Intent Search and Centralized Sybil Defence Mechanism for Social Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an attacker creates multiple pseudonymous identities and pretends to be multiple, distinct nodes in the system. Intent search is another important function in social network. It mostly depends on surrounding text features which leads to noisy search result. In this paper a new Sybil defence mechanism is introduced that is Sybil protector, in order to defend against attacks in social networks. It is efficient and scalable to large social network. Network topologies are used by the Sybil protector to defend against Sybil attacks in social networks. It can effectively identify the Sybil nodes and detect the Sybil community around a Sybil node. And also limits the number of attack edges in online social networks. Here also included a novel internet image search which only requires one-click user feedback. For that expanded keywords are used to create positive example images and to include more relevant images it enlarge the image pool. It consist of four steps.1) Adaptive similarity.2) Keyword expansion. 3) Visual query expansion. Intent image search is very effective because it has extremely simple user interface.
Authors and Affiliations
Julia George
Establishing Point to Point Connections Among IoT Devices Over the Internet
The rapid growth in the number of devices connected to the internet, other than computers, has proposed the Internet of Things (IoT) era. These devices make use of the high availability of internet connection to intercha...
Performance Analysis of NodeLock Licensing Methodology with RMPRSA Cryptography
Abstract:There are many means of unauthorized access of software products being applied. To control this access towards copying the software products on various systems, software developers generally define certain...
Loan Approval Prediction based on Machine Learning Approach
Abstract: With the enhancement in the banking sector lots of people are applying for bank loans but the bank has its limited assets which it has to grant to limited people only, so finding out to whom the loan can be gra...
An Approach To Sentiment Analysis Using Lexicons With Comparative Analysis of Different Techniques
Abstract : The World Wide Web is growing at an astonishing rate. This has resulted in enormous increase in online communication. The online communication data consist of feedback, comments and reviews that are posted on...
Simulation of Parallel and Distributed Computing: A Review
Abstract : Parallel and Distributed Computing has made it possible to simulate large infrastructures like Telecom networks, air traffic etc. in an easy and effective way. It not only makes the processes faster and reliab...