SlideShare a Scribd company logo
1 of 5
Download to read offline
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 50
INTEGRATED HETEROGENEOUS SOCIAL NETWORKING SITES
Kirti Jadhav1
, Kiran Esave2
, Bhakti Gholap3
, M. G. Devikar4
1
Student, MESCOE – Pune, State-Maharashtra, Country-India
2
Student, MESCOE – Pune, State-Maharashtra, Country-India
3
Student, MESCOE – Pune, State-Maharashtra, Country-India
4
Professor, MESCOE – Pune, State-Maharashtra, Country-India
Abstract
The growth of Social Network Sites (SNSs) have opened the opportunity for researchers to explore a large amount of social and
behavioral data. The heterogeneity of SNSs offer more seamless services across SNSs and also offers integrated SNSs. The aim of
the system is to integrate the heterogeneous SNSs. The P2P-iSN allows users from heterogeneous SNSs to communicate without
involving the SNS they have registered with. In proposed system architecture, Global Relationship Model (GRM) is used to
capture the relationship strength, and i-Search, to find the optimal social path with less time between any two users who are
meaningfully connected in heterogeneous SNSs. With the P2P-iSN, SNS developers can design more effective user-centric SNS
application. All SNS user uses different services of different SNS on a single platform, and maintain relationship globally.
Keywords—SNS , GRM , OpenID , GlobalID, i-search
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
Today Social Networking Sites (SNS) have become a part of
our day to day life. They helped us to make the world
smaller and integrated with each other. There are many SNS
available today and many more are piling each day [2]. Thus
users use many SNSs to share data with friends and family.
As a result, a user may register with multiple SNSs for
different social network applications, carry multiple SNS
accounts, interact with contacts from different SNSs, publish
and access different web contents, and share contents within
each SNS community. While SNSs offer different services,
one key feature shared among SNSs is how they are built
around users and users’ existing social networks [3], [4]. Yet
each SNS is isolated, so users manage their profiles and
build relationship separately on different SNSs. The content
for the same user in different SNSs may overlap, so it
becomes a burden for users to manage contents across
different SNSs.
With growing influence and complexity of SNSs,
researchers have been developing methods to connect users
and aggregating data across SNSs so that each SNS no
longer stands alone. Here, we propose system architecture to
integrate heterogeneous SNSs and maintain the social
relationships among a large number of users across
heterogeneous SNSs. For example, imagine that within an
SNS user b is in user a’s friend list. There is a directional
social link denoted by “a → b” from user a to user b. When
there exists a social path between two users in an SNS, then
there is a “relationship” between these two users. We say
that there is a “global relationship” from user a and user b if
there is a social path from a to b over heterogeneous SNSs.
By identifying “global relationship” among users over
heterogeneous SNSs, the system allows different SNSs to
interconnect with various networks. Integrated
heterogeneous SNSs provide different services of different
SNSs over a single platform and establishes path between
two users with less time.
Fig .1 System architecture of the proposed P2P-iSN.
In above figure the operations over P2P-iSN. When a peer
node is turned on, it reports to the index peer node the online
status, which consists of its ID and IP address of the peer
node. Upon receiving the online status, the index peer node
updates the online status for the peer node.
If a user a of the peer node na and a user b of the peer node
nb are on each other’s friend list in a SNS, and na and nb
are turned on, these two online peer nodes can communicate
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 51
with each other by using the corresponding IP addresses
queried from the index peer node. The peer nodes can
establish social paths among users from different SNSs and
build the so-defined “global relationship.”
With the peer-to-peer network architecture, P2P-iSN allows
users from heterogeneous SNSs to communicate without
involving any specific SNS, and the integration is
independent of any specific SNS. By applying P2P-iSN, we
develop a Global Relationship Model to assess the strength
of the global relationship between two users from
heterogeneous SNSs. Based on the global relationship
model, we propose a searching mechanism, namely i-
Search, to find the social path between two users from
heterogeneous SNSs.
2. P2P-iSN
In this section, we propose a peer-to-peer architecture,
namely P2P-iSN, to integrate heterogeneous SNSs. P2P-iSN
consists of two kinds of nodes: peer nodes and index peer
nodes.
2.1 Peer Node
A peer node is installed on an end device for a user to access
SNSs, and its main functionality is to integrate
heterogeneous SNSs. The user of a peer node may register
to one or more SNSs on his end-device, and possibly login
to one or more SNSs at the same time. To associate these
different accounts of the same user from heterogeneous
SNSs, a unique user ID may be required. The concept
known as OpenID [6] can serve this purpose although any
other uniquely identifiable ID can be used. A unique user ID
can be some kind of authenticated information like user’s
cell phone number or verifiable email address. The main
functionality of a peer node is to integrate the heterogeneous
SNSs through the Friend List maintenance. Peer nodes
communicate with each other directly and form a peer-to-
peer network. The phone book in a peer node (e.g., Jenny’s
end device) is used as the base to integrate heterogeneous
SNSs. Take Fig. 2a as an example. Jenny has a friend John
with phone number “0910456.”
A database, friend list, is maintained to store the information
about a user’s friends. Figure 2b shows the format of a
friend list. The friend list consists of three kinds of
information: personal information, social network
information, and address information.
Personal information field stores the IDs of the user’s
friends, including the ID in SNS, phone number, and email
address. In different SNSs, users may use different IDs. As
shown in Fig. 2b, for example, Jenny’s friend, John, uses the
ID, “John_f”, on Facebook™ and use the ID, “John_t”, on
Twitter™). The phone number associates the entry in the
phone book with the entry in the friend list. An entry in the
phone book may be mapped to multiple entries in the friend
list.
Social Network Information field consists of four
subfields, including SN Type, T Value, Timestamp, and
Online. The SNS Type indicates which SNS the friend has
registered. For example, in Figure 2b, Jenny’s friend, John,
registered to Facebook™ using ID “John_f.” The T Value
stores the result calculated by using Eq. 1 in the global
relationship model that will be elaborated later, indicating
the frequency that a user performs some kind of social
activities on his friend (e.g., Jenny posts a comment, click a
“Like”, or send a message on John’s wall in Facebook™).
Fig.2 An example of friend list; a)Jenny’s phone book; b)
Jenny’s friend list
For example, in (1) in Figure 2b, the T Value for Jenny
←John on Facebook™ is 0.9. The Timestamp field stores
the time when the T Value was calculated. The Online
indicates that whether the friend is on the SNS now or not
and when John logins to the Facebook™ last time. If the
value of Online is “On” (“Off”), the time is when John
logins (logouts) Facebook™. For example, in Figure 2b,
“On_12’0215_1430” implies that John_f logins Facebook™
at 14:00 on Feb. 15, 2012, and is now on Facebook™.
Address Information field stores the IP address and the
port number of the friend’s end-device. This information is
valid when the peer node of the friend is turned on.
2.2 Index Peer Node
The index peer node is responsible for maintaining the status
(i.e., online or off-line) and the routing information (i.e., IP
address) of each peer node. When a peer node is turned on,
it reports to the index peer node the online status, which
consists of its ID and IP address of the peer node. Upon
receiving the online status, the index peer node updates the
online status for the peer node.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 52
Fig.3 An example of Global ID list
An index peer node is a database that maintains the
GlobalID list as shown in figure .For each online peer node,
an entry is created in the GlobalID List for the peer node.
Similar to the Friend List, the GlobalID List consists of
three kinds of information: Personal Information, Social
Network Information, and Address Information for an
online user.
Turning on Peer Node. This section describes the execution
of a peer node. When a user turns on the peer node on his
end device, the Login procedure is executed. Figure shown
below illustrates the message flow for the Login procedure
with the following steps:
Step 1. When a user turns on the peer node, then function is
executed to authenticate the user in an SNS.
Step 2. If the authentication is successful, the SNS responds
with the user SNS ID.
Step 3. The peer node creates send a message (i.e., the
User_Online_Message message) carrying the user’s ID,
Phone No., Email, IP address, port number, and SN Type, to
the index peer node. The index peer node creates an entry
for the user in the global ID list.
Fig. 4 The message flow for login procedure
Steps 4 and 5. The peer node sends a request or response
(i.e., the FriendList_Request and FriendList_Response
message pair) to get the IDs of the user’s friends from the
SNSs, and creates an entry for each friend in the Friend List.
Steps 6 and 7. The peer node send a message (i.e., the
Friends_OnlineStatus_Request and Friends_OnlineStatus_
Response message pair) to the index peer node to query the
online friends of the user.
Steps 8 and 9. The peer node collect the social activity
information to calculate the T value from the SNS by
exchanging the T Value_Parameter_Request and the T
Value_Parameter_Response message pair.
3. GRM (GLOBAL RELATIONSHIP MODEL)
This model is used to identify global relationship between
two users across heterogeneous SNSs. It is tool to measure
the Global relationship strength between two users. A
directional social link a → b is associated with frequency,
which is denoted by f(a,b), to capture how often a user a
performs some kind of social activities with user b (e.g., a
posts a comment on b’s wall, click a “Like”, send a
message, or makes a call to b). Consider there are C kinds of
social activities. For 1 ≤ i ≤ C, let λi denote the frequency
that a user a performs the ith kind of activity with user b.
We define f(a, b) by
(1)
where wi is the weight for the ith kind of activity, 0 ≤ wi ≤ 1
for 1 ≤ i ≤ C, and ∑c
i=1 wi = 1. Note that in eq (1) the weight
wi is a fine-tuning tool to reflect different degrees of
interactions in relationship.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 53
An interaction factor exists between user a and user b if a →
b and b → a exist, and the value F(a, b) for an interaction
factor is defined by
(2)
A larger F(a, b) means more interactions between user a and
user b, and refer to “(2)” , we have 0 ≥ F(a, b) ≤ 1 and
F(a,b) =F(b, a).
In propose system a function Z(P) to measure the strength of
the global relationship between u1 and uL+1, which is
defined by
(3)
A larger Z(P) implies stronger global relationship. The
strength Z(P) is a powerful tool that can provide more
precise friend recommendation and trust/reputation metrics,
and also serve as a basis for content sharing across SNSs.
4. i-Search ALGORITHM
In this section, we propose i-Search mechanism to find a
directional social path between two peer nodes in P2P-iSN.
The i-Search mechanism establishes social paths link by
link. When a link is added into a path, global relationship
strength is calculated for the new path using the Z(.)
function in Eq. 3. If the global relationship strength for the
new path is below a threshold ∆, the social path search
stops. Note that ∆ is used to guarantee that the global
relationship strength for the constructed path is strong
enough so that users are motivated to use the global social
relationship for further SNS applications.
The past social network research findings in the sociology
indicated that [11] F(a, b) = 0.5. However this may not be
true anymore for online social networks. In online social
networks, F(a, b) would be much high than 0.5. In this
study, for demonstration purpose, we set up ∆ based on the
research findings in the sociology (i.e., the interaction factor
for link
a →b is F(a, b) = 0.5). If we consider a path P with length
|P| = 4, then using the Z(.) function using (3), the global
relationship strength for the path is Z(P) = 0.54
= 0.0625,
which is considered very weak relationship. Therefore we
set D = 0.53
= 0.125.
Details of the i-Search mechanism are given below: The
index peer node maintains the online status (including the
ID and IP address of the peer node) for the online peer
nodes. A friend list is maintained in the peer node, which
stores the online information for all friends of the peer node.
To simplify our description, we use “the friend b of a peer
node a” to imply that the social link a→b exists. When a
peer node is turned on, it reports its online status to the
index peer node, and receives the latest online status for his
friends from the index peer node. With the latest online
information, the peer node can determine whether his friend
is online (i.e., a peer node is turned on). A online peer node
can communicate with his online friends directly. We run a
recursive algorithm, iSearch, in the peer node (Algorithm 1).
In this algorithm, the set G is the friend list of a peer node.
The input parameter s stores the ID of the peer node who
calls Algorithm 1, and r is the ID of the peer node to be
searched. Initially, we set P←ø .
Algorithm 1:
Input: s, r, P, Z(P)
Output: Pnew, Z(Pnew)
1. foreach v: v G - P do
2. if v = r then
3. Pnew←P {s→ v};
4. Z(Pnew) ←Z(P)F(s,v);
5. return;
6. else if v is online ,and Z(P)F(s,v) >∆ then
7. v.i-search(v,r,P {s→ v}, Z(P)F(s,v));
8. else if v is offline, or Z(P)F(s,v) ≤ ∆ then
9. quit;
10. end
11. End
Consider the scenario where user a register on index peer
node after registration peer node shows his friend’s status
(Online/Offline) then user can directly access his own SNS
without login overhead. For direct communication between
peer node a and peer node b both user a and b should
registered on index peer node. A user a can “request” his
friend b to execute the iSearch algorithm (i.e.,iSearch() in
Algorithm 1) through the direct communication if b is
online. That is, the directional social path P is established
among the peer nodes. Note that the i-Search mechanism
may find multiple global social relationships between two
peer nodes. For the peer node who triggers the i-Search
mechanism, he can use the one with the largest global social
relationship strength. Furthermore, we can speed up the
execution of the i-Search mechanism by caching the
searching results on the peer nodes.
5. CONCLUSION
In this paper, we propose P2P-iSN, a peer-to-peer network
architecture to integrate multiple SNSs without incurring
excessive overhead to the SNSs. With integrated model, we
could develop an effective approach, a Global Relationship
Model, to evaluate the global relationship strength between
two users with more precision. With P2P-iSN and the
Global Relationship Model as the foundation, we propose
the i-Search mechanism to find the social path with certain
level of social relationship strength in a P2P social network.
Our proposed approach can find the desired social path with
high probability comparing to traditional approach and can
effectively establish global social relationship for users from
heterogeneous SNSs.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 54
REFERENCES
[1] P2P-iSN: A Peer-to-Peer Architecture for
Heterogeneous Social Networks Phone Lin and Pai-
Chun Chung, National Taiwan University Yuguang
Fang, University of Florida.
[2] C. Zhang, “Privacy and Security for Online Social
Networks: Challenges and Opportunities,” IEEE
Network, vol. 24, no. 4, July/Aug. 2010, pp. 13–18.
[3] A. Mislove , “Measurement and Analysis of Online
Social Networks,” Proc. 7th ACM SIGCOMM Conf.
Internet Measurement, 2007,pp.29–42.
[4] N. Ellison and D. Boyd, “Social Network Sites:
Definition, History, and Scholarship,” J. Computer-
Mediated Communication, vol. 13, no. 1, Oct.
[5] M. N. Ko , “Social-Networks Connect Services,”
Computer, vol. 43, no. 8, Aug. 2010, pp. 37–43.
[6] http://openid.net.

More Related Content

What's hot

COMPUTER BASICS
 COMPUTER BASICS COMPUTER BASICS
COMPUTER BASICS
Rajat More
 

What's hot (20)

32 99-1-pb
32 99-1-pb32 99-1-pb
32 99-1-pb
 
IRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data MiningIRJET- Detecting Criminal Method using Data Mining
IRJET- Detecting Criminal Method using Data Mining
 
IRJET- Identification of Clone Attacks in Social Networking Sites
IRJET-  	  Identification of Clone Attacks in Social Networking SitesIRJET-  	  Identification of Clone Attacks in Social Networking Sites
IRJET- Identification of Clone Attacks in Social Networking Sites
 
Automatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature ReviewAutomatic Hate Speech Detection: A Literature Review
Automatic Hate Speech Detection: A Literature Review
 
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data MiningIRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
 
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2VecIRJET-  	  Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
 
Social networks protection against fake profiles and social bots attacks
Social networks protection against  fake profiles and social bots attacksSocial networks protection against  fake profiles and social bots attacks
Social networks protection against fake profiles and social bots attacks
 
E017433538
E017433538E017433538
E017433538
 
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
 
Learning to detect phishing ur ls
Learning to detect phishing ur lsLearning to detect phishing ur ls
Learning to detect phishing ur ls
 
IRJET- Detecting Fake News
IRJET- Detecting Fake NewsIRJET- Detecting Fake News
IRJET- Detecting Fake News
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
 
COMPUTER BASICS
 COMPUTER BASICS COMPUTER BASICS
COMPUTER BASICS
 
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
 
F017433947
F017433947F017433947
F017433947
 
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly DetectionDetection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
 
A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...A Comparative Analysis of Different Feature Set on the Performance of Differe...
A Comparative Analysis of Different Feature Set on the Performance of Differe...
 
Spammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social NetworksSpammer detection and fake user Identification on Social Networks
Spammer detection and fake user Identification on Social Networks
 
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
 
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
 

Viewers also liked

Mprovement of telugu ocr by segmentation of touching characters
Mprovement of telugu ocr by segmentation of touching charactersMprovement of telugu ocr by segmentation of touching characters
Mprovement of telugu ocr by segmentation of touching characters
eSAT Journals
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
eSAT Journals
 
An improved luo converter for high power applications
An improved luo converter for high power applicationsAn improved luo converter for high power applications
An improved luo converter for high power applications
eSAT Journals
 
Heat transfer enhancement and friction factor analysis in tube using conical ...
Heat transfer enhancement and friction factor analysis in tube using conical ...Heat transfer enhancement and friction factor analysis in tube using conical ...
Heat transfer enhancement and friction factor analysis in tube using conical ...
eSAT Journals
 
Study the effect of using ultrasonic membrane anaerobic system in treating su...
Study the effect of using ultrasonic membrane anaerobic system in treating su...Study the effect of using ultrasonic membrane anaerobic system in treating su...
Study the effect of using ultrasonic membrane anaerobic system in treating su...
eSAT Journals
 
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
eSAT Journals
 
A novel approach for teaching system software by integrating with other courses
A novel approach for teaching system software by integrating with other coursesA novel approach for teaching system software by integrating with other courses
A novel approach for teaching system software by integrating with other courses
eSAT Journals
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
eSAT Journals
 
Groundwater analysis in the vicinity of nag river
Groundwater analysis in the vicinity of nag riverGroundwater analysis in the vicinity of nag river
Groundwater analysis in the vicinity of nag river
eSAT Journals
 

Viewers also liked (17)

Mprovement of telugu ocr by segmentation of touching characters
Mprovement of telugu ocr by segmentation of touching charactersMprovement of telugu ocr by segmentation of touching characters
Mprovement of telugu ocr by segmentation of touching characters
 
A review on distributed beam forming techniques an approach in wireless rela...
A review on distributed beam forming techniques  an approach in wireless rela...A review on distributed beam forming techniques  an approach in wireless rela...
A review on distributed beam forming techniques an approach in wireless rela...
 
An improved luo converter for high power applications
An improved luo converter for high power applicationsAn improved luo converter for high power applications
An improved luo converter for high power applications
 
Heat transfer enhancement and friction factor analysis in tube using conical ...
Heat transfer enhancement and friction factor analysis in tube using conical ...Heat transfer enhancement and friction factor analysis in tube using conical ...
Heat transfer enhancement and friction factor analysis in tube using conical ...
 
Study the effect of using ultrasonic membrane anaerobic system in treating su...
Study the effect of using ultrasonic membrane anaerobic system in treating su...Study the effect of using ultrasonic membrane anaerobic system in treating su...
Study the effect of using ultrasonic membrane anaerobic system in treating su...
 
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
 
Communication synchronization in cluster based wireless sensor network a re...
Communication synchronization in cluster based wireless sensor network   a re...Communication synchronization in cluster based wireless sensor network   a re...
Communication synchronization in cluster based wireless sensor network a re...
 
Parallel knn on gpu architecture using opencl
Parallel knn on gpu architecture using openclParallel knn on gpu architecture using opencl
Parallel knn on gpu architecture using opencl
 
And energies of linear semigraph
And   energies of linear semigraphAnd   energies of linear semigraph
And energies of linear semigraph
 
Survey of local binary pattern for fire & smoke using wavelet decomposition
Survey of local binary pattern for fire & smoke using wavelet decompositionSurvey of local binary pattern for fire & smoke using wavelet decomposition
Survey of local binary pattern for fire & smoke using wavelet decomposition
 
A novel approach for teaching system software by integrating with other courses
A novel approach for teaching system software by integrating with other coursesA novel approach for teaching system software by integrating with other courses
A novel approach for teaching system software by integrating with other courses
 
Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...Redundancy removal of rules with reordering them to increase the firewall opt...
Redundancy removal of rules with reordering them to increase the firewall opt...
 
Groundwater analysis in the vicinity of nag river
Groundwater analysis in the vicinity of nag riverGroundwater analysis in the vicinity of nag river
Groundwater analysis in the vicinity of nag river
 
Hexagonal carpet antenna for wlan wimax & bluetooth applications
Hexagonal carpet antenna for wlan   wimax & bluetooth applicationsHexagonal carpet antenna for wlan   wimax & bluetooth applications
Hexagonal carpet antenna for wlan wimax & bluetooth applications
 
Fabrication and evaluation of nano carbon reinforced polymer composites
Fabrication and evaluation of nano carbon reinforced polymer compositesFabrication and evaluation of nano carbon reinforced polymer composites
Fabrication and evaluation of nano carbon reinforced polymer composites
 
Implementation of 16 x16 bit multiplication algorithm by using vedic mathemat...
Implementation of 16 x16 bit multiplication algorithm by using vedic mathemat...Implementation of 16 x16 bit multiplication algorithm by using vedic mathemat...
Implementation of 16 x16 bit multiplication algorithm by using vedic mathemat...
 
Experimental study on mechanical properties of m30 concrete with partial repl...
Experimental study on mechanical properties of m30 concrete with partial repl...Experimental study on mechanical properties of m30 concrete with partial repl...
Experimental study on mechanical properties of m30 concrete with partial repl...
 

Similar to Integrated heterogeneous social networking sites

Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
1crore projects
 
Online social network internetworking
Online social network internetworkingOnline social network internetworking
Online social network internetworking
ijngnjournal
 
Studying user footprints in different online social networks
Studying user footprints in different online social networksStudying user footprints in different online social networks
Studying user footprints in different online social networks
IIIT Hyderabad
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
ijtsrd
 
IEEE - 2016 Active Research Projects - 1 Crore Projects
IEEE - 2016 Active Research Projects - 1 Crore ProjectsIEEE - 2016 Active Research Projects - 1 Crore Projects
IEEE - 2016 Active Research Projects - 1 Crore Projects
1crore projects
 

Similar to Integrated heterogeneous social networking sites (20)

05 20275 computational solution...
05 20275 computational solution...05 20275 computational solution...
05 20275 computational solution...
 
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMASOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
 
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
Asymmetric Social Proximity Based Private Matching Protocols for Online Socia...
 
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORKINFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
INFORMATION RETRIEVAL TOPICS IN TWITTER USING WEIGHTED PREDICTION NETWORK
 
Online social network internetworking
Online social network internetworkingOnline social network internetworking
Online social network internetworking
 
Studying user footprints in different online social networks
Studying user footprints in different online social networksStudying user footprints in different online social networks
Studying user footprints in different online social networks
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Detecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social NetworksDetecting and Resolving Privacy Conflicts in Online Social Networks
Detecting and Resolving Privacy Conflicts in Online Social Networks
 
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
Cross-Site Bonding of Anonymous Users in Multiple Social Media NetworksCross-Site Bonding of Anonymous Users in Multiple Social Media Networks
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
 
Accessing remote android mobile contents
Accessing remote android mobile contentsAccessing remote android mobile contents
Accessing remote android mobile contents
 
B1803020915
B1803020915B1803020915
B1803020915
 
Q046049397
Q046049397Q046049397
Q046049397
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
IRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend MatchingIRJET- Privacy Preserving Friend Matching
IRJET- Privacy Preserving Friend Matching
 
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
 
IEEE - 2016 Active Research Projects - 1 Crore Projects
IEEE - 2016 Active Research Projects - 1 Crore ProjectsIEEE - 2016 Active Research Projects - 1 Crore Projects
IEEE - 2016 Active Research Projects - 1 Crore Projects
 
Internet based Social Networking Services
Internet based Social Networking ServicesInternet based Social Networking Services
Internet based Social Networking Services
 
IRJET - Suicidal Text Detection using Machine Learning
IRJET -  	  Suicidal Text Detection using Machine LearningIRJET -  	  Suicidal Text Detection using Machine Learning
IRJET - Suicidal Text Detection using Machine Learning
 
Kastriot Blakaj
Kastriot BlakajKastriot Blakaj
Kastriot Blakaj
 
Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks Least Cost Influence by Mapping Online Social Networks
Least Cost Influence by Mapping Online Social Networks
 

More from eSAT Journals

Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
eSAT Journals
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
eSAT Journals
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
eSAT Journals
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
eSAT Journals
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
eSAT Journals
 

More from eSAT Journals (20)

Mechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavementsMechanical properties of hybrid fiber reinforced concrete for pavements
Mechanical properties of hybrid fiber reinforced concrete for pavements
 
Material management in construction – a case study
Material management in construction – a case studyMaterial management in construction – a case study
Material management in construction – a case study
 
Managing drought short term strategies in semi arid regions a case study
Managing drought    short term strategies in semi arid regions  a case studyManaging drought    short term strategies in semi arid regions  a case study
Managing drought short term strategies in semi arid regions a case study
 
Life cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangaloreLife cycle cost analysis of overlay for an urban road in bangalore
Life cycle cost analysis of overlay for an urban road in bangalore
 
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materialsLaboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
 
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...Laboratory investigation of expansive soil stabilized with natural inorganic ...
Laboratory investigation of expansive soil stabilized with natural inorganic ...
 
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
 
Influence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizerInfluence of compaction energy on soil stabilized with chemical stabilizer
Influence of compaction energy on soil stabilized with chemical stabilizer
 
Geographical information system (gis) for water resources management
Geographical information system (gis) for water resources managementGeographical information system (gis) for water resources management
Geographical information system (gis) for water resources management
 
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
 
Factors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concreteFactors influencing compressive strength of geopolymer concrete
Factors influencing compressive strength of geopolymer concrete
 
Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...Experimental investigation on circular hollow steel columns in filled with li...
Experimental investigation on circular hollow steel columns in filled with li...
 
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
 
Evaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabsEvaluation of punching shear in flat slabs
Evaluation of punching shear in flat slabs
 
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in indiaEvaluation of performance of intake tower dam for recent earthquake in india
Evaluation of performance of intake tower dam for recent earthquake in india
 
Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...Evaluation of operational efficiency of urban road network using travel time ...
Evaluation of operational efficiency of urban road network using travel time ...
 
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn methodEstimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of surface runoff in nallur amanikere watershed using scs cn method
 
Estimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniquesEstimation of morphometric parameters and runoff using rs & gis techniques
Estimation of morphometric parameters and runoff using rs & gis techniques
 
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...Effect of variation of plastic hinge length on the results of non linear anal...
Effect of variation of plastic hinge length on the results of non linear anal...
 
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...Effect of use of recycled materials on indirect tensile strength of asphalt c...
Effect of use of recycled materials on indirect tensile strength of asphalt c...
 

Recently uploaded

Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
dollysharma2066
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Christo Ananth
 

Recently uploaded (20)

UNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its PerformanceUNIT - IV - Air Compressors and its Performance
UNIT - IV - Air Compressors and its Performance
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdfONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
ONLINE FOOD ORDER SYSTEM PROJECT REPORT.pdf
 
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
(INDIRA) Call Girl Aurangabad Call Now 8617697112 Aurangabad Escorts 24x7
 
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar  ≼🔝 Delhi door step de...
Call Now ≽ 9953056974 ≼🔝 Call Girls In New Ashok Nagar ≼🔝 Delhi door step de...
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
The Most Attractive Pune Call Girls Manchar 8250192130 Will You Miss This Cha...
 
NFPA 5000 2024 standard .
NFPA 5000 2024 standard                                  .NFPA 5000 2024 standard                                  .
NFPA 5000 2024 standard .
 
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance BookingCall Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
Call Girls Walvekar Nagar Call Me 7737669865 Budget Friendly No Advance Booking
 
Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01Double rodded leveling 1 pdf activity 01
Double rodded leveling 1 pdf activity 01
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
VIP Model Call Girls Kothrud ( Pune ) Call ON 8005736733 Starting From 5K to ...
 
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICSUNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
UNIT-IFLUID PROPERTIES & FLOW CHARACTERISTICS
 
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
Call Girls Pimpri Chinchwad Call Me 7737669865 Budget Friendly No Advance Boo...
 
Generative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPTGenerative AI or GenAI technology based PPT
Generative AI or GenAI technology based PPT
 
Coefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptxCoefficient of Thermal Expansion and their Importance.pptx
Coefficient of Thermal Expansion and their Importance.pptx
 
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
FULL ENJOY Call Girls In Mahipalpur Delhi Contact Us 8377877756
 
UNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular ConduitsUNIT-II FMM-Flow Through Circular Conduits
UNIT-II FMM-Flow Through Circular Conduits
 
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
Call for Papers - African Journal of Biological Sciences, E-ISSN: 2663-2187, ...
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 

Integrated heterogeneous social networking sites

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 50 INTEGRATED HETEROGENEOUS SOCIAL NETWORKING SITES Kirti Jadhav1 , Kiran Esave2 , Bhakti Gholap3 , M. G. Devikar4 1 Student, MESCOE – Pune, State-Maharashtra, Country-India 2 Student, MESCOE – Pune, State-Maharashtra, Country-India 3 Student, MESCOE – Pune, State-Maharashtra, Country-India 4 Professor, MESCOE – Pune, State-Maharashtra, Country-India Abstract The growth of Social Network Sites (SNSs) have opened the opportunity for researchers to explore a large amount of social and behavioral data. The heterogeneity of SNSs offer more seamless services across SNSs and also offers integrated SNSs. The aim of the system is to integrate the heterogeneous SNSs. The P2P-iSN allows users from heterogeneous SNSs to communicate without involving the SNS they have registered with. In proposed system architecture, Global Relationship Model (GRM) is used to capture the relationship strength, and i-Search, to find the optimal social path with less time between any two users who are meaningfully connected in heterogeneous SNSs. With the P2P-iSN, SNS developers can design more effective user-centric SNS application. All SNS user uses different services of different SNS on a single platform, and maintain relationship globally. Keywords—SNS , GRM , OpenID , GlobalID, i-search --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Today Social Networking Sites (SNS) have become a part of our day to day life. They helped us to make the world smaller and integrated with each other. There are many SNS available today and many more are piling each day [2]. Thus users use many SNSs to share data with friends and family. As a result, a user may register with multiple SNSs for different social network applications, carry multiple SNS accounts, interact with contacts from different SNSs, publish and access different web contents, and share contents within each SNS community. While SNSs offer different services, one key feature shared among SNSs is how they are built around users and users’ existing social networks [3], [4]. Yet each SNS is isolated, so users manage their profiles and build relationship separately on different SNSs. The content for the same user in different SNSs may overlap, so it becomes a burden for users to manage contents across different SNSs. With growing influence and complexity of SNSs, researchers have been developing methods to connect users and aggregating data across SNSs so that each SNS no longer stands alone. Here, we propose system architecture to integrate heterogeneous SNSs and maintain the social relationships among a large number of users across heterogeneous SNSs. For example, imagine that within an SNS user b is in user a’s friend list. There is a directional social link denoted by “a → b” from user a to user b. When there exists a social path between two users in an SNS, then there is a “relationship” between these two users. We say that there is a “global relationship” from user a and user b if there is a social path from a to b over heterogeneous SNSs. By identifying “global relationship” among users over heterogeneous SNSs, the system allows different SNSs to interconnect with various networks. Integrated heterogeneous SNSs provide different services of different SNSs over a single platform and establishes path between two users with less time. Fig .1 System architecture of the proposed P2P-iSN. In above figure the operations over P2P-iSN. When a peer node is turned on, it reports to the index peer node the online status, which consists of its ID and IP address of the peer node. Upon receiving the online status, the index peer node updates the online status for the peer node. If a user a of the peer node na and a user b of the peer node nb are on each other’s friend list in a SNS, and na and nb are turned on, these two online peer nodes can communicate
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 51 with each other by using the corresponding IP addresses queried from the index peer node. The peer nodes can establish social paths among users from different SNSs and build the so-defined “global relationship.” With the peer-to-peer network architecture, P2P-iSN allows users from heterogeneous SNSs to communicate without involving any specific SNS, and the integration is independent of any specific SNS. By applying P2P-iSN, we develop a Global Relationship Model to assess the strength of the global relationship between two users from heterogeneous SNSs. Based on the global relationship model, we propose a searching mechanism, namely i- Search, to find the social path between two users from heterogeneous SNSs. 2. P2P-iSN In this section, we propose a peer-to-peer architecture, namely P2P-iSN, to integrate heterogeneous SNSs. P2P-iSN consists of two kinds of nodes: peer nodes and index peer nodes. 2.1 Peer Node A peer node is installed on an end device for a user to access SNSs, and its main functionality is to integrate heterogeneous SNSs. The user of a peer node may register to one or more SNSs on his end-device, and possibly login to one or more SNSs at the same time. To associate these different accounts of the same user from heterogeneous SNSs, a unique user ID may be required. The concept known as OpenID [6] can serve this purpose although any other uniquely identifiable ID can be used. A unique user ID can be some kind of authenticated information like user’s cell phone number or verifiable email address. The main functionality of a peer node is to integrate the heterogeneous SNSs through the Friend List maintenance. Peer nodes communicate with each other directly and form a peer-to- peer network. The phone book in a peer node (e.g., Jenny’s end device) is used as the base to integrate heterogeneous SNSs. Take Fig. 2a as an example. Jenny has a friend John with phone number “0910456.” A database, friend list, is maintained to store the information about a user’s friends. Figure 2b shows the format of a friend list. The friend list consists of three kinds of information: personal information, social network information, and address information. Personal information field stores the IDs of the user’s friends, including the ID in SNS, phone number, and email address. In different SNSs, users may use different IDs. As shown in Fig. 2b, for example, Jenny’s friend, John, uses the ID, “John_f”, on Facebook™ and use the ID, “John_t”, on Twitter™). The phone number associates the entry in the phone book with the entry in the friend list. An entry in the phone book may be mapped to multiple entries in the friend list. Social Network Information field consists of four subfields, including SN Type, T Value, Timestamp, and Online. The SNS Type indicates which SNS the friend has registered. For example, in Figure 2b, Jenny’s friend, John, registered to Facebook™ using ID “John_f.” The T Value stores the result calculated by using Eq. 1 in the global relationship model that will be elaborated later, indicating the frequency that a user performs some kind of social activities on his friend (e.g., Jenny posts a comment, click a “Like”, or send a message on John’s wall in Facebook™). Fig.2 An example of friend list; a)Jenny’s phone book; b) Jenny’s friend list For example, in (1) in Figure 2b, the T Value for Jenny ←John on Facebook™ is 0.9. The Timestamp field stores the time when the T Value was calculated. The Online indicates that whether the friend is on the SNS now or not and when John logins to the Facebook™ last time. If the value of Online is “On” (“Off”), the time is when John logins (logouts) Facebook™. For example, in Figure 2b, “On_12’0215_1430” implies that John_f logins Facebook™ at 14:00 on Feb. 15, 2012, and is now on Facebook™. Address Information field stores the IP address and the port number of the friend’s end-device. This information is valid when the peer node of the friend is turned on. 2.2 Index Peer Node The index peer node is responsible for maintaining the status (i.e., online or off-line) and the routing information (i.e., IP address) of each peer node. When a peer node is turned on, it reports to the index peer node the online status, which consists of its ID and IP address of the peer node. Upon receiving the online status, the index peer node updates the online status for the peer node.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 52 Fig.3 An example of Global ID list An index peer node is a database that maintains the GlobalID list as shown in figure .For each online peer node, an entry is created in the GlobalID List for the peer node. Similar to the Friend List, the GlobalID List consists of three kinds of information: Personal Information, Social Network Information, and Address Information for an online user. Turning on Peer Node. This section describes the execution of a peer node. When a user turns on the peer node on his end device, the Login procedure is executed. Figure shown below illustrates the message flow for the Login procedure with the following steps: Step 1. When a user turns on the peer node, then function is executed to authenticate the user in an SNS. Step 2. If the authentication is successful, the SNS responds with the user SNS ID. Step 3. The peer node creates send a message (i.e., the User_Online_Message message) carrying the user’s ID, Phone No., Email, IP address, port number, and SN Type, to the index peer node. The index peer node creates an entry for the user in the global ID list. Fig. 4 The message flow for login procedure Steps 4 and 5. The peer node sends a request or response (i.e., the FriendList_Request and FriendList_Response message pair) to get the IDs of the user’s friends from the SNSs, and creates an entry for each friend in the Friend List. Steps 6 and 7. The peer node send a message (i.e., the Friends_OnlineStatus_Request and Friends_OnlineStatus_ Response message pair) to the index peer node to query the online friends of the user. Steps 8 and 9. The peer node collect the social activity information to calculate the T value from the SNS by exchanging the T Value_Parameter_Request and the T Value_Parameter_Response message pair. 3. GRM (GLOBAL RELATIONSHIP MODEL) This model is used to identify global relationship between two users across heterogeneous SNSs. It is tool to measure the Global relationship strength between two users. A directional social link a → b is associated with frequency, which is denoted by f(a,b), to capture how often a user a performs some kind of social activities with user b (e.g., a posts a comment on b’s wall, click a “Like”, send a message, or makes a call to b). Consider there are C kinds of social activities. For 1 ≤ i ≤ C, let λi denote the frequency that a user a performs the ith kind of activity with user b. We define f(a, b) by (1) where wi is the weight for the ith kind of activity, 0 ≤ wi ≤ 1 for 1 ≤ i ≤ C, and ∑c i=1 wi = 1. Note that in eq (1) the weight wi is a fine-tuning tool to reflect different degrees of interactions in relationship.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 53 An interaction factor exists between user a and user b if a → b and b → a exist, and the value F(a, b) for an interaction factor is defined by (2) A larger F(a, b) means more interactions between user a and user b, and refer to “(2)” , we have 0 ≥ F(a, b) ≤ 1 and F(a,b) =F(b, a). In propose system a function Z(P) to measure the strength of the global relationship between u1 and uL+1, which is defined by (3) A larger Z(P) implies stronger global relationship. The strength Z(P) is a powerful tool that can provide more precise friend recommendation and trust/reputation metrics, and also serve as a basis for content sharing across SNSs. 4. i-Search ALGORITHM In this section, we propose i-Search mechanism to find a directional social path between two peer nodes in P2P-iSN. The i-Search mechanism establishes social paths link by link. When a link is added into a path, global relationship strength is calculated for the new path using the Z(.) function in Eq. 3. If the global relationship strength for the new path is below a threshold ∆, the social path search stops. Note that ∆ is used to guarantee that the global relationship strength for the constructed path is strong enough so that users are motivated to use the global social relationship for further SNS applications. The past social network research findings in the sociology indicated that [11] F(a, b) = 0.5. However this may not be true anymore for online social networks. In online social networks, F(a, b) would be much high than 0.5. In this study, for demonstration purpose, we set up ∆ based on the research findings in the sociology (i.e., the interaction factor for link a →b is F(a, b) = 0.5). If we consider a path P with length |P| = 4, then using the Z(.) function using (3), the global relationship strength for the path is Z(P) = 0.54 = 0.0625, which is considered very weak relationship. Therefore we set D = 0.53 = 0.125. Details of the i-Search mechanism are given below: The index peer node maintains the online status (including the ID and IP address of the peer node) for the online peer nodes. A friend list is maintained in the peer node, which stores the online information for all friends of the peer node. To simplify our description, we use “the friend b of a peer node a” to imply that the social link a→b exists. When a peer node is turned on, it reports its online status to the index peer node, and receives the latest online status for his friends from the index peer node. With the latest online information, the peer node can determine whether his friend is online (i.e., a peer node is turned on). A online peer node can communicate with his online friends directly. We run a recursive algorithm, iSearch, in the peer node (Algorithm 1). In this algorithm, the set G is the friend list of a peer node. The input parameter s stores the ID of the peer node who calls Algorithm 1, and r is the ID of the peer node to be searched. Initially, we set P←ø . Algorithm 1: Input: s, r, P, Z(P) Output: Pnew, Z(Pnew) 1. foreach v: v G - P do 2. if v = r then 3. Pnew←P {s→ v}; 4. Z(Pnew) ←Z(P)F(s,v); 5. return; 6. else if v is online ,and Z(P)F(s,v) >∆ then 7. v.i-search(v,r,P {s→ v}, Z(P)F(s,v)); 8. else if v is offline, or Z(P)F(s,v) ≤ ∆ then 9. quit; 10. end 11. End Consider the scenario where user a register on index peer node after registration peer node shows his friend’s status (Online/Offline) then user can directly access his own SNS without login overhead. For direct communication between peer node a and peer node b both user a and b should registered on index peer node. A user a can “request” his friend b to execute the iSearch algorithm (i.e.,iSearch() in Algorithm 1) through the direct communication if b is online. That is, the directional social path P is established among the peer nodes. Note that the i-Search mechanism may find multiple global social relationships between two peer nodes. For the peer node who triggers the i-Search mechanism, he can use the one with the largest global social relationship strength. Furthermore, we can speed up the execution of the i-Search mechanism by caching the searching results on the peer nodes. 5. CONCLUSION In this paper, we propose P2P-iSN, a peer-to-peer network architecture to integrate multiple SNSs without incurring excessive overhead to the SNSs. With integrated model, we could develop an effective approach, a Global Relationship Model, to evaluate the global relationship strength between two users with more precision. With P2P-iSN and the Global Relationship Model as the foundation, we propose the i-Search mechanism to find the social path with certain level of social relationship strength in a P2P social network. Our proposed approach can find the desired social path with high probability comparing to traditional approach and can effectively establish global social relationship for users from heterogeneous SNSs.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 54 REFERENCES [1] P2P-iSN: A Peer-to-Peer Architecture for Heterogeneous Social Networks Phone Lin and Pai- Chun Chung, National Taiwan University Yuguang Fang, University of Florida. [2] C. Zhang, “Privacy and Security for Online Social Networks: Challenges and Opportunities,” IEEE Network, vol. 24, no. 4, July/Aug. 2010, pp. 13–18. [3] A. Mislove , “Measurement and Analysis of Online Social Networks,” Proc. 7th ACM SIGCOMM Conf. Internet Measurement, 2007,pp.29–42. [4] N. Ellison and D. Boyd, “Social Network Sites: Definition, History, and Scholarship,” J. Computer- Mediated Communication, vol. 13, no. 1, Oct. [5] M. N. Ko , “Social-Networks Connect Services,” Computer, vol. 43, no. 8, Aug. 2010, pp. 37–43. [6] http://openid.net.