Media ...
  • 2024 3rd International Conference on Applied Artificial Intelligence and Computing ...
  • (ICAAIC), Salem, India, 2024, pp. 1538-1542, doi: ...
  • 10.1109/ICAAIC60222.2024.10575254. ...
  • 7. Mohammadi, A. & Hamidi, Hoda. (2018). Analysis and Evaluation ...
  • Behavior and Information Disclosure Concerns in Online Social Networks. International ...
  • Journal of Engineering, Transactions B: Applications. 31. 1234-1239. ...
  • 10.5829/ije.2018.31.08b.11. ...
  • 8. Jain, A.K., Sahoo, S.R. & Kaubiyal, J. Online social ...
  • comprehensive review and analysis. Complex Intell. Syst. 7, 2157–2177 (2021). ...
  • https://doi.org/10.1007/s40747-021-00409-7 ...
  • 9. K. Puttaswamy et al., Preserving Location Privacy in Geo-Social ...
  • Mobile Computing,2013 ...
  • 10. ComScore [Online]. Available: http://www.comscoredatamine.com/ Accessed: 4 Apr. 2014 ...
  • 11. Weinstein, E. (2018). The social media see-saw: Positive and ...
  • adolescents’ affective well-being. New Media & Society, 20(10), 3597-3623. X.Liang, ...
  • K.Zhang And X.Shen, SECURITY AND PRIVACY IN MOBILE SOCIAL NETWORKS: ...
  • CHALLENGES AND SOLUTIONS : IEEE, February 2014 ...
  • 12. M. Motani, V. Srinivasan, and P. Nuggehalli, Peoplenet: Engineering ...
  • Social Network, Proc. MobiCom, 2005, pp. 243–57 ...
  • 13. Ademiluyi, A., Li, C., & Park, A. (2022). Implications ...
  • and social exclusion in social media: systematic review. JMIR formative ...
  • e30286. ...
  • 14. Kumar Birthriya, S., & Jain, A. K. (2022). A ...
  • Detection and Protection Techniques. Information Security Journal: A Global ...
  • Perspective, 31(4), 411-440. ...
  • 15. Etuh, E., & Bakpo, F. S. (2022). Social Media ...
  • Mechanisms: A Review. arXiv preprint arXiv:2201.03330. ...
  • 16. Jain, A. K., Sahoo, S. R. & Kaubiyal, J. ...
  • privacy: comprehensive review and analysis. Complex Intell. Syst. 7, 2157–2177. ...
  • https://doi.org/10.1007/s40747-021-00409-7 ...
  • 17. Giumetti, G. W., & Kowalski, R. M. (2022). Cyberbullying ...
  • being. Current Opinion in Psychology, 101314. ...
  • 18. Chetioui, K., Bah, B., Alami, A. O., & Bahnasse, ...
  • engineering attacks on social networks. Procedia Computer Science, 198, 656-661. ...
  • 19. I. Mutambik, A. Almuqrin, Y. Liu, M. Alhossayin, and ...
  • on information sharing and privacy concerns on social networking sites: ...
  • users,’’ J. Global Inf. Manage., vol. 29, no. 3, pp. ...
  • 20. L. Floridi, "Soft ethics the governance of the digital ...
  • Regulation", Philosophical Transactions of the Royal Society A, vol. 377, ...
  • 20180081, 2019. ...
  • 21. D. E. Knuth, The Art of Computer Programming, Volume ...
  • Reading, MA, USA: Addison-Wesley, 1997. ...
  • 22. R. Rivest, Unconditionally secure commitment and oblivious transfer schemes ...
  • private channels and a trusted initializer, unpublished. ...
  • 23. P. Nyoni and M. Velempini (2013), "An evaluation of ...
  • networks," 2013 Pan African International Conference on Information Science, Computing ...
  • and Telecommunications (PACT), Lusaka, Zambia, 2013, pp. 45-49, doi: ...
  • 10.1109/SCAT.2013.7055087. ...
  • 24. Liang, Xiaohui & Zhang, Kuan & Shen, Xuemin & ...
  • privacy in mobile social networks: Challenges and solutions. Wireless Communications, ...
  • IEEE. 21. 33-41. 10.1109/MWC.2014.6757895. ...
  • 25. H. Zhu ,S. Du, M. Li And Z. Gao, ...
  • Matching Protocol in Mobile Social Networks:IEEE 2013 ...
  • 26. H. Zhu, X. Lin, R. Lu, Y. Fan, and ...
  • incentive scheme for delay-tolerant networks, IEEE Trans. Veh. Technol., vol. ...
  • pp. 828_836, Oct. 2009. ...
  • 27. H. Zhu, X. Lin, R. Lu, P.-H. Ho, and ...
  • billing scheme for wireless mesh networks, IEEE Trans. Wireless Commun., ...
  • 10, pp. 3858_3868, Oct. 2008. ...
  • 28. N. Eagle and A. Pentland, Social serendipity: Mobilizing social ...
  • Comput., vol. 4, no. 2, pp. 28_34, Apr. 2005. ...
  • 29. Z. Yang, B. Zhang, J. Dai, A. C. Champion, ...
  • Distributed Mobile System for Social Networking in Physical Proximity, in ...
  • International Conference on Distributed Computing Systems, Jun. 2010, pp. 468–47 ...
  • نمایش کامل مراجع