Your SlideShare is downloading. ×
A Batch-authenticated And Key AgreementFramework For P2p-based Online Social Networks
Upcoming SlideShare
Loading in...5
×

Thanks for flagging this SlideShare!

Oops! An error has occurred.

×

Saving this for later?

Get the SlideShare app to save on your phone or tablet. Read anywhere, anytime - even offline.

Text the download link to your phone

Standard text messaging rates apply

A Batch-authenticated And Key Agreement Framework For P2p-based Online Social Networks

326
views

Published on

Published in: Education, Technology

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total Views
326
On Slideshare
0
From Embeds
0
Number of Embeds
0
Actions
Shares
0
Downloads
6
Comments
0
Likes
0
Embeds 0
No embeds

Report content
Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
No notes for slide

Transcript

  • 1. BY N.Sahithi (12C11D5816)Under Esteemed Guidance Of J.Nagaraju sir
  • 2.  Online social networks (OSNs) such as Facebook and MySpace are flourishing day by day. Privacy issues on OSNs are major concerns, we propose a security framework for simultaneously authenticating multiple users to improve the efficiency and security of peer-to-peer (P2P)-based OSNs.
  • 3.  Online social networks (OSNs) such as Facebook,MySpace, and Twitter are increasingly popular services. People can share information and pictures with friends and relations through online social networks .
  • 4.  P2P-based OSNs is a relatively new trend. A P2P-based OSN consists of the following three levels:1) The social network level.2) The application service level and3) The communication and transport level A decentralized P2P architecture can be adopted with merits, including strong privacy protection, better scalability, and a lowered requirement for continuous Internet connectivity,
  • 5.  In 2009, Buchegger examined the feasibility of P2P- based OSNs and advocated the use of encryption techniques to ensure privacy issues. Ge et al proposed a message delivery scheme based on a fully distributed method. But identity authentication was not fully addressed.
  • 6.  Lee and Kim also proposed an adaptive authentication protocol based on the reputation of P2P systems. Nguyen adopted identity-based cryptography and preshare keys.
  • 7.  The existing protocols suffer from the following weaknesses:1) In current security protocols for P2P-based OSNs, each user has to be authenticated by OOB methods2) Most of the existing protocols support only one-to- one authentication.
  • 8. 3) The existing protocols dont consider the restrictions of computing power and memory limitations.4) It require high communication cost for authenticating users.
  • 9.  we propose a security framework for simultaneously authenticating multiple users to improve the efficiency and security of peer-to-peer (P2P)-based OSNs. In the proposed framework, 3 batch authentication protocols are proposed:i) adopting the one-way hash functionii)ElGamal proxy encryption andiii)certificates based protocol.
  • 10.  we show that our protocols can meet important security requirements. we formally proved that the proposed batch authentication protocols are secure against both passive adversaries and impersonator attacks.
  • 11.  The proposed framework reduces the communication cost required for authenticating users. The proposed protocols support a one-to-many authentication. The proposed protocols allow a user with a high trust level to help authenticate other users and achieve the extensibility of a social network.
  • 12.  In this paper, we proved that our protocols are secure against passive adversaries and impersonator attacks and support implicit key authentication. After analyzing the communication and computational costs, we show that our protocols require fewer authentication messages.