Stategy And Necessity Trades For Smile Networks

Abstract

The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed users abuse the information’s. So this new approach challenges network basically different by previous social network designs this new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. Here also we explore different requirements for these new systems. We first provide an introduction to the surveillance, social and institutional privacy perspectives. We then explore the differences between these approaches in order to understand their complementarity. In this paper, we explore the privacy requirements for Encounter- based social networks. We provide an overview on the privacy guarantees and feasibility of SMILE and also its drawback in meeting certain requirements. So we describes the design of SMILE, is secure for a privacy-protection “missed-connections” service for mobile users. It also provides services using mobile devices without relying on trusted coordinating server. Here SMILE design using key exchange protocols. We develop cryptography hash technique for protect the information through the mobile application. This paper presents a design of secure encounter-based social network by implementing in android application called MeetUp.

Authors and Affiliations

Dendukuri rama Manohar, Barigala Srikanth, Saritha Seelam

Keywords

Related Articles

Low Power Design of A SRAM Cell for Embedded Memory

This paper presents a new SRAM cell to reduce power consumption with the feedback technique by using Schmitt Trigger in the proposed circuitry design. By the proposed design we may reduce the power consumption and ar...

Detection of DDos Attack using HCIF Algorithm in Cloud Computing

Cloud Computing is an emerging buzzword in the IT industry and offers three types of services as Software as a Service (SaaS), Infrastructure as a Service (IaaS) and Platform as a Service (PaaS). To launch a coordinat...

A Distributed Algorithm for identifying failures in WSN

A wireless sensor network is a technology for monitoring physical or environmental conditions such as temperature, pressure, sound etc. A WSN can get separated into multiple connected sensors. But some nodes may fail...

Relative Reference Measure for Hierarchical Document Clustering

Clustering is a foremost concept in data mining. Clustering usually require a measure that needs to be computed among the clustering objects this measure could be either a similarity or a dissimilarity measure, here...

Detecting Malicious Storage Node in WSN

The architecture of two-tiered sensor networks where the storage nodes serve as an intermediate tier between sensors and a sink for storing data and processing queries has been widelyadopted because of the benefits o...

Download PDF file
  • EP ID EP28013
  • DOI -
  • Views 222
  • Downloads 0

How To Cite

Dendukuri rama Manohar, Barigala Srikanth, Saritha Seelam (2014). Stategy And Necessity Trades For Smile Networks. International Journal of Research in Computer and Communication Technology, 3(9), -. https://europub.co.uk/articles/-A-28013