Skip to main content

Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys

  • Conference paper
  • First Online:
Computer Networks (CN 2015)

Part of the book series: Communications in Computer and Information Science ((CCIS,volume 522))

Included in the following conference series:

Abstract

The concern about the data security is still growing. The applications we use still lack basic security. The security can be obtained easily without heightening the awareness of the users by simply implementing methods that allow end-to-end security. In the paper we present the new method of public key distribution using Social Media Networks. We use groups or circles that users can create there and publish images in the gallery with proper public or private access. After establishing secure session user can switch into different medium of communication, e.g. different messenger or text-SMS to share their data in secure way. Then there are described several applications of the presented method Secure Data Exchange (SDEx), e.g. secure SMS texting, Social Media Networking and data sharing. We propose frame format of the published QRcode as a public key and data message frame format.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Nikiforakis, N., Meert, W., Younan, Y., Johns, M., Joosen, W.: Sessionshield: lightweight protection against session hijacking. In: Erlingsson, U., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 87–100. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  2. Adid, B.: Sessionlock: securing web sessions against eavesdropping. In: Proceedings of the 17th international conference on World Wide Web, pp. 517–524 (2008)

    Google Scholar 

  3. Lin, H.: The study and implementation of the wireless network data security model. In: Fifth International Conference on Machine Vision (ICMV 12). International Society for Optics and Photonics (2013)

    Google Scholar 

  4. Threats, I.: New challenges to corporate security. Res. J. Appl. Sci. 8(3), 161–166 (2013)

    Google Scholar 

  5. Das, S., Kramer, A.D.I., Dabbish, L.A., Hong, J.I.: Increasing security sensitivity with social proof: a large-scale experimental confirmation. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS ’14), pp. 739–749. ACM, New York (2014)

    Google Scholar 

  6. Electronic Frontier Foundation. https://www.eff.org/secure-messaging-scorecard

  7. Ahuja, M.S.: A review of security weaknesses in Bluetooth. Int. J. Comput. Distrib. Sys. 1, 3 (2012)

    Google Scholar 

  8. Haataja, K., Hyppönen, K., Pasanen, S., Toivanen, P.: Reasons for Bluetooth network vulnerabilities. Bluetooth Security Attacks. Springer, Berlin Heidelberg (2013)

    Chapter  Google Scholar 

  9. Sriram, S.V.S., Sahoo, G.: A mobile agent based architecture for securing WLANs. International Journal of Recent Trends Engineering 1(1), 137–141 (2009)

    Google Scholar 

  10. Huang, J.: A study of the security technology and a new security model for WiFi network. In: Fifth International Conference on Digital Image Processing. International Society for Optics and Photonics (2013)

    Google Scholar 

  11. The Verge. http://www.theverge.com/2013/6/26/4468050/facebook-follows-google-with-tough-encryption-standard

  12. Hłobaż, A., Podlaski, K., Milczarski, P.: Applications of QR codes in secure mobile data exchange. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 277–286. Springer, Heidelberg (2014)

    Chapter  Google Scholar 

  13. Hłobaż, A.: ecurity of measurement data transmission - message encryption method with concurrent hash counting. Przeglad Telekomunikacyjny i Wiadomosci Telekomunikacyjne 80(1), 13–15 (2007)

    Google Scholar 

  14. Hłobaż, A.: Security of Measurement Data Transmission - Modifications of the Message Encryption Method Along with Concurrent Hash Counting, pp. 39–42. Przeglad Wlokienniczy - Wlokno, Odziez (2008)

    Google Scholar 

  15. Podlaski, K., Hłobaż, A., Milczarski, P.: New Method for Public Key Distribution Based on Social Networks. arXiv:1503.03354 [cs.CR] (2015)

  16. Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC Press, London (2007)

    Google Scholar 

  17. Animoto. http://www.adweek.com/socialtimes/social-video-sharing/613811

  18. BS ISO/IEC 18004:2006. Information technology. Automatic identification and data capture techniques. QR Code 2005 bar code symbology specification (2006)

    Google Scholar 

  19. QRcode webpage. http://www.qrcode.com/en/codes/

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Artur Hłobaż .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this paper

Cite this paper

Milczarski, P., Podlaski, K., Hłobaż, A. (2015). Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys. In: Gaj, P., Kwiecień, A., Stera, P. (eds) Computer Networks. CN 2015. Communications in Computer and Information Science, vol 522. Springer, Cham. https://doi.org/10.1007/978-3-319-19419-6_37

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-19419-6_37

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-19418-9

  • Online ISBN: 978-3-319-19419-6

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics