Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs

Auto Fill Security Solution Using Biometric Authentication for Fake Profile Detection in OSNs

Brij B. Gupta, Somya Ranjan Sahoo, Vaibhav Bhatia, Adil Arafat, Abhik Setia
Copyright: © 2020 |Pages: 26
DOI: 10.4018/978-1-7998-2242-4.ch012
OnDemand:
(Individual Chapters)
Available
$37.50
No Current Special Offers
TOTAL SAVINGS: $37.50

Abstract

This chapter discusses a model that allows the user to access social networking sites through login using smart phone-based biometric authentication. Currently, social networking websites permit the user to access their page through login and some sites provide auto fill system to login into users account through browser by permit. The browser saves the password in password protected space and automatically auto fills the password to access the account by user. This facility is not highly reliable due to the auto fill system for laptop users. When someone uses the laptop of others and visits any website, the auto fill system opens the content with saved password. Secondly, elderly people have problems logging into today's websites. To remember the password for every account is very difficult for elderly people. This chapter describes a model for security and authenticity. Authors used a hybrid model with android as the application with fingerprint authentication and chrome extension as the auto fill process for user access.
Chapter Preview
Top

1. Introduction

Online Social Network (OSN) (Fire et al., 2014) is an online social platform for communication between the people having same interest, friend, friends of friends and other belongings. It also allows users to create a profile with certain public content for identification. Currently, the social network platforms are the easiest way for communication and content sharing among others like photos, video and current status of the user. OSN platform connects old friends, other personality of the same interest and bring them into a new platform. The daily activity of the users shared to update the current status of individuals in this platform. Due to the advancement of the technologies as OSN, it becomes a suitable way of transformation of content in the web. OSN’s are becoming the most convenient way for users to keep in touch with belongings, share personal information, daily activities, travel plans, photos, friends, and family. The structure and the nature of behavior describe the overall architecture of the profile holder. The various popular social networking sites for communication are, Google+ (Vic Gundotra, 2011), Facebook (Mark Zuckerberg, 2004), Twitter (Jack Dorsey, 2006), and LinkedIn (Reid Hoffman, 2002), have a billions of users across the globe.

As the uses of the social network increases and it becomes growingly more struck in users’ everyday life, the private information of the user becomes easily revealed and perverted. With valuable information user shared among others that lead to huge damage for the society and individuals (Gupta & Gupta, 2015; Almomani, 2013; Sahoo & Gupta, 2018; Zheng et al., 2017). Presently, many threats have been detected and reported that feat private information of the user or exposures of OSN’s. Regrettably, many social network users are unaware of the different circumstances related to the various threats and security risk factors present in the network that use for personal communication. The various security risk associated with OSN’s are, privacy risks (Sahoo & Gupta, 2020), identity theft attack (Kiruthiga & Kannan, 2014), malware attack, fake profiles (Ersahin et al., 2017; Conti et al., 2012; David et al., 2016) (also known as Sybil attack (Alsaleh et al., 2014) or socialbots), and cyber bullying in the form of sexual harassment among others. The information shared in the OSN can be harvested by OSN operators or any third-party service with the help of commercial companies. The elicited entropy can be misused in various ways for the different purpose and exploit user’s personal information. For example, companies can use user’s personal information for sharing of the advertisement or even to share the users’ personal and private content with the government organizations (Jain & Gupta, 2017; Gupta et al., 2017; Zhang et al., 2017; Gupta et al., 2015). The different categories of threat that hamper user’s personal information over the web are describes below.

Complete Chapter List

Search this Book:
Reset