A B C D E F G H I J K L M N O P Q R S T U V W X Y Z All
Kumar, Parveen
- Review of Some Checkpointing Schemes for Distributed and Mobile Computing Environments
Authors
1 Mewar University, Chittorgarh (Raj), IN
2 Amity University, Gurgaon (Haryana), IN
Source
International Journal of Advanced Networking and Applications, Vol 6, No 6 (2015), Pagination: 2542-2548Abstract
Fault Tolerance Techniques facilitate systems to carry out tasks in the incidence of faults. A checkpoint is a local state of a process saved on stable storage. In a distributed system, since the processes in the system do not share memory; a global state of the system is defined as a combination of local states, one from each process. In case of a fault in distributed systems, checkpointing enables the execution of a program to be resumed from a previous consistent global state rather than resuming the execution from the commencement. In this way, the sum of constructive processing vanished because of the fault is appreciably reduced. In this paper, we talk about various issues related to the checkpointing for distributed systems and mobile computing environments. We also confer various types of checkpointing: coordinated checkpointing, asynchronous checkpointing, communication induced checkpointing and message logging based checkpointing. We also present a survey of some checkpointing algorithms for distributed systems.
Keywords
Check Pointing Algorithms, Parallel and Distributed Computing, Rollback Recovery, Fault-Tolerant Systems.- Design and Implementation of Privacy and Security System in Social Media
Authors
1 Research Scholar, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, IN
2 Professor, Department of Computer Science & Engg, Nims University Rajasthan, Jaipur, IN
3 Ex-Professor, Department of Information Technology, VIPS, New Delhi, IN
Source
International Journal of Advanced Networking and Applications, Vol 13, No 4 (2022), Pagination: 5081-5088Abstract
Privacy and security are the main concern of any social media networking sites such as Facebook, Twitter Instagram and LinkedIn etc. The primary purpose of these sites is to allow people to share interests, activities, real-life connections. Nowadays social networking sites are the main source of communication and on the other hand these sites are the peak targets for misusing the data and information. This is the fact that the maximum numbers of users are not aware about cyber threats and their lack of knowledge leads to further increase in cyber-crimes is a major challenge. Users should aware in the concerned of security and privacy during creating the account on social media, to read the instruction and follow it. There is some setting in social media platform to secure the message and share to only authorize users. Various governments and businesses are taking a variety of steps to combat cybercrime. Despite many steps, cyber security remains a major issue for many people. This paper focuses on the issues that cyber security faces in the modern era. It also covers the most up-to-date information on cyber security tactics, ethics, and trends that are transforming the face of cyber security.Keywords
Data privacy, cyber security, cyber crime, cyber ethics, social media, cloud computing.References
- Aimeur, E., Gambs, S., & Ho, A. (2010). Towards a Privacy-Enhanced Social Networking Site. International Conference on Availability, Reliability and Security. pp. 172-179
- Labs, V. (2014). Majority of Global 2000 Organizations Have Not Remediated Heartbleed, Remain Vulnerable to Cyber Attacks. Venafi Labs Q3 Heartbleed Threat Research Analysis.
- Walker, D. (2014). Experts take inventory of Sony Pictures data leak, potential costs. Available at: http://www.scmagazine.com/experts-takeinventoryof-sony-pictures-data-leak-potentialcosts/ article/386991/
- Kitchenham, B. (2004). Procedures for performing systematic reviews. Joint Technical Report, 33(2004), pp. 1-26.
- Das, Rituparna, and Mayank Patel. "Cyber Security for Social Networking Sites: Issues, Challenges And Solutions." International Journal for Research in Applied Science & Engineering Technology (IJRASET) 5.4,833-838 (2017).
- Jang-Jaccard, Julian, and Surya Nepal. "A survey of emerging threats in cybersecurity." Journal of Computer and System Sciences 80.5 (2014): 973993.
- Jabee, Roshan, and M. Afshar Alam. "Issues and challenges of cyber security for social networking sites (Facebook)." International Journal of Computer Applications 144.3 (2016): 36-40.
- Soumya, T. R., and S. Revathy. "Survey on threats in online social media." 2018 International Conference on Communication and Signal Processing (ICCSP). IEEE, 2018.
- El Mrabet, Z., Kaabouch, N., El Ghazi, H., & El Ghazi, H. (2018). “Cyber-security in smart grid: Survey and challenges.” Computers & Electrical Engineering, 67, 469-482.
- Senthilkumar, K., &Easwaramoorthy, S. (2017, November). “A Survey on Cyber Security awareness among college students in Tamil Nadu.” In IOP Conference Series Materials Science and Engineering (Vol. 263).
- Kirichenko, L., Radivilova, T., & Carlsson, A. (2018). “Detecting cyber threats through social network analysis: short survey. “ arXiv preprint arXiv:1805.06680.
- Kayes, I., &Iamnitchi, A. (2017). “Privacy and security in online social networks: A survey.” Online Social Networks and Media, 3, 1-21.
- Fire, M., Goldschmidt, R., &Elovici, Y. (2014). “Online social networks: threats and solutions.” IEEE Communications Surveys & Tutorials, 16(4), 2019-2036.
- Albladi, S. M., & Weir, G. R. (2020). “Predicting individuals’ vulnerability to social engineering in social networks.” Cyber security, 3(1), 1-19.
- Senthil Kumar, N., Saravanakumar, K., & Deepa, K. (2016).” On privacy and security in social media–a comprehensive study.” Procedia Computer Science, 78, 114-119.
- Gharibi, Wajeb, and MahaShaabi. "Cyber threats in social networking websites." arXiv preprint arXiv:1202.2420 (2012).
- Kumar, Sunil, and Vikash Somani. "Social Media Security Risks, Cyber Threats And Risks Prevention And Mitigation Techniques." International Journal of Advance Research in Computer Science and Management 4.4 (2018): 125-129.
- Al Mushayt, Omar Saeed. "Threats and antithreats strategies for social networking websites." International Journal of Computer Networks & Communications (IJCNC) Vol 5 (2013).
- Canongia, Claudia, and Raphael Mandarino. "Cyber security: The new challenge of the information society." Handbook of Research on Business Social Networking: Organizational, Managerial, and Technological Dimensions. IGI Global, 2012. 165-184.
- Zanero, S, D Keromytis , “ Security and privacy measurements in social networks”. Available:http://nsl.cs.columbia.edu/papers/2014/l essons.badgers14.pdf [Accessed: 25 July 2016]D Gunter , Solomon S, “The Danger of Data Exfiltration over Social Media Sites” , Western International University, Available: https://media.blackhat.com/bh-us-12/Briefings/Gunter/BH_US_12_Gunter_Sonya_S
- NSCat_WP.pdf [Accessed: 19 July 2016
- http://www.cybercitizenship.org/ethics/.