15 research outputs found

    A Step towards a Solution to Information Privacy Problem on Online Social Networks

    Get PDF
    Online social networks, such as Facebook and Twitter, have gained popularity in recent years. With that popularity, come security problems, especially problems with information privacy. This paper provides an overview of information privacy issues for online social networks. One way to solve this problem is to use cryptography. However, cryptography on online social networks has not been studied exclusively. Most works have been done on access control. The main issue with cryptography is the number of keys needed to encrypt and decrypt the information. The most obvious number of keys would be to use one key for every user in our group of friends. This is not needed or entirely true as we show here. This paper, therefore, gives an attempt to show that the number of keys needed to achieve secure sharing among friends can in fact be much smaller than the number of friends. The number of keys can actually be reduced by approximately 500% on average, using the method presented here. We also provide proofs of correctness and security to confirm our claim

    Analysis of Organizational Vulnerability using Social Network Analysis and Attack Graph

    Get PDF
    The purpose of this paper is to develop an approach to analyze organizational vulnerability caused by its employees. The proposed approach is adapted from general attack graph analysis approach and social network analysis approach.  The attack graph, which is relationship graph in this proposed approach, is created from organization’s email logs and virus reports. The relationship graph is analyzed using shortest path analysis to discover all possible attack paths start from risky employees to target employee, and then grouped by path length for further actions based on security policy. The proposed approach was tested using datasets that are limited to only one month with assumption that weight on all edges are equal. This paper suggested further study to improve accuracy of the proposed approach using other mathematical methods such as shortest path analysis with weight or Markov Chains. The proposed approach could also be used by security audit in risk assessment process

    An Analysis of Graph Properties for Detecting Sybil Nodes in Social Networks

    Get PDF
    This research concerns the analysis of social networks using graph theory to find properties that can be used to determine Sybil nodes. This research also investigated the mixing time, which is one of the properties that many existing methods use for detecting Sybil attacks. The results showed that the mixing time does not reflect the difference between honest graphs and Sybil graphs. In addition, the properties of social graphs were studied and it was found that the average node distance is different in graphs containing Sybil nodes than in graphs with only honest nodes. Furthermore, the eigenvector centrality and the degree of Sybil nodes are correlated, while in honest nodes they are not

    Finding a suitable threshold value for an iris-based authentication system

    Get PDF
    Authentication is the first line of defense of any information technology systems. One of the popular methods used today is biometric, and iris authentication is gaining popularity. However, the threshold value is deemed to be secure and appropriate has not been thoroughly studied. Threshold is a value that defines the acceptable amount of the correct bits of the image before securely passing the authentication process. Therefore, the main aim of this research was to find a secure and suitable threshold value used in iris authentication system, where iris localization was done by using Circle Hough Transform technique. Iris image databases v.4 from the Chinese Academy of Sciences Institute of Automatic (CASIA) were used in this research. The way to find the appropriate threshold was to test for the right balance of the GAR, FRR and FAR values when trying to verify the person’s identity. The results of the test revealed that the appropriate threshold had the value of 72.9246 percent of all the available bits of the iris image. Both had a high GAR and very low FAR and FRR values.  It can be concluded that the obtained threshold value was suitable and secure

    Finding the Optimal Value for Threshold Cryptography on Cloud Computing

    Get PDF
    The objective of using threshold cryptography on cloud environment is to protect the keys, which are the most important elements in cryptographic systems. Threshold cryptography works by dividing the private key to a number of shares, according to the number of virtual machines, then distributing them each share to each virtual machine. In order to generate the key back, not all the shares are needed. Howerver, the problem is that there has been no research attemping to find a suitable threshold value for key reconstruction. Therefore, this paper presented a guildline designed and implemented that can assist to choose such value. The experiment was setup using CloudSim to simulate cloud environment and collecting time taken in key distribution and key reconstruction process to achieve the optimal threshold value

    A Study of Password Management Behaviors of Young People

    Get PDF
    Password-based authentication is still the most widely used authentication method today. Unfortunately, passwords are the main culprit leading to cyberattacks. This study examines the behaviors of young people towards password generation and usage. The young people will ultimately become the future for society. An online survey with a sample of 265 respondents aged 10–24 was conducted between April and August 2021. The research utilized descriptive statistical analyses and compared the responses from young people with older people. The results suggest that although the survey participants seemed to have basic knowledge of creating complex passwords, they still possessed some aspects, which could lead to being a cyberattack target. This preliminary study provides information and increases awareness for policymakers and educators in such a way that it could be used to create an educational program on the importance of managing passwords securely. In addition, the study provides insights into the password management of young people between the ages of 10 and 24

    12th International Conference on Computing and Information Technology

    No full text
    This proceedings book presents recent research work and results in the area of communication and information technologies. The chapters of this book contain the main, well-selected and reviewed contributions of scientists who met at the 12th International Conference on Computing and Information Technology (IC2IT) held during 7th - 8th July 2016 in Khon Kaen, Thailand The book is divided into three parts: “User Centric Data Mining and Text Processing”, “Data Mining Algoritms and their Applications” and “Optimization of Complex Networks”
    corecore