Revolutionizing Social Media Security: Integrating Graphic Passwords and Blockchain for Enhanced User Authentication

Authors

  • Geerija Lavania JECRC University
  • Gajanand Sharma JECRC University

Keywords:

Social Media Security, User Authentication, Pattern Passwords, Blockchain, User validation, Data Security

Abstract

The Office of Communications and Marketing oversees various social media platforms, including "Facebook, Twitter, Instagram, LinkedIn, and YouTube." Safeguarding online presence is paramount for any business, emphasizing the crucial role of social media security. Protection measures encompass thwarting targeted phishing attacks, fortifying corporate accounts against hacking, and preventing social engineering scams. Social media platforms like Facebook and Twitter offer opportunities for fraudsters to exploit, employing legitimate but fake accounts to gain trust and extract sensitive information. Scammers adeptly craft fraudulent accounts, mimicking individuals or companies, spreading malware, online attacks, and misinformation to deceive followers and company employees into revealing private data or corporate secrets .To enhance security, an envisioned end-to-end app proposes registering mobile numbers with a password consisting of zigzag images or by sliding computer-generated images to create a unique pattern. This complements the existing module facilitating easier SIM card identification. Decentralized blockchain formed by users in communication, as opposed to a private blockchain with a central authority, is proposed. Our social media platform prioritizes two-factor authentication, requiring users to log in with their email and password, and then verifying the login request with a unique one-time password sent to their phone number during the initiation of the login request.

Downloads

Download data is not yet available.

References

Shevchuk, R., Melnyk, A., Opalko, O., & Shevchuk, H. (2020). Software for automatic estimating security settings of social media accounts. In 10th International Conference on Advanced Computer Information Technologies (ACIT), 2020.

Huang, S.-Y., & Ban, T. (2020). Monitoring social media for vulnerability-threat prediction and topic analysis. In IEEE 19th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), 2020.

Ekwunife, N. (2020). National security intelligence through social network data mining. In IEEE International Conference on Big Data (Big Data), 2020.

Guidi, B., & Michienzi, A. (2020). Users and Bots Behavior Analysis in Blockchain Social Media. In Seventh International Conference on Social Networks Analysis, Management and Security (SNAMS), 2020.

Lai, J. (2019). Research on cross-border E-commerce logistics supply under the blockchain. In International Conference on Computer Network, Electronic and Automation (ICCNEA), 2019.

Shevchuk, R., & Pastukh, Y. (2019). Improve the security of social media accounts. In 9th International Conference on Advanced Computer Information Technologies (ACIT), 2019.

Shree, J., Kanimozhi, N. R., Dhanush, G. A., Haridas, A., Sravani, A., & Kumar, P. (2020). To Design a Smart and Secure Purchasing System integrated with ERP using Blockchain technology. In IEEE 5th International Conference on Computing Communication and Automation (ICCCA), 2020.

Soumya, T. R., & Revathy, S. (2018). Survey on threats in online social media. In International Conference on Communication and Signal Processing (ICCSP), 2018.

Teja, J. R. (2020). Proposing a method for Public record maintenance using Blockchain. In International Conference on Mainstreaming Block Chain Implementation (ICOMBI), 2020.

Tse, D., Huang, K., Cai, B., & Liang, K. (2018). Robust password-keeping system using block-chain technology. In IEEE International Conference on Industrial Engineering and Engineering Management (IEEM), 2018.

Wang, Z., et al. (2015). Key technology research on user identity resolution across multi-social media. In International Conference on Cloud Computing and Big Data (CCBD), 2015.

Chattopadhyay, A., Christian, D., Ulman, A., & Sawyer, C. (2018). A middle-school case study: Piloting a novel visual privacy themed module for teaching societal and human security topics using social media apps. In IEEE Frontiers in Education Conference (FIE), 2018.

Chung, W., Mustaine, E., & Zeng, D. (2017). Criminal intelligence surveillance and monitoring on social media: Cases of cyber-trafficking. In IEEE International Conference on Intelligence and Security Informatics (ISI), 2017.

Colbaugh, R., & Glass, K. (2013). Analyzing social media content for security informatics. In European Intelligence and Security Informatics Conference, 2013.

Cui, Z., et al. (2020). A hybrid BlockChain-based identity authentication scheme for multi-WSN. IEEE Transactions on Services Computing.

Garcia, C., Rabadi, G., Abujaber, D., & Seck, M. (2023). Supporting humanitarian crisis decision-making with reliable intelligence derived from social media using AI. Journal of Homeland Security and Emergency Management, 0(0).

Kurniawan, E., & Riadi, I. (2018). Security level analysis of academic information systems based on standard ISO 27002:2003 using SSE-CMM. [Journal Name], 16(1), 139–147.

Riadi, I., Aristianto, E. I., & Dahlan, A. (2016). An Analysis of Vulnerability Web Against Attack Unrestricted Image File Upload. Computer Engineering and Applications, 5(1), 19–28.

Angga, C. (2011). Analysis of How Diverse Works Hash Functions Exist, 1–6.

Jing, T. W., & Murugesan, R. K. (2019). A Theoretical Framework to Build Trust and Prevent Fake News in Social Media Using Blockchain. In IRICT 2018, AISC 843, 955–962. Springer Nature Switzerland AG 2019 F. Saeed et al. (Eds.).

Lavania, G.,& Sharma, G. (2022, December). Blockchain and its dimensions: Future Security. In Proceedings of the 4th International Conference on Information Management & Machine Intelligence (pp. 1-4).

Lavania, G., & Sharma, G. (2021, September). Security on Social Media Platform Using Private Blockchain. In International Conference on Cyber Security, Privacy and Networking (pp. 217-226). Cham: Springer International Publishing.

Goyal, D., Lavania, G., & Sharma, G. (2023, June). Review of modern web application cyber security risks and countermeasures. In AIP Conference Proceedings (Vol. 2782, No. 1). AIP Publishing.

Downloads

Published

23.02.2024

How to Cite

Lavania, G. ., & Sharma, G. . (2024). Revolutionizing Social Media Security: Integrating Graphic Passwords and Blockchain for Enhanced User Authentication. International Journal of Intelligent Systems and Applications in Engineering, 12(17s), 805–812. Retrieved from https://ijisae.org/index.php/IJISAE/article/view/5034

Issue

Section

Research Article