Volume 2, Issue 1, 2022
Articles

Study of Awareness about Peer to Peer Security in Social Networks

Aruna Devi K
Associate Professor, Department of Computer Science (PG), Kristu Jayanti College (Autonomous), Bengaluru
Shalini N
PG Students, Department of Computer Science (PG), Kristu Jayanti College (Autonomous), Bengaluru
Steffi Sabu
PG Students, Department of Computer Science (PG), Kristu Jayanti College (Autonomous), Bengaluru
Yeshodha S
PG Students, Department of Computer Science (PG), Kristu Jayanti College (Autonomous), Bengaluru

Published 2022-05-25

Keywords

  • Social Networks, Privacy, Social Media, Security, Transaction Security, Peer to Peer Security.

How to Cite

Devi K, A. ., N, S., Sabu, S. ., & S, Y. (2022). Study of Awareness about Peer to Peer Security in Social Networks. Kristu Jayanti Journal of Computational Sciences (KJCS), 2(1), 78–87. https://doi.org/10.59176/kjcs.v2i1.2237

Abstract

In the present world, utilising Social media usage has grown at a phenomenal rate. The social network platforms such as Instagram, Facebook, WhatsApp, Twitter and many more provide services and facilitate peer-to-peer communication through chat, audio/video conferencing, and data sharing in a variety of formats. Using these platforms for their communication has become easier to communicate and adapt whereas the scams behind these underlying networks is unknown. As a potential case of zero trust, peer-to-peer technologies assert that they will support end-to-end communication while demanding access control, negligibility, and adaptability against suppression and enormous data breaches caused by abused trust.. This paper gives the survey of about how the security, confidentiality in social networks are prone to be in the first level. Second, how clueless people are of this demanding use of applications and analysis of the survey and the (P2P) technologies and its framework. Finally it gives a comprehensive examination of the frameworks, applications, and architectures for P2P-based online social networks.

Downloads

Download data is not yet available.

References

[1] Aljohani, M., Nisbet, A., & Blincoe, K. (2016). A survey of social media users privacy settings & information disclosure. In Johnstone, M. (Ed.). (2016). The Proceedings of 14th Australian Information Security Management Conference, 5-6 December, 2016, Edith Cowan University, Perth, Western Australia. (pp.67-75).

[2] He, Wu. (2013). A survey of security risks of mobile social media through blog mining and an extensive literature search. Information Management & Computer Security. 21. 10.1108/IMCS-12-2012-0068.

[3] Imrul Kayes, Adriana Iamnitchi, (2017) Privacy and security in online social networks: A survey, Online Social Networks and Media, Vol. 3–4, Pages 1- 21,ISSN 2468-6964, https://doi.org/10.1016/j.osnem.2017.09.001

[4] Masinde, N., Graffi, K. Peer-to-Peer-Based Social Networks: A Comprehensive Survey. SN COMPUT. SCI. 1, 299 (2020). https://doi.org/10.1007/s42979-020-00315-8

[5] Masinde, Newton & Khitman, Liat & Dlikman, Iakov & Graffi, Kalman. (2020). Systematic Evaluation of LibreSocial—A Peer-to-Peer Framework for Online Social Networks. Future Internet. 12. 140. 10.3390/fi12090140.

[6] Obiniyi, Afolayan & Olaide, Oyelade & Obiniyi, P. (2014). Social Network and Security Issues: Mitigating Threat through Reliable Security Model. International Journal of Computer Applications. 103. 1-7. 10.5120/18099-9163.

[7] Wondracek, G., Holz, T., Kirda, E., & Kruegel, C. (2010, May). A practical attack to de-anonymize social network users. In 2010 ieee symposium on security and privacy (pp. 223-238). IEEE.