Intent Search and Centralized Sybil Defence Mechanism for Social Network
Journal Title: IOSR Journals (IOSR Journal of Computer Engineering) - Year 2014, Vol 16, Issue 6
Abstract
Abstract: Sybil attacks are the major problems occurred in the distributed systems without trusted identities. It occur when the one-to-one relationship between a node and its identity is violated. This is occurred by an attacker creates multiple pseudonymous identities and pretends to be multiple, distinct nodes in the system. Intent search is another important function in social network. It mostly depends on surrounding text features which leads to noisy search result. In this paper a new Sybil defence mechanism is introduced that is Sybil protector, in order to defend against attacks in social networks. It is efficient and scalable to large social network. Network topologies are used by the Sybil protector to defend against Sybil attacks in social networks. It can effectively identify the Sybil nodes and detect the Sybil community around a Sybil node. And also limits the number of attack edges in online social networks. Here also included a novel internet image search which only requires one-click user feedback. For that expanded keywords are used to create positive example images and to include more relevant images it enlarge the image pool. It consist of four steps.1) Adaptive similarity.2) Keyword expansion. 3) Visual query expansion. Intent image search is very effective because it has extremely simple user interface.
Authors and Affiliations
Julia George
Face Image Restoration based on sample patterns usingMLP Neural Network
Abstract: In this paper, a sample based face image restoration method using MLP neural networks ispresented. First, an HR (High Restoration) image is changed to a number of LR (Low Resolution) images by theobservat...
Personal Financial Assistant
Abstract: Managing our finances has always been an important part of our life. While it is easy to let situation define our expenses, it becomes exceedingly difficult to keep track of all the spending, and is not very ap...
Version Control in Open Source Software
Abstract: open source software is software whose source code is freely available for anyone. The Open source software can be redistributed to others users and they can use it according to their own needs. Version C...
Passive Image Forensic Method to Detect Resampling Forgery inDigital Images
Abstract: The digital images are becoming important part in the field of information forensics and security,because of the popularity of image editing tools, digital images can be tampered in a very efficient mannerwitho...
Secure Multi-Keyword Top-K Retrieval Over Encrypted Cloud Data Using Homomorphic Encryption
Abstract: Using Cloud Storage, users can remotely store their data and enjoy on-demand high quality applications and services. To ensure safety of stored data, it becomes must to encrypt data before storing in the global...