Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends and families on time. It is hopefulthat the conventional solutions can be more extended to answerthe MSN problems by allowing for the unique social features.Privacy preservation is a momentous research issue in socialnetworking. Since more tailored information is sharedwith the public, disobey the solitude of a target user becomemuch easier. Wefirst advise an explicit Comparison-based Profile Matchingprotocol (eCPM) which runs among two parties, an initiatorand a responder. The eCPM facilitate the initiator to attain thecomparison-based matching outcome about a specified attributein their profiles, while avoid their attribute values fromconfession. Weafter that propose an implicit Comparison-based ProfileMatching protocol (iCPM) which allows the initiator to straightobtain some messages as an alternative of the judgment result fromthe responder.
Authors and Affiliations
V. S. N. Murthy, K. Kishore Raju
Proposed mobility hub at Trivandrum
Based on the goal of reducing the usage of private vehicles thus reducing the vehicular trips, congestion, pollution etc. we proposed a Mobility Hub, is a principal focal point that links all public transportation servi...
Filtered Wall: An Automated System to Filter Unwanted Messages from OSN User Profiles
In recent years, Online Social Networks (OSNs) have become an important part of daily life. Users build explicit networks to represent their social relationships. Users can upload and share information related to the...
UM: A Novel Seclusion Model for Defending Structural Information of Social Network Data
Publishing or sharing the social network data for social science research and business analysis lack of privacy. Existing technique k-anonymity is used to prevent identification of micro data. Even though an attacke...
Power Dissipation Reduction In CMOS Circuits Using Power Gating Scheme
In this paper by victimization power gating technique we tend to reduced the discharge power of the Conditional information Mapping Flip-flop .In, this gift days low power technology is increasing chop-chop, majorly...
A comparison Approach in Image Optimization Techniques
The capturing of multiple low-resolution images taken of the same scene results in a distortion between each image. Image registration is the process of determining this distortion. In this paper, we examine the hypo...