Multilevel Authentication for Social Network

Dalian Zhia Sheng - Universiti Tun Hussein Onn Malaysia, Johor, Malaysia
Isredza Hamid - Universiti Tun Hussein Onn Malaysia, Johor, Malaysia
Hannani Aman - Universiti Tun Hussein Onn Malaysia, Johor, Malaysia


Citation Format:



DOI: http://dx.doi.org/10.30630/joiv.2.3-2.146

Abstract


Nowadays, social network plays a vital role in communication. Normally user used social networks in daily activities. However, this left all online users susceptible to misuse and abuse. Recently, there has been a remarkable growth in number of hacking as well. Once the computer is online, anyone can have access to the network. Therefore, we proposed a secure social network site called SocialBook where users can post status, photos and connect with friends. This system is developed using PHP programming language and Iterative and Incremental Development methodology.  The purpose of developing this system is to solve unsecured login accounts and lack of user authentication problem. This system applies the secret question procedure when the user wants to change their account password. Moreover, SocialBook use idle session timeout mechanism for additional security. When the user is idle for ten minutes, they will be logged out automatically. So, the user will be less worry about their account from being hacked and the identity impersonation by unauthorized user.

Keywords


Multilevel authentication; social network; security.

Full Text:

PDF

References


P. K. Ryan, Social Networking. New York: rosen central, 2011.

B.E. Nicole and D.M. Boyd, “Social Network Sites: Definition, History, and Scholarship,†Journal of Computer-Mediated Communication, vol. 13, pp. 210-230, 2008.

P. Kallas. (2016)Top 15 Most 2008Popular Social Networking Sites (and 10 Apps!). [Online]. Available: http://www.dreamgrow.com/top-15-most-popular-social-networking-sites/

M. A. Burrows. (1990) A logic of authentication. [Online]. Available: https://arxiv.org/ftp/arxiv/papers/1506/1506.03753.pdf

B. Dickson. (2016) 5 authentication methods putting passwords to shame. [Online]. Available: http://thenextweb.com/insider/2016/03/31/5-technologies-will-flip-world-authentication-head/

Findandtrace. (2015) Twitter Most downloaded and popular android apps in the world. [Online]. Available: http://www.findandtrace.com/telenews/twitter-most-downloaded-and-popular-android-apps-in-the-world/

Sameer. (2014) Advantages and Disadvantages of Twitter. [Online]. Available: http://www.muchtech.org/2014/04/advantages-and-disadvantages-of-twitter.html

M. Sarah. (2015) Instagram review. [Online]. Available: https://www.cnet.com/products/instagram-android/review/

C. J. P. Jaymar. (2013) Google+ (Android) review. [Online]. Available:https://www.cnet.com/products/google-plusandroid/review/

K. Burnham. (2015) How the top social networks compare on privacy -- in one handy chart. [Online]. Available: http://www.itworld.com/article/2915175/social-networking/how-the-top-social-networks-compare-on-privacy-in-one-handy-chart.html

D. Glenn. (2012) The History of Social Media from 1978 – 2012 [Infographic]. [Online]. Available: http://www.webmasterview.com/2011/08/social-networking-history/

C. Hoffman. (2015) The Best Two-Step Authentication: SMS, Autheticator Apps, and More. [Online]. Available: https://support.steampowered.com/kb_article.php?ref=4020-ALZM-5519

C. Larman, Agile and Iterative Development- A Manager's Guide. Pearson Education, 2004.

N.S.K. Tanvi, â€Multi-Dimensional and Multi-Level Authentication,†International Journal of Computer Application (0975 – 8887), vol. 75(12), pp. 17-22, Aug. 2013.