Advanced Secure Social Networking Site

DOI : 10.17577/IJERTV3IS20068

Download Full-Text PDF Cite this Publication

Text Only Version

Advanced Secure Social Networking Site

1. Debanjali Banerjee, 2. Sumanta Daw

1,2. Hooghly Engineering & Technology College, Hooghly, PIN- 712103, WB, India

Abstract Social Networking Website project itself is a huge project comprising various features like profile updating, friends list organization and various other applications to enhance the overall look and feel of the website. However, in this project we are basically working on some essential features or modules SECURITY, PROFILE MANAGEMENT & FRIENDS

ORGANIZATION. SECURITY module maintains the security of user profiles like secure password, secure login, secure their posts, uploaded pictures etc., that means secure user profiles from hacking. PROFILEMANAGEMENT module maintains the profile of a user like name, like, dislikes, hobbies, status etc. FRIENDS ORGANIZATION module maintains the friend list, handles request and sends request to the other user.. The last one is a public commenting feature (Testimonials, Comments, and The Wall). This feature allows individuals to comment on their Friends profiles. These comments are displayed prominently and visible for anyone who has access to that profile. User also can chat with friends.

Keywords Profile Management, Friends Organization, Security, Public Commenting Feature, Upload Images, Send Message & Chatting.

  1. INTRODUCTION

    It is the way the twenty first century communicates now. Social networking is the grouping of individuals into specific groups, like small rural communities or a neighborhood subdivision. Although social networking

    is possible in person, especially in the workplace, universities and high schools, it is most popular. This is because unlike most high schools, colleges, or workplaces, the internet is filled with millions of individuals who are looking to meet other people. Social network is the mapping and measuring of relationships and flows between people, groups, organizations, computers, URLs and other connected information/knowledge entities.

    We define social network sites as web-based services that allow individuals to (1) construct a public or semi-public profile within bounded system, (2) articulate a list of otherusers with whom they share a connection, and (3) view and atraverse their list of connections and those made by others within the system.

  2. IMPLEMENTATION

    1. This Social Networking Site Provides

      • Provide attractive, user friendly and Secure Login page to access.

      • Login id & Password are protected by Encryption technology i.e. high security.

      • Authentication of the users after registration that means sends SMS & Email to the users after registration which is also secure.

      • Every user have their own Id in database, this Id is auto incremented. By this Id value users information files are created in the database by Hashing logic.

      • All users information are stored in files via database, here implements the Hashing logic.

      • Upload and Share Images on network

      • Photo albums, Testimonials & Friend lists are protected by password whenever they are uploaded or modified.

      • Search people easily on entire network& send friend requests to make friends

      • Send messages to other friends in online & offline mode & reply directly to incoming user messages. Offline messages are stored in file in database.

      • Easily password recovery processing

      • Deleting an account /user from the systems databases on request of the user.

    2. Encryption Technology

      In this Encryption Technology we just use random numbers & ASCII values of characters. By this encryption technology is for securing login id & passwords from hacking.

      1. First generate a random number.

      2. Convert the random number into integers

      3. Retrieve the login id & password of user..

      4. Retrieve the length of login id.

      5. Convert it into Byte & add with random number.

      6. Then convert in to string.

      7. Retrieve the length of password

      8. If the length is even then

      9. Convert it into byte & add with random number

      10. Else length is odd then

      11. Convert it in to byte & subtract from random number

      12. Then apply simple even-odd number logic.

      13. Convert it in to string.

    3. DFD Diagram

    4. Procedural Design

      1) Search:-

    5. USE-CASE Diagram

    6. What Have Done

    1. Secure login page: Here a secure login page is used to make the users login. Through this page the administrators can also login. If user gives combination of wrong username and password the user will be redirected to another page to get the correct accessibility. After a valid login the users can get their Home Page.

    2. Uploads:User can post many picture and texts by uploading album, videos with description, and share those over the network. User can see the post and can make many comments on it. (speed first).Hash

    3. Updated news details:Admin can upload the awareness related news details into the system and every user can see the news related to this site. Also the user related news will be shown.

    4. Send Massage and chatting:User can send massage to each other and can instant chatting to each other. (Passive chat)

    5. Searching: User can search for their friends over the network through their email address or with their name. The searching result will be shown in the searching page with their friends picture and details

    6. Security features by phone:In the moment when interested people have created their account then they will get confirmation by message in their phone. The every movement of the users with their friends will be send automatically by the system to the related users account.

    7. Password Recovery: User can easily recover their password if they forget their password .By a link user will be redirected to another page and fulfil the form they can easily recover their password. (OTP)

    8. Multiple friends Add features: User can search for their friends over the network through with their name. The searching result will be shown in the searching page with their friends picture and details. By checkboxes user can select their other users and send them friend request.

    9. Video Calling Facility: User can video chat with their friends with webcam & it is secured.

  3. DISCUSSION IV. CONCLUSION

  1. Snapshot

    1) Available Chat POP-UP Box

    Chat Pop-up Box for Online Messaging

    I give this new web site name as SCRAPBOOK, which is built by Adv. JAVA technology. The project Scrapbook is completed, satisfying the required design specifications. The system provides a user-friendly interface. The software is developed with modular approach. All modules in the system have been tested with valid data and invalid data and everything work successfully. Thus the system has fulfilled all the objectives identified and is able to replace the existing system. The constraints are met and overcome successfully. The system is designed as like it was decided in the design phase. The system is very user friendly and will reduce time consumption. This software has a user-friendly screen that enables the user to use without any inconvenience. The application has been tested with live data and ha provided a successful result. Hence the software has proved to work efficiently. Some up gradations are retained here for further research to make website more users friendly

    REFERENCES

  2. Recommendations for Further Research

    We still can apply the following thing by researching that how these features can be applied in this new website. Then it will be more friendly & attractive to users. These are-

    1. Spam Protection: Unable to implement Spam protection which is used to make the spam massage blocked which can herm the privacy of the user.

    2. Event Creation: Event creation cannot be handled by this site right now. By this policy user can create event and invite their friends.

  1. Books

    1. Web Technology & Design by C. Xavier.

    2. JSP Complete Reference TMH.

    3. J2EE Professional with JSP Almaraju.

  2. Papers

    1. Social Network Sites: Definition, History and ScholarshipPaper by Danah m. Boyd & Nicole B. Ellison.

    2. Social Networking and Security Risks -Paper by Brad Dinerman.

Leave a Reply