Deepti Dave | Dr D Y Patil School of Engineering & Technology, Lohegaon, Pune (original) (raw)
Related Authors
Universidade Federal de Santa Catarina - UFSC (Federal University of Santa Catarina)
Uploads
Papers by Deepti Dave
Online social network presents a wide variety of online uses that exhibit a series of challenges ... more Online social network presents a wide variety of online uses that exhibit a series of challenges to the security. The security and privacy threats increase, as the amount of personal information posted by users in their profile is made public. Social networking provides interaction and socialization among users which generates large amount of data. This necessitates the adoption of new tools and techniques to provide security of online data. Online social network users are unaware of the numerous security risks that exist in these networks. This paper presents a meticulous survey on the classification of different attacks and defence mechanisms which threaten the well-being of online social network. In addition, the paper presents a classification and analysis of detection mechanisms of clone attacks on online social network, based on attribute similarity, friend network similarity, profile analysis for a time interval and record of Internet Protocol sequences.
Online social network presents a wide variety of online uses that exhibit a series of challenges ... more Online social network presents a wide variety of online uses that exhibit a series of challenges to the security. The security and privacy threats increase, as the amount of personal information posted by users in their profile is made public. Social networking provides interaction and socialization among users which generates large amount of data. This necessitates the adoption of new tools and techniques to provide security of online data. Online social network users are unaware of the numerous security risks that exist in these networks. This paper presents a meticulous survey on the classification of different attacks and defence mechanisms which threaten the well-being of online social network. In addition, the paper presents a classification and analysis of detection mechanisms of clone attacks on online social network, based on attribute similarity, friend network similarity, profile analysis for a time interval and record of Internet Protocol sequences.
: Security of statistics is a major issue in RFID situation as RFID is a wireless Radio frequency... more : Security of statistics is a major issue in RFID situation as RFID is a wireless Radio frequency devices used in the wireless system. The data reads by the tag is send to reader which is then stowed at the server, but safety is a significant anxiety through the transmission of statistics from tag to reader. Though there are numerous security and verification methods implemented for the security of data and for the authentication of tag and reader. The existing technique offerings original sensing-enabled ramparts to unapproved interpretation and relay bouts against RFID systems without requiring any variations to the traditional RFID usage model. Here in this paper a review of all the prevailing technique are analyzed and discussed here.
Online social network presents a wide variety of online uses that exhibit a series of challenges ... more Online social network presents a wide variety of online uses that exhibit a series of challenges to the security. The security and privacy threats increase, as the amount of personal information posted by users in their profile is made public. Social networking provides interaction and socialization among users which generates large amount of data. This necessitates the adoption of new tools and techniques to provide security of online data. Online social network users are unaware of the numerous security risks that exist in these networks. This paper presents a meticulous survey on the classification of different attacks and defence mechanisms which threaten the well-being of online social network. In addition, the paper presents a classification and analysis of detection mechanisms of clone attacks on online social network, based on attribute similarity, friend network similarity, profile analysis for a time interval and record of Internet Protocol sequences.
Online social network presents a wide variety of online uses that exhibit a series of challenges ... more Online social network presents a wide variety of online uses that exhibit a series of challenges to the security. The security and privacy threats increase, as the amount of personal information posted by users in their profile is made public. Social networking provides interaction and socialization among users which generates large amount of data. This necessitates the adoption of new tools and techniques to provide security of online data. Online social network users are unaware of the numerous security risks that exist in these networks. This paper presents a meticulous survey on the classification of different attacks and defence mechanisms which threaten the well-being of online social network. In addition, the paper presents a classification and analysis of detection mechanisms of clone attacks on online social network, based on attribute similarity, friend network similarity, profile analysis for a time interval and record of Internet Protocol sequences.
: Security of statistics is a major issue in RFID situation as RFID is a wireless Radio frequency... more : Security of statistics is a major issue in RFID situation as RFID is a wireless Radio frequency devices used in the wireless system. The data reads by the tag is send to reader which is then stowed at the server, but safety is a significant anxiety through the transmission of statistics from tag to reader. Though there are numerous security and verification methods implemented for the security of data and for the authentication of tag and reader. The existing technique offerings original sensing-enabled ramparts to unapproved interpretation and relay bouts against RFID systems without requiring any variations to the traditional RFID usage model. Here in this paper a review of all the prevailing technique are analyzed and discussed here.