security and privacy in mobile social networks

Saranya.K,Shahina.J,E.Santhi nisha

Published in International Journal of Advanced Research in Computer Science Engineering and Information Technology

ISSN: 2321-3337          Impact Factor:1.521         Volume:6         Issue:3         Year: 27 March,2017         Pages:1280-1285

International Journal of Advanced Research in Computer Science Engineering and Information Technology

Abstract

Users access their data by simply performing the usual login or signing up process.there is a private way to get forgot data like,to get forgot password in multiple secured options. Here cracker knows the fake mask data. Other factors include symbols on the keyboard.It also depends on context-aware applications through which users can access their personal information as per location.Thus a various number of special symbols and privacy preservation algorithm is used

Kewords

privacy preservation technique,fake mask

Reference

[1] X. Liang, K. Zhang, X. Shen, and X. Lin, “Security and privacy in mobile social networks: challenges and solutions,” IEEE Wireless Communications, vol. 21, no. 1, pp. 33–41, 2014. [2] B. Gedik and L. Liu, “Location privacy in mobile systems: A personalized anonymization model,” in Proceedings of the 25th IEEE International Conference on Distributed Computing Systems (ICDCS05), Columbus, OH, USA, June 10 2005, pp. 620–629. [3] P. Hornyack, S. Han, J. Jung, S. Schechter, and D. Wetherall, “These arent the droids youre looking for: retrofitting android to protect data from imperious applications,” in Proceedings of the 18th ACM conference on Computer and communications security (CCS11), Chicago, Illinois, USA, October 17-21 2011, pp. 639–652. [4]K.Vu,R.Zheng,andJ.Gao,“Effialgorithmsfork-anonymouslocationprivacyinparticipatorysensing,”inProc.31stAnnu.IEEEInt.Conf.Comput.Commun.(INFOCOM),Orlando,FL,USA,Mar.2012,pp.2399–2407. [5]B.GedikandL.Liu,“Locationprivacyinmobilesystems:Aperson-alizedanonymizationmodel,”inProc.25thIEEEInt.Conf.Distrib.Comput.Syst.(ICDCS),Columbus,OH,USA,Jun.2005,pp.620–629 [6]P.Hornyack,S.Han,J.Jung,S.Schechter,andD.Wetherall,“Thesearentthedroidsyourelookingfor:Retrofittingandroidtoprotectdatafromimperiousapplications,”inProc.18thACMConf.Comput.Commun.Security(CCS),Chicago,IL,USA,Oct.2011,pp.639–652.