Intent Search and Centralized Sybil Defence Mechanism for Social Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an attacker creates multiple pseudonymous identities and pretends to be multiple, distinct nodes in the system. Intent search is another important function in social network. It mostly depends on surrounding text features which leads to noisy search result. In this paper a new Sybil defence mechanism is introduced that is Sybil protector, in order to defend against attacks in social networks. It is efficient and scalable to large social network. Network topologies are used by the Sybil protector to defend against Sybil attacks in social networks. It can effectively identify the Sybil nodes and detect the Sybil community around a Sybil node. And also limits the number of attack edges in online social networks. Here also included a novel internet image search which only requires one-click user feedback. For that expanded keywords are used to create positive example images and to include more relevant images it enlarge the image pool. It consist of four steps.1) Adaptive similarity.2) Keyword expansion. 3) Visual query expansion. Intent image search is very effective because it has extremely simple user interface.
Authors and Affiliations
Julia George
Design and Simulation of Dct Chip In Vhdl and Application in Watermark Extraction
Abstract: The paper presented the design, modeling and chip implementation of 2D Discrete Cosine Transform (DCT) domain for copyright protection of images, as digital watermarking chip. Recent improvement in comput...
[b][/b] Multidirectional Product Support System for Decision Making In Textile Industry Using Collaborative Filtering Methods
Big Data Mining using Map Reduce: A Survey Paper
Abstract: Big data is large volume, heterogeneous, distributed data. Big data applications where datacollection has grown continuously, it is expensive to manage, capture or extract and process data using existings...
A Survey on Fuzzy Association Rule Mining Methodologies
Fuzzy association rule mining (Fuzzy ARM) uses fuzzy logic to generate interesting association rules. These association relationships can help in decision making for the solution of a given problem. Fuzzy A...
Encryption Technique for a Trusted Cloud ComputingEnvironment
With varying amount of computing power present with everyone, it has become necessity of the hour to usecloud computing systems. It helps us to store our data within a virtual cloud structure. When we use the cloud...