SafeChat: A tool to shield children's communication from explicit messages

Internet, on one hand, is a primary foundation for knowledge acquisition in a child's life. On the other hand, there are many growing exploits over children. Motivated by the rising need to shield children's communication channels from obnoxious sources, this paper proposes a framework named SafeChat. SafeChat is the result of aggregating the context based authentication features of 4-CBAF model and the message encryption features from demonstrated SecureString 2.0. SafeChat intercepts children's communication and eradicates explicit words coming into the children's devices. SafeChat filters explicit words without recognizing their meaning. Such an approach hardens the system against malicious attacks. Furthermore, it secures the communication channels against possible man-in-the-middle attacks by employing an encryption mechanism. In addition, it encompasses the tools to authenticate and authorize communications and allows parents to monitor children communication channels in case an intervention is desirable. SafeChat supports to extend it to incorporate essential features including a facility to censor users through building a social network. Such a social network would allow other children to learn about the users with potential threats.

[1]  Srini Ramaswamy,et al.  Supporting Location Information Privacy in Mobile Devices , 2013, ICDCIT.

[2]  Günter Fahrnberger A Second View on SecureString 2.0 , 2014, ICDCIT.

[3]  Violeta Holmes,et al.  Agent-Mediated Information Exchange: Child Safety Online , 2009, 2009 International Conference on Management and Service Science.

[4]  Robert S. Tokunaga,et al.  Following you home from school: A critical review and synthesis of research on cyberbullying victimization , 2010, Comput. Hum. Behav..

[5]  Elizabeth Englander,et al.  CYBERBULLYING AND INFORMATION EXPOSURE: USER-GENERATED CONTENT IN POST- SECONDARY EDUCATION , 2009 .

[6]  George A. Miller,et al.  WordNet: A Lexical Database for English , 1995, HLT.

[7]  Günter Fahrnberger Computing on Encrypted Character Strings in Clouds , 2013, ICDCIT.

[8]  Jo Bryce,et al.  Young people, disclosure of personal information and online privacy: Control, choice and consequences , 2009, Inf. Secur. Tech. Rep..

[9]  K Chung Development of an integrated chat monitoring and web filtering parental control for child online supervision , 2004 .

[10]  Rong Chen,et al.  A secure cross-platform mobile IM system for enterprise applications , 2011, 2011 International Conference on Uncertainty Reasoning and Knowledge Engineering.

[11]  R. Strom,et al.  Cyberbullying by Adolescents: A Preliminary Assessment , 2006 .

[12]  David S. Rosenblum,et al.  What Anyone Can Know: The Privacy Risks of Social Networking Sites , 2007, IEEE Security & Privacy.