Open Access Open Access  Restricted Access Subscription Access

Authentication and Verification of Social Networking Accounts using Blockchain Technology


Affiliations
1 Department of Computer Science, Applied Science University, Bahrain
2 Administrative & Financial Sciences, AMA International University, Bahrain
 

Social networking pages authenticate by blockchain technology, through authenticating personal information and profile pages in the form of block and then distributing them with Blockchain to become a trusted reference point. To identified and verified social network accounts. This research proposed an effective and easy technical mechanism to authenticate the personal pages on social networks. Using this mechanism, anyone can authenticate any account on social networks, as well as increasing the possibility of making sure of the real individual behind social networking accounts. Moreover, this technique will show the fake accounts in order to reach a more confident and secure social network environment. Blockchain technique requires only a simple update to the characteristics of its platforms by developers, which is only a participatory mechanism between Blockchain and personal information. It is then combined with personal pages, to indicate that these pages contain the real personal information of the account holder, which is stored in an encrypted block that is difficult to modify, copy, or steal.
User
Notifications
Font Size

  • Coyle, C., & Vaughn, H. (2008). Social networking: Communication revolution or evolution? Bell Labs.
  • Boyd, D.M. & Ellison, N.B. (2008), Social Network Sites:Definition, History and Scholarship. Journal of ComputerMediated Communication, 13(1), p. 201-230.
  • F. Benevenut, T. Rodrigues, M. Cha, and V. Almeida. Characterizing user behavior in online social networks. In Proc. of ACM SIGCOMM Internet Measurement Conference. ACM, 2009.
  • Brandtzæg Bae Petter and Heim Jan (2009) Why People Use Social Networking Sites. Proceedings of the 3d International Conference on Online Communities and Social Computing: Held as Part of HCI International: 143-152
  • Ellison, N. B., Steinfield, C., & Lampe, C. "The benefits of Facebook ‘friends:’ Social capital and college students’ use of online social network sites". Journal of Computer-Mediated Communication, 12, (4),1143-1168, 2007.
  • Marcelo Maia, Jussara Almeida, Virgílio Almeida, "Identifying User Behavior in Online Social Networks", Proceedings of the first Workshop on Social Network Systems, 1 April 2008
  • Michael Fire,etc,(2014)"Online Social Networks: Threats and Solutions",IEEE COMMUNICATION SURVEYS & TUTORIALS, VOL. 16, NO. 4, FOURTH QUARTER 2014.
  • Mohammad H. Allymoun, Nidal F. Shilbayeh, Sameh T. Khuffash, Reem Al-Saidi (2014). Protecting the Privacy and Trust of VIP Users on Social Network Sites, International Journal of Computer, Information, Systems and Control Engineering, Vol. 8 No.9, 1419-1429.
  • Acquisti, A., & Gross, R. (2006). Imagined communities: Awareness, information sharing,and privacy on the Facebook. In P. Golle& G. Danezis (Eds.), Proceedings of 6th Workshop on Privacy Enhancing Technologies (pp. 36-58). Cambridge, UK: Robinson College.
  • Devmane, M., & Rana, N. (2013). Security Issues of Online Social Networks. Advances in Computing, Communication, and Control, Springer. pp. 740-746.
  • Dustin W. Stout,.(2019). "Social Media Statistics 2019: Top Networks by the Numbers”. (On-Line), available:https://dustinstout.com/social-media-statistics/.
  • Conti, M., Poovendran, R., &Secchiero, M. (2012). FakeBook: Detecting Fake Profiles in On-Line Social Networks. IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). pp. 1071-1078
  • Facebook, accessed OCT. 14, 2019. [Online]. Available: http://www.facebook.com/
  • ALEJANDRO RIOJA,.(2019)"Get Verified on Facebook: Page or Profile (Blue + Gray Verification Badge)”, JUNE 24, 2019. (On-Line), available:https://alejandrorioja.com/blog/get-facebook-verified/.
  • HaewoonKwak, Changhyun Lee, Hosung Park, and Sue Moon, 2010,What is Twitter, a social network or a news media?.Proceeding WWW '10 Proceedings of the 19th international conference on World wideweb.Pages 591-600.
  • Mohammadi E, Thelwall M, KwasnyM,Holmes KL (2018) Academic information on Twitter: A user survey. PLoSONE 13(5):e0197265. https://doi.org/10.1371/journal.pone.0197265
  • Twitter,.(2019)." About verified accounts”, (On-Line), available: https://help.twitter.com/en/managing-your-account/about-twitter-verified-accounts.
  • S. Nakamoto, “Bitcoin: A peer-to-peer electronic cash system,” 2008.
  • Dylan Yaga,PeterMell,NikRoby,KarenScarfone,(2018).Blockchain Technology Overview.NISTIR 8202.https://doi.org/10.6028/NIST.IR.8202.
  • K. Christidis and M. Devetsikiotis, “Blockchains and smart contracts for the internet of things," IEEE Access, vol. 4, pp. 2292-2303, 2016.
  • C. Natoli and V. Gramoli, “The blockchain anomaly," in 15th International Symposium on Network Computing and Applications (NCA), 310-317, IEEE, 2016.
  • Q. K. Nguyen, “Blockchain-A Financial Technology for Future Sustainable Development,” in Green Technology and Sustainable Development (GTSD), 2016, pp. 51–54.
  • Samer Shorman, Mohammad H Allaymoun and Omer Hag Hamid. (2019). DEVELOPING THE E-COMMERCE MODEL A CONSUMER TO CONSUMER USING BLOCKCHAIN NETWORK TECHNIQUE, International Journal of Managing Information Technology (IJMIT) Vol.11, No.2, May 2019, DOI : 10.5121/ijmit.2019.11204 .
  • X. Xu, C. Pautasso, L. Zhu, V. Gramoli, A. Ponomarev, A. B. Tran, and S. Chen, “The blockchain as a software connector," in 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA), pp. 182-191, IEEE, 2016.International Journal of Managing Information Technology (IJMIT) Vol.11, No.2, May 2019.
  • ImarticusLearning."Infographics: What is Blockchain?”.(On-Line), available: https://medium.com/@imarticus/infographics-what-is-blockchain-6a1f93e64e79.

Abstract Views: 449

PDF Views: 273




  • Authentication and Verification of Social Networking Accounts using Blockchain Technology

Abstract Views: 449  |  PDF Views: 273

Authors

Samer Shorman
Department of Computer Science, Applied Science University, Bahrain
Mohammad Allaymoun
Administrative & Financial Sciences, AMA International University, Bahrain

Abstract


Social networking pages authenticate by blockchain technology, through authenticating personal information and profile pages in the form of block and then distributing them with Blockchain to become a trusted reference point. To identified and verified social network accounts. This research proposed an effective and easy technical mechanism to authenticate the personal pages on social networks. Using this mechanism, anyone can authenticate any account on social networks, as well as increasing the possibility of making sure of the real individual behind social networking accounts. Moreover, this technique will show the fake accounts in order to reach a more confident and secure social network environment. Blockchain technique requires only a simple update to the characteristics of its platforms by developers, which is only a participatory mechanism between Blockchain and personal information. It is then combined with personal pages, to indicate that these pages contain the real personal information of the account holder, which is stored in an encrypted block that is difficult to modify, copy, or steal.

References