A FRAMEWORK FOR DEVELOPING SMART SOCIAL MEDIA PLATFORMS
Abstract
Social media networks have revolutionized the activities of this age. Larger populations are using social media for education, exchange of ideas, business, marketing, fun, games, commerce and so on. However, there exists a fundamental challenge in this media, which is, the identity insincerity and theft. Users of social media create so many accounts for themselves and use these accounts for frauds. Some use other people information like names, pictures and profile to create multiple accounts for their dubious benefits. This has posed many fears on user not to believe in most media engagements. Connecting and communicating to some people in other locations of the world comes with a lot of doubt, fears and difficulties in exchanging business and expertise ideas which is one of the hallmarks of the social media. In dealing with these challenges, this paper has presented a framework for deploying smart social media platforms for enhanced information security and eliminating multiple opening/using of social media platform by same individual for fraudulent activities. This framework was developed using Object Oriented Methodology and C# was used to implement the prototype platform. Visual Studio was used as the IDE for the developed platform. The platform output shows its viability in preventing multiple account creation by users. The platform performance is shown in the implementation output of the system whereby the system will prevent the creating of multiple accounts and the use of other people information in creating a new account.
References
Abid D (2012). Designing Network Services for the Cloud: Delivering Business-grade Cloud Services. Indianapolis, Ind: Cisco.
Aggarwal C.C (2011). An Introduction to Social Network Data Analytics, in Social Network Data Analytics. pp. 1-15. 2011. Springer US.
Ahmad M, Ango, A. K. and Barau, A. A (2025). Impact of Social Media Platforms on Farmers Livelihood Assets in North-Western Nigeria. FUDMA Journal of Sciences (FJS). Vol. 9 No. 1 , pp 333 345. DOI:https://doi.org/10.33003/f js-2025-0901-3143
Bigwood, G., Rehunathan, D., Bateman, M., Henderson, T. and Bhatti, S., (2008). Exploiting self-Reported Social Networks for Routing in Ubiquitous Computing Environments. In 2008 IEEE International Conference on Wireless and Mobile Computing, Networking and Communications (pp. 484-489). IEEE.
Buyya R, Broberg J and Goscinski A.M, (2010). Cloud computing: Principles and Paradigms. Vol. 87. John Wiley & Sons.
Chaudhari, P and Das, M. L. (2019). Privacy Preserving Searchable Encryption with fine-grained Access Control. IEEE Transactions on Cloud Computing, 9(2), 753-762.
Chbeir R, and Bouna B.A. (2013). Security and Privacy Preserving in Social Networks. Vienna: Springer.
Chen, X. (2020). Security-Preserving Social Data Sharing Methods in Modern Social Big Knowledge Systems. Information Sciences, 515, 404-416.
Fugkeaw, S., & Sato, H. (2018). Enabling Dynamic and Efficient Data Access Control in Cloud Computing Based on Attribute Certificate Management and CP-ABE. In 2018 26th Euromicro International Conference on Parallel, Distributed and Network-based Processing (PDP) (pp. 454-461). IEEE.
Hamideh J, Behnaz M, Elaheh M, & Behrouz Z (2023). A Framework for Privacy and Security on Social Networks Using Encryption Algorithms. International Journal of Smart Electrical Engineering, Vol.12, No.1.
Kumar K, and Lu Y.H (2010). Cloud Computing for Mobile users: Can Offloading Computation save Energy? , Computer, vol. 43(4), 51-56. 2010.
Li, R., Shen, C., He, H., Gu, X., Xu, Z., & Xu, C. Z. (2017). A Lightweight Secure Data Sharing Scheme for Mobile Cloud Computing. IEEE Transactions on Cloud Computing, 6(2), 344-357.
Malluhi, Q. M., Shikfa, A., Tran, V. D., & Trinh, V. C. (2019). Decentralized Ciphertext-policy Attribute-based Encryption Schemes for Lightweight Devices. Computer Communications, 145, 113-125.
Naif A.A (2016). Cloud Computing Privacy Concerns in Social Networks. International Journal of Computer (IJC) Volume 22, No 1, pp 29-36.
Raji, F., Jazi, M. D., & Miri, A. (2014). PESCA: A Peer-to-Peer Social Network Architecture with Privacy-Enabled Social Communication and Data Availability. IET Information Security, 9(1), 73-80.
***Sen J (2013). Security and Privacy Issues in Cloud Computing Architectures and Protocols for Secure Information Technology Infrastructures, 2013, pp.1-45.
Wang, Z., Ma, Z., Luo, S., & Gao, H. (2018). Enhanced Instant Message Security and Privacy Protection Scheme for Mobile social Network Systems. IEEE , 6, 13706-13715.
Wang, S., Zhang, Y., & Zhang, Y. (2018). A Blockchain-Based Framework for Data Sharing with Fine-Grained Access Control in Decentralized Storage Systems. IEEE 6, 38437-38450
Yahiatene, Y., Menacer, D. E., Riahla, M. A., Rachedi, A., & Tebibel, T. B. (2019). Towards a Distributed ABE Based Approach to Protect Privacy on Online Social Networks. In 2019 IEEE Wireless Communications and Networking Conference (WCNC) (pp. 1-7). IEEE.
Zhang, S., Yao, T., Arthur Sandor, V. K., Weng, T. H., Liang, W., & Su, J. (2021). A Novel Blockchain-Based Privacy-Preserving Framework for Online Social Networks. Connection Science, 33(3), 555-575.
Copyright (c) 2025 FUDMA JOURNAL OF SCIENCES

This work is licensed under a Creative Commons Attribution 4.0 International License.
FUDMA Journal of Sciences