Prevention technique for creating fake profiles and accounts on websites
Keywords:
Social engineering, Unique Identity, Fake Profiles, Multiple accounts, Aadhar cardAbstract
At present, the social life of everyone has become associated with the online social networks. Also, every online business is linked to users through websites. Users are allowed to create separate personal or official accounts in order to access these websites. The rapid growth of these websites despite being advantageous, it also causes some serious issues. Problems such as fake profiles, online impersonation have become prone these days. The most important issue is that, the websites maintains separate servers with storage area for all the users. Creation of number of accounts by a single user leads to occupying extra storage space in those servers which causes wastage of storage resources. The fake profiles and online impersonation issues are becoming threat to several people like celebrities, businessmen and even to innocent general public. In order to restrict these problems, an idea is suggested to prove the uniqueness of users in these websites and restrict them to create limited number of accounts permitted by the website holders. Like Aadhar in India, most of the countries has unique id and has become mandate. This id’s has an advantage of giving uniqueness to every individual. The user’s Aadhar card/unique card can be scanned to generate a unique id. Using this unique id, the individuality of users in websites can be identified and a unique username and password can be given to each user. Whenever a user tries to create an account in a registered website, the user will be asked to prove uniqueness and hence can be restricted from creating multiple accounts more than the number of accounts allowed by the website.
References
T. Stein, E. Chen, and K. Mangla. Facebook immune system. In Proceedings of the 4th Workshop on Social Network Systems, SNS, volume 11, page 8, 2011.
C. Wagner, S. Mitter, C. K ̈orner, and M. Strohmaier. When social bots attack: Modeling susceptibility of users in online social networks. In Proceedings of the WWW, volume 12, 2012.
Y. Boshmaf, I. Muslukhov, K. Beznosov, and M. Ripeanu. The socialbot network: when bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference, pages 93–102. ACM, 2011.
Z. Chu, S. Gianvecchio, H. Wang, and S. Jajodia. Who is tweeting on twitter: human, bot, or cyborg? In Proceedings of the 26th Annual
Computer Security Applications Conference, pages 21–30. ACM, 2010.
Estee Van Der Walt. T and Jan Eloff, Using Machine Learning to Detect Fake identities: Bots vs Human, Department of Computer Science, University of Pretoria, South Africa.
Downloads
Published
How to Cite
Issue
Section
License
Copyright (c) 2018 COMPUSOFT: An International Journal of Advanced Computer Technology
This work is licensed under a Creative Commons Attribution 4.0 International License.
©2023. COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY by COMPUSOFT PUBLICATION is licensed under a Creative Commons Attribution 4.0 International License. Based on a work at COMPUSOFT: AN INTERNATIONAL OF ADVANCED COMPUTER TECHNOLOGY. Permissions beyond the scope of this license may be available at Creative Commons Attribution 4.0 International Public License.