Abstract
The concern about the data security is still growing. The applications we use still lack basic security. The security can be obtained easily without heightening the awareness of the users by simply implementing methods that allow end-to-end security. In the paper we present the new method of public key distribution using Social Media Networks. We use groups or circles that users can create there and publish images in the gallery with proper public or private access. After establishing secure session user can switch into different medium of communication, e.g. different messenger or text-SMS to share their data in secure way. Then there are described several applications of the presented method Secure Data Exchange (SDEx), e.g. secure SMS texting, Social Media Networking and data sharing. We propose frame format of the published QRcode as a public key and data message frame format.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Nikiforakis, N., Meert, W., Younan, Y., Johns, M., Joosen, W.: Sessionshield: lightweight protection against session hijacking. In: Erlingsson, U., Wieringa, R., Zannone, N. (eds.) ESSoS 2011. LNCS, vol. 6542, pp. 87–100. Springer, Heidelberg (2011)
Adid, B.: Sessionlock: securing web sessions against eavesdropping. In: Proceedings of the 17th international conference on World Wide Web, pp. 517–524 (2008)
Lin, H.: The study and implementation of the wireless network data security model. In: Fifth International Conference on Machine Vision (ICMV 12). International Society for Optics and Photonics (2013)
Threats, I.: New challenges to corporate security. Res. J. Appl. Sci. 8(3), 161–166 (2013)
Das, S., Kramer, A.D.I., Dabbish, L.A., Hong, J.I.: Increasing security sensitivity with social proof: a large-scale experimental confirmation. In: Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security (CCS ’14), pp. 739–749. ACM, New York (2014)
Electronic Frontier Foundation. https://www.eff.org/secure-messaging-scorecard
Ahuja, M.S.: A review of security weaknesses in Bluetooth. Int. J. Comput. Distrib. Sys. 1, 3 (2012)
Haataja, K., Hyppönen, K., Pasanen, S., Toivanen, P.: Reasons for Bluetooth network vulnerabilities. Bluetooth Security Attacks. Springer, Berlin Heidelberg (2013)
Sriram, S.V.S., Sahoo, G.: A mobile agent based architecture for securing WLANs. International Journal of Recent Trends Engineering 1(1), 137–141 (2009)
Huang, J.: A study of the security technology and a new security model for WiFi network. In: Fifth International Conference on Digital Image Processing. International Society for Optics and Photonics (2013)
The Verge. http://www.theverge.com/2013/6/26/4468050/facebook-follows-google-with-tough-encryption-standard
Hłobaż, A., Podlaski, K., Milczarski, P.: Applications of QR codes in secure mobile data exchange. In: Kwiecień, A., Gaj, P., Stera, P. (eds.) CN 2014. CCIS, vol. 431, pp. 277–286. Springer, Heidelberg (2014)
Hłobaż, A.: ecurity of measurement data transmission - message encryption method with concurrent hash counting. Przeglad Telekomunikacyjny i Wiadomosci Telekomunikacyjne 80(1), 13–15 (2007)
Hłobaż, A.: Security of Measurement Data Transmission - Modifications of the Message Encryption Method Along with Concurrent Hash Counting, pp. 39–42. Przeglad Wlokienniczy - Wlokno, Odziez (2008)
Podlaski, K., Hłobaż, A., Milczarski, P.: New Method for Public Key Distribution Based on Social Networks. arXiv:1503.03354 [cs.CR] (2015)
Katz, J., Lindell, Y.: Introduction to Modern Cryptography. Chapman & Hall/CRC Press, London (2007)
Animoto. http://www.adweek.com/socialtimes/social-video-sharing/613811
BS ISO/IEC 18004:2006. Information technology. Automatic identification and data capture techniques. QR Code 2005 bar code symbology specification (2006)
QRcode webpage. http://www.qrcode.com/en/codes/
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this paper
Cite this paper
Milczarski, P., Podlaski, K., Hłobaż, A. (2015). Applications of Secure Data Exchange Method Using Social Media to Distribute Public Keys. In: Gaj, P., Kwiecień, A., Stera, P. (eds) Computer Networks. CN 2015. Communications in Computer and Information Science, vol 522. Springer, Cham. https://doi.org/10.1007/978-3-319-19419-6_37
Download citation
DOI: https://doi.org/10.1007/978-3-319-19419-6_37
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-19418-9
Online ISBN: 978-3-319-19419-6
eBook Packages: Computer ScienceComputer Science (R0)