z-logo
open-access-imgOpen Access
Prevention of Clone Attack in Online Social Media Integrating Secure Data Transmission
Author(s) -
Abishek Kashyap. S
Publication year - 2021
Publication title -
international journal for research in applied science and engineering technology
Language(s) - English
Resource type - Journals
ISSN - 2321-9653
DOI - 10.22214/ijraset.2021.35662
Subject(s) - computer science , computer security , internet privacy , world wide web , cryptography , anonymity , permission , social network (sociolinguistics) , social media , trojan , cloud computing , malware , encryption , political science , law , operating system
Social networking is becoming so essential nowadays and is playing a bigger role in every man’s life for sharing information and knowledge. Also social network is used to see the everyday activities, photos, videos, political agendas and propagandas. Therefore, it is now becoming an important tool to stay updated in this dynamic world. With large chunks of data being generated every second, there is a growing concern about Data protection and user privacy in the Social media network. One of the major concerns being, ‘Fake Users’ - misusing the authorized user’s information like photos and videos without the authorized user’s permission and disguising oneself as a legitimate user. In our contemporary world, many fake profiles are being created for fraudulent activities like money making, malware / virus / Trojan distribution to use user data, especially with malicious intent. In this paper Java static watermarking is proposed. Java static watermark is used in our social media website in order to associate each user's footprint with respect to their unique ID, eliminating the crux of fake users. It is also very evident to say that data present on the cloud is no less prone to cyber-attacks. In this paper, integration of steganography methods for protection of sensitive data on the public cloud server is also proposed to validate its viability and its increased security. The Algorithms used ensure the individual information is kept secret and transmitted in a secure manner with user privacy preserving.

The content you want is available to Zendy users.

Already have an account? Click here to sign in.
Having issues? You can contact us here