Stategy And Necessity Trades For Smile Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed users abuse the information’s. So this new approach challenges network basically different by previous social network designs this new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. Here also we explore different requirements for these new systems. We first provide an introduction to the surveillance, social and institutional privacy perspectives. We then explore the differences between these approaches in order to understand their complementarity. In this paper, we explore the privacy requirements for Encounter- based social networks. We provide an overview on the privacy guarantees and feasibility of SMILE and also its drawback in meeting certain requirements. So we describes the design of SMILE, is secure for a privacy-protection “missed-connections” service for mobile users. It also provides services using mobile devices without relying on trusted coordinating server. Here SMILE design using key exchange protocols. We develop cryptography hash technique for protect the information through the mobile application. This paper presents a design of secure encounter-based social network by implementing in android application called MeetUp.
Authors and Affiliations
Dendukuri rama Manohar, Barigala Srikanth, Saritha Seelam
Effective Routing Plan For Quality Results On Linked Data Using Keyword Search
Keyword search is a natural world view for seeking connected information sources on the web. We propose to route keywords just to pertinent sources to reduce the high cost of handling keyword search queries over all...
Intelligent encoding with added puzzle & TESLA security of packets Against Jamming Attacks in Wireless Network
Wireless network never has certain defined boundaries that can’t be extended due to this nature security flaws may get developed. Broadcast nature of wireless network makes it easy for intentional attacks to disturb...
Query Clustering method to User profiles
The User profiling is a fundamental component of any personal applications. The several existing user profiling strategies are based on the objects of users are interested in positive references but not negative pref...
CLUMARE: A GUI Based Tool for Clustering Multidimensional Datasets Using Map Reduce
chiranjeevi416@gmail.com, Srinivas2804@gmail.com, parisakishore@gmail.com
High Speed Implementation Of Fused Floating Point Add-Subtract Unit
Most universally useful processors (GPP) and application particular processors (ASP) utilize the coasting guide number-crunching due toward its wide and exact number framework. In any case, the coasting point operatio...