Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2015, Vol 4, Issue 8
Abstract
Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends and families on time. It is hopefulthat the conventional solutions can be more extended to answerthe MSN problems by allowing for the unique social features.Privacy preservation is a momentous research issue in socialnetworking. Since more tailored information is sharedwith the public, disobey the solitude of a target user becomemuch easier. Wefirst advise an explicit Comparison-based Profile Matchingprotocol (eCPM) which runs among two parties, an initiatorand a responder. The eCPM facilitate the initiator to attain thecomparison-based matching outcome about a specified attributein their profiles, while avoid their attribute values fromconfession. Weafter that propose an implicit Comparison-based ProfileMatching protocol (iCPM) which allows the initiator to straightobtain some messages as an alternative of the judgment result fromthe responder.
Authors and Affiliations
V. S. N. Murthy, K. Kishore Raju
A Survey on Routing Protocols for Wireless Sensor Networks
A wireless sensor network is a specialized wireless network consisting of a large number of sensors and at least one base station. The most important difference between the wireless sensor network and the traditional...
Efficient Technique for Security to Storage Nodes in Multi-Cloud
Now a days these cloud computing users are more in many organizations. It provides many benefits are minimum cost and accessibilities of data. Ensuring the security of cloud computing is a major factor in its environ...
Mobility Prediction: A review of Techniques used in MANETS
Mobility prediction for individual path is a fascinating topic. Mobility prediction in mobile ad-hoc networks is a simple and effective scheme to predict when the user will leave from the current location and where he...
A Novel Approach for Finding Optimal Overlay Nodes In Routing
In networks to enhance the TCP throughput and postponement Overlay steering procedure is proposed.one of the primary point of interest of this method it doesn't have to change current directing technique. Yet, arrang...
Secure Fog Computing: Providing Data Security
Fog computing is a term for an alternative to cloud computing that puts some kinds of transactions and resources at the edge of a network, rather than establishing channels for cloud storage and utilization. Proponen...