A Review of Security, Privacy, and Authentication Mechanisms in Social Media Web Applications

Authors

  • Dr. Ashwini Kumar Jha Author
  • Akil Khatri Student - PIET Author
  • Kavi Kanda Author
  • Areeb Haider Author
  • Raunak Shah Author

Keywords:

social media security, social media privacy, social media authentication, fake account detection, bot detection, phishing attacks, machine learning in cybersecurity, deep learning for social networks, privacy paradox, AI-driven privacy risks, Inference attacks, Data Governance, Multi-factor authentication (MFA), Single sign on (SSO), OAuth 2.0, PKCE, Identity verification, Social-technical security frameworks, cross-platform security evaluation, User Behavior in Cybersecurity

Abstract

Social media was never supposed to become this complicated. What started as a way to stay connected has turned into one of the most contested spaces in modern life where fake identities thrive, personal data gets harvested in ways users never agreed to, and the systems meant to verify who we are can barely keep up. Researchers have thrown a lot at these problems over the years, and there has been genuine progress. But an uncomfortable pattern keeps repeating itself, solutions that look great on paper tend to wobble once they hit the real world. The privacy paradox still has no clean answer. Detection models still break when moved between platforms. Authentication still trades security for convenience in ways nobody is fully happy with. Until the technical side of this work starts taking human behavior and policy seriously not as afterthoughts but as core design constraints, the same gaps will keep reappearing.

Downloads

Download data is not yet available.

Author Biographies

  • Dr. Ashwini Kumar Jha

    Associate Professor, AI-DS Department, Parul University, India

  • Akil Khatri, Student - PIET

    Student, B.Tech AI, Parul University, India

  • Kavi Kanda

    Student, B.Tech AI, Parul University, India

  • Areeb Haider

    Student, B.Tech AI, Parul University, India

  • Raunak Shah

    Student, B.Tech AI, Parul University, India

References

[1] A. D. Frunze and A. A. Frolov, “Methods for Detecting Fake Accounts on the Social Network VK,” in 2021 IEEE Conference of Russian Young Researchers in Electrical and Electronic Engineering (ElConRus), Jan. 2021, pp. 342–346. doi: 10.1109/ElConRus51938.2021.9396670.

[2] D. Amankeldin, L. Kurmangaziyeva, A. Mailybayeva, N. Glazyrina, A. Zhumadillayeva, and N. Karasheva, “Deep Neural Network for Detecting Fake Profiles in Social Networks,” Comput. Syst. Sci. Eng., vol. 47, no. 1, pp. 1091–1108, 2023, doi: 10.32604/csse.2023.039503.

[3] Z. Talha, “Enhancing Social Network Security: Machine Learning-Based Bot Detection,” University of Guelma, Working Paper, 2024. Accessed: Feb. 02, 2026. [Online]. Available: https://dspace.univ-guelma.dz/jspui/handle/123456789/16472

[4] A. Gruzd and Á. Hernández-García, “A balancing act: how risk mitigation strategies employed by users explain the privacy paradox on social media,” Behav. Inf. Technol., vol. 43, no. 1, pp. 21–39, Jan. 2024, doi: 10.1080/0144929X.2022.2152366.

[5] L. H. Wang and M. J. Metzger, “The Online Privacy Divide: Testing Resource and Identity Explanations for Racial/Ethnic Differences in Privacy Concerns and Privacy Management Behaviors on Social Media,” Commun. Res., p. 00936502241273157, Aug. 2024, doi: 10.1177/00936502241273157.

[6] X. Cheng, L. Qiao, B. Yang, and X. Zhang, “Investigation on users’ resistance intention to facial recognition payment: a perspective of privacy,” Electron. Commer. Res., pp. 1–27, Nov. 2022, doi: 10.1007/s10660-022-09588-y.

[7] Y. Liu, W. K. Tse, P. Y. Kwok, and Y. H. Chiu, “Impact of Social Media Behavior on Privacy Information Security Based on Analytic Hierarchy Process,” Information, vol. 13, no. 6, p. 280, May 2022, doi: 10.3390/info13060280.

[8] C. A. Yeung, I. Liccardi, K. Lu, O. Seneviratne, and T. Berners-Lee, “Decentralization: The Future of Online Social Networking,” in Linking the World’s Information, 1st ed., O. Seneviratne and J. Hendler, Eds., New York, NY, USA: ACM, 2023, pp. 187–199. doi: 10.1145/3591366.3591383.

[9] Deepak Pandey, “Enhancing Digital Security through SSO and MFA Integration: A Technical Perspective,” Aug. 2025, doi: 10.5281/ZENODO.16790057.

[10] S. Matcha and M. Kumar, “Enhancing Software Security with OAuth 2.0:Implementation Strategies and Vulnerability,” vol. 12, Mar. 2025.

[11] M. A. Hossain and A. Raza, “EXPLORING THE EFFECTIVENESS OF MULTIFACTOR AUTHENTICATION IN PREVENTING UNAUTHORIZED ACCESS TO ONLINE BANKING SYSTEMS,” vol. 01, no. 01, 2023.

[12] N. Khurshid, “Single Sign-On (SSO) and its Intersection with Phishing Attacks: An Investigation,” 2025.

[13] A. R. Pratama, F. M. Firmansyah, and F. Rahma, “Security awareness of single sign-on account in the academic community: the roles of demographics, privacy concerns, and Big-Five personality,” PeerJ Comput. Sci., vol. 8, p. e918, Mar. 2022, doi: 10.7717/peerj-cs.918.

[14] W. Ahmad, R. Berg, and S. Kim, “Combating Fake News with Digital Identity Verification,” 2024.

[15] “Biggest social media platforms by users 2025,” Statista. Accessed: Feb. 12, 2026. [Online]. Available: https://www.statista.com/statistics/272014/global-social-networks-ranked-by-number-of-users/

[16] A. Kumar, “Sensing and Supervising through IOT,” Int. J. Comput. Appl., vol. 152, no. 9, pp. 7–9, Oct. 2016, doi: 10.5120/ijca2016911723.

[17] D. K. S. Manoj, “CYBER-SECURITY: DETECTING IDENTITY DECEPTION ON SOCIAL MEDIA PLATFORMS,” Int. J. Electr. Eng. Technol. IJEET, vol. 12, no. 1, Jan. 2021.

[18] V. Soni and A. Jha, “IoT botnet attacks detection using deep learning approaches: a review,” IET Conf. Proc., vol. 2025, no. 7, pp. 253–260, Sep. 2025, doi: 10.1049/icp.2025.1303.

[19] S. Agal, K. Raulji, and N. D. Odedra, “A machine learning approach to risk based asset allocation in portfolio optimization,” Sci. Rep., vol. 15, no. 1, p. 42263, Nov. 2025, doi: 10.1038/s41598-025-26337-x.

[20] S. Agal, K. Raulji, N. Bhavsar, and P. Bhatt, “Spatiotemporal Graph Networks for Relational Reasoning in Campus Infrastructure Management,” Int. J. Adv. Comput. Sci. Appl. Ijacsa, vol. 16, no. 10, Oct. 2025, doi: 10.14569/IJACSA.2025.0161085.

[21] A. K. Jha, M. Patel, and T. Pawar, “Fog offloading: Review, Research Opportunity and Challenges,” in 2019 International Conference on Smart Systems and Inventive Technology (ICSSIT), Tirunelveli, India: IEEE, Nov. 2019, pp. 1224–1227. doi: 10.1109/ICSSIT46314.2019.8987905.

[22] A. K. Jha and T. Pawar, “Computation Offloading for Smart Healthcare Applications,” in IoT Applications for Healthcare Systems, R. K. Kher, C. Paunwala, F. Thakkar, H. Kher, M. Paunwala, P. K. Sahoo, and L. Ladid, Eds., in EAI/Springer Innovations in Communication and Computing. , Cham: Springer International Publishing, 2022, pp. 121–136. doi: 10.1007/978-3-030-91096-9_7.

[23] A. K. Jain, S. R. Sahoo, and J. Kaubiyal, “Online social networks security and privacy: comprehensive review and analysis,” Complex Intell. Syst., vol. 7, no. 5, pp. 2157–2177, Oct. 2021, doi: 10.1007/s40747-021-00409-7.

[24] A. Kumar, T. Vyas, S. Ahmed, N. Girdharwal, E. Vijayakumar, and A. Thangavelu, “Security and Privacy Enabled Framework for Online Social Networks using Blockchain,” in 2023 4th International Conference on Electronics and Sustainable Communication Systems (ICESC), Jul. 2023, pp. 641–647. doi: 10.1109/ICESC57686.2023.10193119.

[25] A. K. Jain, S. R. Sahoo, and J. Kaubiyal, “Online social networks security and privacy: comprehensive review and analysis,” Complex Intell. Syst., vol. 7, no. 5, pp. 2157–2177, Oct. 2021, doi: 10.1007/s40747-021-00409-7.

[26] C. Liu, T. Zhu, J. Zhang, and W. Zhou, “Privacy Intelligence: A Survey on Image Privacy in Online Social Networks,” ACM Comput Surv, vol. 55, no. 8, p. 161:1-161:35, Dec. 2022, doi: 10.1145/3547299.

[27] K. Kovalan et al., “A Systematic Literature Review of the Types of Authentication Safety Practices among Internet Users,” Int. J. Adv. Comput. Sci. Appl., vol. 12, no. 7, 2021, doi: 10.14569/IJACSA.2021.0120792.

[28] “Web Authentication: An API for accessing Public Key Credentials - Level 3.” Accessed: Feb. 25, 2026. [Online]. Available: https://www.w3.org/TR/webauthn-3/

[29] Technische Universität Darmstadt, Information Systems & E-Services, N. Siegfried, J. Löbbers, and A. Benlian, “The Trust-Building Nature of Identity Verification in the Sharing Economy: An Online Experiment,” in WI2020 Zentrale Tracks, GITO Verlag, 2020, pp. 1506–1521. doi: 10.30844/wi_2020_n5-siegfried.

[30] M. H. Nguyen, T. M. H. Dam, P. H. Pham, M. N. Pham, T. N. Nguyen, and H. T. Nguyen, “Behind the Digital Mask: Unveiling the Drivers of Anonymous Negative Word-Of-Mouth in Education,” 2025.

[31] S.- Rehman, N. Rehman, S. Saleem, and Y. A. Jaffri, “An Examination of the Impact of Social Media Anonymity and Intensity of Online Conflict and Aggressive Behavior,” Rev. Appl. Manag. Soc. Sci., vol. 8, no. 1, pp. 279–290, Feb. 2025, doi: 10.47067/ramss.v8i1.457.

[32] N. Khurshid, “Single Sign-On (SSO) and its Intersection with Phishing Attacks: An Investigation,” 2025.

Downloads

Published

07-03-2026

How to Cite

A Review of Security, Privacy, and Authentication Mechanisms in Social Media Web Applications. (2026). PUXplore Multidisciplinary Journal of Engineering, 2(1). https://puxplore.paruluniversity.ac.in/index.php/PXMJE/article/view/57