Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls

Abstract

Social networking creates digital communication technologieshone tools for make bigger the social ring of people.It has by nowturned intoasignificant integral part of our dailylives;allow us to contact our friends and families on time. It is hopefulthat the conventional solutions can be more extended to answerthe MSN problems by allowing for the unique social features.Privacy preservation is a momentous research issue in socialnetworking. Since more tailored information is sharedwith the public, disobey the solitude of a target user becomemuch easier. Wefirst advise an explicit Comparison-based Profile Matchingprotocol (eCPM) which runs among two parties, an initiatorand a responder. The eCPM facilitate the initiator to attain thecomparison-based matching outcome about a specified attributein their profiles, while avoid their attribute values fromconfession. Weafter that propose an implicit Comparison-based ProfileMatching protocol (iCPM) which allows the initiator to straightobtain some messages as an alternative of the judgment result fromthe responder.

Authors and Affiliations

V. S. N. Murthy, K. Kishore Raju

Keywords

Related Articles

Vigorous Data Provision And Organization By Using Gossip Protocol

Cloud computing is focused on virtual mechanism data storage and sharing on web services. The cloud environment consists of several elements such as clients and distributions. It includes fault tolerance, high availa...

Applications of MVS on Hierarchical Clustering Algorithms

Clustering is a valuable method that arranges a large quantity of unordered text documents into a small number of expressive and coherent clusters, thereby offering a basis for instinctive and informative steering an...

Live Activity Index To Gather Effective Live Traffic Broadcasting To Users

A few online services give live movement information by dissecting gathered information from street sensors, activity cameras, and group sourcing strategies, for example, Google-Map, Navteq, INRIX Traffic Information...

An approach of Regression testing for Service Oriented Architecture

Service Oriented Architecture (SOA) is an application architecture in which services are described using a description language. It has changed the way business enterprises with technology with a very fast demand of r...

Image Compression through Data Representation in Frequency Domain

Data compression is a very important field these days. You can find it in any web page, network devices, application files etc. Its importance has grown during the years as a necessity of storage and time of transpor...

Download PDF file
  • EP ID EP28219
  • DOI -
  • Views 273
  • Downloads 3

How To Cite

V. S. N. Murthy, K. Kishore Raju (2015). Efficient Anonymity Profile Comparison Techniques To Filter Unwanted Messages From OSN User Walls. International Journal of Research in Computer and Communication Technology, 4(8), -. https://europub.co.uk/articles/-A-28219