DOI QR코드

DOI QR Code

Improved User Privacy in SocialNetworks Based on Hash Function

  • Alrwuili, Kawthar (Department of computer Science, College of Computer and Information Sciences, Jouf University) ;
  • Hendaoui, Saloua (Department of computer Science, College of Computer and Information Sciences, Jouf University)
  • Received : 2021.12.05
  • Published : 2022.01.30

Abstract

In recent years, data privacy has become increasingly important. The goal of network cryptography is to protect data while it is being transmitted over the internet or a network. Social media and smartphone apps collect a lot of personal data which if exposed, might be damaging to privacy. As a result, sensitive data is exposed and data is shared without the data owner's consent. Personal Information is one of the concerns in data privacy. Protecting user data and sensitive information is the first step to keeping user data private. Many applications user data can be found on other websites. In this paper, we discuss the issue of privacy and suggest a mechanism for keeping user data hidden in other applications.

Keywords

Acknowledgement

The authors would like to thank the Deanship of Graduate Studies at Jouf University for funding and supporting this research through the initiative of DGS, Graduate Students Research Support (GSR) at Jouf University, Saudi Arabia.

References

  1. Kumar, Sunil, and Vikash Somani. "Social media security risks, cyber threats and risks prevention and mitigation techniques." International Journal of Advance Research in Computer Science and Management 4.4 (2018): 125-129.
  2. www.securelist.com , «"Instant" threats », Denis Maslennikov, Boris Yampolskiy, 27.05.2008.
  3. BBC News (2019, July 18). FaceApp: Chuck Schumer asks for FBI investigation. Retrieved from https://www.bbc.com/news/world-us-canada-49027155
  4. Nissenbaum, H. Privacy as Contextual Integrity. Wash. L. Rev. 2004, 79, 101-139
  5. Shozi, N.A.; Mtsweni, J. Big data privacy in social media sites. In Proceedings of the 2017 IST-Africa Week Conference (IST-Africa), Windhoek, Namibia, Southern Africa, 30 May-2 June 2017; pp. 1-6
  6. S Ali ,N Islam ,A Rauf ,I.U Din ,and M Guizani ,and Joel J. P. C. Rodrigues. Privacy and Security Issues in Online Social Networks. 22 November 2018.
  7. Mamonov, Stanislav, and Raquel Benbunan-Fich. "The impact of information security threat awareness on privacy-protective behaviors." Computers in Human Behavior 83 (2018): 32-44. https://doi.org/10.1016/j.chb.2018.01.028
  8. Lee, Phillip, et al. "Exploring privacy breaches and mitigation strategies of occupancy sensors in smart buildings." Proceedings of the 1st ACM International Workshop on Technology Enablers and Innovative Applications for Smart Cities and Communities. 2019.
  9. Botha, Johnny, W. C. Vant, and Louise Leenen. "A comparison of chat applications in terms of security and privacy." Proc. 18th Eur. Conf. Cyber Warfare Secur.. 2019.
  10. Mavroeidis, Vasileios, et al. "The impact of quantum computing on present cryptography." arXiv preprint arXiv:1804.00200 (2018).
  11. M. Campagna and C. Xing, "Quantum Safe Cryptography and Security: An Introduction, Benefits, Enablers and Challenges," ETSI, Tech. Rep. 8, 2015.
  12. Thambiraja, E., G. Ramesh, and Dr R. Umarani. "A survey on various most common encryption techniques." International journal of advanced research in computer science and software engineering 2.7 (2012).
  13. Dhivya, Mrs N., and Mrs S. Banupriya. "Network Security with Cryptography and Steganography." Int. J. Eng. Res. Technol 8.3 (2020): 1-4.
  14. Mouhib, Ibtihal. "Enhanced data security approach for cloud environment based on various encryption techniques." Journal of Theoretical and Applied Information Technology 80.3 (2015): 439.
  15. Guide, I.: Name the difference between symmetric and asymmetric cryptography. https://itinterviewguide.com/difference-between-symmetricand-asymmetric/ (2016), (Accessed on 08/29/2018)
  16. Symmetric vs. Asymmetric Encryption - What are differences? https://www.ssl2buy.com/wiki/symmetric-vsasymmetric-encryption-what-are-differences
  17. Гулієв, Нурал, and Віталій Волоховський. "SYMMETRIC AND ASYMMETRIC ENCRYPTION." Збірник наукових праць ΛΌГOΣ (2020): 88-90.
  18. Abood, Omar G., and Shawkat K. Guirguis. "A survey on cryptography algorithms." International Journal of Scientific and Research Publications 8.7 (2018): 495-516.
  19. Singh, Simar Preet, and Raman Maini. "Comparison of data encryption algorithms." International Journal of Computer Science and Communication 2.1 (2011): 125-127.
  20. Panda, Madhumita. "Performance analysis of encryption algorithms for security." 2016 International Conference on Signal Processing, Communication, Power and Embedded System (SCOPES). IEEE, 2016.
  21. Nadeem, Aamer, and M. Younus Javed. "A performance comparison of data encryption algorithms." 2005 international Conference on information and communication technologies. IEEE, 2005.
  22. Differences between Hash functions, Symmetric & Asymmetric Algorithms https://www.cryptomathic.com/newsevents/blog/differences-between-hash-functions-symmetricasymmetric-algorithms
  23. Examples of How Hashing Algorithms Work https://cheapsslsecurity.com/blog/decoded-examples-ofhow-hashing-algorithms-work/
  24. Maetouq, Ali, et al. "Comparison of hash function algorithms against attacks: A review." International Journal of Advanced Computer Science and Applications, br 8 (2018).
  25. Andreeva, Elena, Bart Mennink, and Bart Preneel. "Open problems in hash function security." Designs, Codes and Cryptography 77.2 (2015): 611-631 https://doi.org/10.1007/s10623-015-0096-0
  26. Sumagita, Meiliana, et al. "Analysis of secure hash algorithm (SHA) 512 for encryption process on web based application." International Journal of Cyber-Security and Digital Forensics (IJCSDF) 7.4 (2018): 373-381.
  27. F. Mendel, T. Peyrin, and M. Schl, -Improved Cryptanalysis of Reduced RIPEMD-160,II Int. Conf. Theory Appl. Cryptol. Inf. Secuerty., pp. 484-503, 2013.
  28. Rachmawati, Dian, J. T. Tarigan, and A. B. C. Ginting. "A comparative study of Message Digest 5 (MD5) and SHA256 algorithm." Journal of Physics: Conference Series. Vol. 978. No. 1. IOP Publishing, 2018.
  29. What are Hash Functions and How to choose a good Hash Function? https://www.geeksforgeeks.org/what-are-hashfunctions-and-how-to-choose-a-good-hash-function/
  30. Wu, Hongjun. "The hash function JH." Submission to NIST (round 3) 6 (2011).
  31. Yeager, Nancy J., and Robert E. McGrath. Web server technology. Morgan Kaufmann, 1996. Book
  32. What is a webserver and application server? https://hostman.com/blog/what-is-web-server/
  33. Oluwatosin, Haroon Shakirat. "Client-server model." IOSRJ Comput. Eng 16.1 (2014): 2278-8727.
  34. Bangare, S. L., et al. "Using Node. Js to build high speed and scalable backend database server." National Conference "NCPCI. Vol. 2016. 2016.
  35. Cooper, D., Apon, D., Dang, Q., Davidson, M., Dworkin, M., Miller, C.: Recommendation for stateful hash-based signature schemes. Technical report, National Institute of Standards and Technology (2019)
  36. Dobraunig, Christoph, Maria Eichlseder, and Florian Mendel. "Analysis of SHA-512/224 and SHA512/256." International Conference on the Theory and Application of Cryptology and Information Security. Springer, Berlin, Heidelberg, 2015.