Stategy And Necessity Trades For Smile Networks
Journal Title: International Journal of Research in Computer and Communication Technology - Year 2014, Vol 3, Issue 9
Abstract
The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed users abuse the information’s. So this new approach challenges network basically different by previous social network designs this new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. Here also we explore different requirements for these new systems. We first provide an introduction to the surveillance, social and institutional privacy perspectives. We then explore the differences between these approaches in order to understand their complementarity. In this paper, we explore the privacy requirements for Encounter- based social networks. We provide an overview on the privacy guarantees and feasibility of SMILE and also its drawback in meeting certain requirements. So we describes the design of SMILE, is secure for a privacy-protection “missed-connections” service for mobile users. It also provides services using mobile devices without relying on trusted coordinating server. Here SMILE design using key exchange protocols. We develop cryptography hash technique for protect the information through the mobile application. This paper presents a design of secure encounter-based social network by implementing in android application called MeetUp.
Authors and Affiliations
Dendukuri rama Manohar, Barigala Srikanth, Saritha Seelam
Traffic Protection against Link and Node Failures Using Fast Re-Route for MPLS Networks
The increase of data transfer over the Internet is complexity process for providing internet services as badly affected the quality of service and the dataflow. To reduce this problem, in this paper I am introducing a...
Implementation and Analysis of Image Contrast Enhancement using Gaussian Mixture Model
In this paper, we propose a new global contrast enhancement algorithm using the histogram color and depth images. On the basis of the histogram-modification framework, the color and depth image histograms are first p...
Design of Automatic Automobile using CAN Bus
CAN is a serial bus protocol to connect individual systems and sensors as an alternative to conventional multi-wire looms. It allows automotive components to communicate on a single or dual-wire networked data bus up...
Classification of Questions in Micro-blogging Environment Using Support Vector Machine
Micro-blogging has attracted a growing body of scholarships, because of its popularization. While the use of blogs has spread to a variety of contexts, such as academic research, business and education studies sugges...
A dynamic variant of AP clustering to achieve comparable clustering performance
AP clustering is a model based system that fathoms by handover every information point to its closest model, where models are recognized by passing messages on bipartite chart. There are two sorts of messages going o...