Reviewing risks and vulnerabilities in web 2.0 for matching security considerations in web 3.0

Abstract Web 2.0 has entirely revolutionized the web and the ways people use it by bringing enhancements in information discovery, retrieval, and aggregation. It has also brought improvements in various aspects like content controlling, content structuring, web technologies, applications, communication, marketing and selling. On the one hand, these improvements are providing extensive benefits while, on the other hand they are compromising fundamental requirements of security and confidentiality. The vulnerabilities and security risk associated with these enhancements are becoming a major security threats to the organizations and laymen. In this paper, we have discussed the features and improvements brought in web 2.0 and the security risks associated with them which will set a road map towards the necessity of web 3.0.

[1]  Veronica Popovici,et al.  Web 2.0 Tools in the Context of Integrated Communication: New Technologies Revolutionizing the Business Environment , 2009, 2009 International Conference on Management and Service Science.

[2]  Xi Chen,et al.  A Literature Review of Privacy Research on Social Network Sites , 2009, 2009 International Conference on Multimedia Information Networking and Security.

[3]  Eddie Rabinovitch Protect your users against the latest web-based threat: malicious code on caching servers [Your Internet Connection] , 2007, IEEE Communications Magazine.

[4]  Atta Rahman Optimum information embedding in digital watermarking , 2019, J. Intell. Fuzzy Syst..

[5]  Marco Vieira,et al.  Using web security scanners to detect vulnerabilities in web services , 2009, 2009 IEEE/IFIP International Conference on Dependable Systems & Networks.

[6]  Riaan J. Rudman,et al.  Incremental risks in Web 2.0 applications , 2010, Electron. Libr..

[7]  Maqsood Mahmud,et al.  Medical Image Watermarking for Fragility and Robustness: A Chaos, Error Correcting Codes and Redundant Residue Number System Based Approach , 2018 .

[8]  Kiran Kumar.,et al.  SybilDefense : Defending Sybil attacks using techniques from Complex Systems , 2010 .

[9]  Stephen Baden,et al.  Mashup ( web application hybrid ) , 2011 .

[10]  Robert A. Martin,et al.  Vulnerability Type Distributions in CVE , 2007 .

[11]  S. Mohorovicic Implementing responsive web design for enhanced web presence , 2013, 2013 36th International Convention on Information and Communication Technology, Electronics and Microelectronics (MIPRO).

[12]  Mahesh Chandra Govil,et al.  Predicting Cross-Site Scripting (XSS) security vulnerabilities in web applications , 2015, 2015 12th International Joint Conference on Computer Science and Software Engineering (JCSSE).

[13]  Isabella Peters,et al.  Folksonomies - Indexing and Retrieval in Web 2.0 , 2009, Knowledge and Information.

[14]  Atta ur Rahman,et al.  The Digital Library and the Archiving System for Educational Institutes , 2018, Pakistan Journal of Information Management and Libraries.

[15]  Meledath Damodaran,et al.  Security in web 2.0 application development , 2008, iiWAS.

[16]  Wei Sun,et al.  Towards Service Composition Based on Mashup , 2007, 2007 IEEE Congress on Services (Services 2007).

[17]  Bebo White The Implications of Web 2.0 on Web Information Systems , 2006, WEBIST.

[18]  Maqsood Mahmud,et al.  Evolutionary-based image encryption using RNA codons truth table , 2020 .

[19]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[20]  George Lawton Web 2.0 Creates Security Challenges , 2007, Computer.

[21]  Naveen Chilamkurti,et al.  A Neuro-fuzzy approach for user behaviour classification and prediction , 2019, Journal of Cloud Computing.

[22]  Ashish Kr. Luhach,et al.  Investigating TYPE constraint for frequent pattern mining , 2019, Journal of Discrete Mathematical Sciences and Cryptography.

[23]  Rachid Zagrouba,et al.  Enhanced query processing over semantic cache for cloud based relational databases , 2020, Journal of Ambient Intelligence and Humanized Computing.