Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls

Abstract

Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends and families on time. It is hopefulthat the conventional solutions can be more extended to answerthe MSN problems by allowing for the unique social features.Privacy preservation is a momentous research issue in socialnetworking. Since more tailored information is sharedwith the public, disobey the solitude of a target user becomemuch easier. Wefirst advise an explicit Comparison-based Profile Matchingprotocol (eCPM) which runs among two parties, an initiatorand a responder. The eCPM facilitate the initiator to attain thecomparison-based matching outcome about a specified attributein their profiles, while avoid their attribute values fromconfession. Weafter that propose an implicit Comparison-based ProfileMatching protocol (iCPM) which allows the initiator to straightobtain some messages as an alternative of the judgment result fromthe responder.

Authors and Affiliations

V. S. N. Murthy, K. Kishore Raju

Keywords

Related Articles

A Survey on Routing Protocols for Wireless Sensor Networks

A wireless sensor network is a specialized wireless network consisting of a large number of sensors and at least one base station. The most important difference between the wireless sensor network and the traditional...

Efficient Technique for Security to Storage Nodes in Multi-Cloud

Now a days these cloud computing users are more in many organizations. It provides many benefits are minimum cost and accessibilities of data. Ensuring the security of cloud computing is a major factor in its environ...

Mobility Prediction: A review of Techniques used in MANETS

Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he...

A Novel Approach for Finding Optimal Overlay Nodes In Routing

In networks to enhance the TCP throughput and postponement Overlay steering procedure is proposed.one of the primary point of interest of this method it doesn't have to change current directing technique. Yet, arrang...

Secure Fog Computing: Providing Data Security

Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponen...

Download PDF file
  • EP ID EP28219
  • DOI -
  • Views 270
  • Downloads 3

How To Cite

V. S. N. Murthy, K. Kishore Raju (2015). Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28219