Multilevel Authentication for Social Network

Dalian Wu Zhia Sheng, Isredza Rahmi A Hamid, Hannani Aman


Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology.  The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user.


Multilevel authentication; social network; security.

Full Text:



P. K. Ryan, Social Networking. New York: rosen central, 2011.

B.E. Nicole and D.M. Boyd, “Social Network Sites: Definition, History, and Scholarship,” Journal of Computer-Mediated Communication, vol. 13, pp. 210-230, 2008.

P. Kallas. (2016)Top 15 Most 2008Popular Social Networking Sites (and 10 Apps!). [Online]. Available:

M. A. Burrows. (1990) A logic of authentication. [Online]. Available:

B. Dickson. (2016) 5 authentication methods putting passwords to shame. [Online]. Available:

Findandtrace. (2015) Twitter Most downloaded and popular android apps in the world. [Online]. Available:

Sameer. (2014) Advantages and Disadvantages of Twitter. [Online]. Available:

M. Sarah. (2015) Instagram review. [Online]. Available:

C. J. P. Jaymar. (2013) Google+ (Android) review. [Online]. Available:

K. Burnham. (2015) How the top social networks compare on privacy -- in one handy chart. [Online]. Available:

D. Glenn. (2012) The History of Social Media from 1978 – 2012 [Infographic]. [Online]. Available:

C. Hoffman. (2015) The Best Two-Step Authentication: SMS, Autheticator Apps, and More. [Online]. Available:

C. Larman, Agile and Iterative Development- A Manager's Guide. Pearson Education, 2004.

N.S.K. Tanvi, ”Multi-Dimensional and Multi-Level Authentication,” International Journal of Computer Application (0975 – 8887), vol. 75(12), pp. 17-22, Aug. 2013.



  • There are currently no refbacks.

Creative Commons License
This work is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

JOIV : International Journal on Informatics Visualization
Published by Information Technology Department
Politeknik Negeri Padang, Indonesia

© JOIV - ISSN : 2549-9610 | e-ISSN : 2549-9904 

Phone : +62-82386434344
Email  : |

Creative Commons License is licensed under a Creative Commons Attribution-ShareAlike 4.0 International License.

View My Stats