Security as a service in social network
Recent years have witnessed a proliferation of usage and applications of social network: Facebook, Twitter, Google+, etc. We can see people use Twitter and Facebook everywhere: on the bus, on the MRT, etc. It is undeniable that social network has become a crucial part of our life as it...
Saved in:
Main Author: | |
---|---|
Other Authors: | |
Format: | Final Year Project |
Language: | English |
Published: |
2013
|
Subjects: | |
Online Access: | http://hdl.handle.net/10356/52073 |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Institution: | Nanyang Technological University |
Language: | English |
Summary: | Recent years have witnessed a proliferation of usage and applications of social network:
Facebook, Twitter, Google+, etc. We can see people use Twitter and Facebook everywhere: on
the bus, on the MRT, etc. It is undeniable that social network has become a crucial part of our
life as it not only enhances relationship and brings people together, but also creates the strongest
information channel ever in the world.
However, despite the mentioned benefits, social network still introduces some problems regard
the privacy right of the end-users: the users’ data are often misused by the server; servers can
exploit them such as selling data to other companies and organizations so that they can make
their own profit. However, most of the times the users do not even know their data are being
used. Even if they understand the fact, they are unable to protect themselves against those
misuses.
The aim of this project is to create a social network which preserves the privacy of the users
while maintaining the benefits of a social network. Our secure social network is called N-Twitter, which is a more secure version of the existing famous Twitter. The project provides the
users with a website which has most of the functions of one of the biggest social network in the
world nowadays Twitter.
With N-Twitter, you could now share your personal information with friends without being
exploiting on personal data (i.e. protect yourself against the server or commercial purpose use).
Your information is encrypted using the most advanced security model such as AES, ElGammal, etc. The main idea is the key to decrypt all of your information is monitored by you and without the knowledge of your key , there is no way the server could exploit your data, i.e. you are protecting your own data. |
---|