Big Data on Content Credibility of Social Networking Sites and Instant Messaging Applications
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2016, Vol 18, Issue 5
Abstract
Abstract: The quantity of unstructured and structured data from social networking platforms and mobile phone instant messaging applications is massive and is produced at an exponential rate yet there is no mechanism to verify the content’s truthfulness and trustworthiness. In this paper we have proposed a theory of how Big Data technology can be employed to validate the credibility of the vastly diffused data. Using technologies like Hadoop to analytically process the fast paced incoming data and measure the reliability of the content. To verify the integrity, the processed data must be inspected against entrusted sources. These sources must beaccessible and should have trustworthy data that can assist in measuring the authenticity of contents from various sources. While privacy concerns are often dismissed when data is scraped from public-facing platforms such as Facebook, the need for these sites to validate the data posted on their site becomes prudent. Postingfalse rumors devalues the extent to which social networking acts as an effective method of spreading true information. In this paper we provide a brief exploration on Big Data, Hadoop and influence of unsolicited messages propagated from social networking websites and instant messaging applications.
Authors and Affiliations
Anurag Kumar , Monica Mishra, , Rinkita Mittal
Face Recognition using Face Alignment and PCA Techniques: ALiterature Survey
Abstract: The face is our key of attention in social communication, playing a main role in transmission identityand sentiment. Hence, Face recognition has become an important issue in many applications such as securitysy...
Enhancement of Security Levels Using a Secure Intrusion Detection System in Manets
Abstract: A Mobile Ad hoc Network (MANET) is a system of wireless mobile nodes that dynamically self-organize in arbitrary and temporary network topologies .A Security is an important issue for ad hoc networks, especiall...
Algorithms for Various Biological Networks
Abstract: Biological networks are the networks which are used to represent different biological entities and relationship between the different entities. But due to the ongoing growth of knowledge in the life science the...
Efficient Data Caching Based On Fuzzy Decision Routing InVehicle Disruption Tolerant Networks
Abstract: Disruption tolerant networks (DTNs) are characterized by low node density, unpredictable nodemobility, and lack of global network information. Most of current research efforts in DTNs focus on dataforward...
Robust Digital Image Watermarking based on spread spectrum and convolutional coding
Digital watermarking is a promising technology to embed information as unperceivable signals in digital contents. A copyright protection method for digital image with convolutional coding is proposed in this &nbs...