Secure encounter based mobile social networks requirements, designs, and trad...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Trust based video management framework for social multimedia networksVenkat Projects
Trust based video management framework for social multimedia networks
Social Multimedia Networks (SMNs) have attracted much attention from both academia and industry due to their impact on our daily lives. The requirements of SMN users are increasing along with time, which make the satisfaction of those requirements a very challenging process. One important challenge facing SMNs consists of their internal users that can upload and manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and verifying content delivered to end-users is becoming a highly challenging process. So far, many researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein, the aim of this paper is to propose a framework that allows collaboration between humans and machines to ensure secure delivery of trusted videos content over SMNs while ensuring an optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the proposed framework consist in i) assigning to each user a level of trust based on his/her history, ii) creating an intelligent agent that decides which content can be automatically published on the network and which content should be reviewed or rejected, and iii) checking the videos’ integrity and delivery during the streaming process. Accordingly, we ensure that the trust level of the SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational Expenditures (OPEX) can be achieved
Secure encounter based mobile social networks requirements, designs, and trad...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Trust based video management framework for social multimedia networksVenkat Projects
Trust based video management framework for social multimedia networks
Social Multimedia Networks (SMNs) have attracted much attention from both academia and industry due to their impact on our daily lives. The requirements of SMN users are increasing along with time, which make the satisfaction of those requirements a very challenging process. One important challenge facing SMNs consists of their internal users that can upload and manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and verifying content delivered to end-users is becoming a highly challenging process. So far, many researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein, the aim of this paper is to propose a framework that allows collaboration between humans and machines to ensure secure delivery of trusted videos content over SMNs while ensuring an optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the proposed framework consist in i) assigning to each user a level of trust based on his/her history, ii) creating an intelligent agent that decides which content can be automatically published on the network and which content should be reviewed or rejected, and iii) checking the videos’ integrity and delivery during the streaming process. Accordingly, we ensure that the trust level of the SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational Expenditures (OPEX) can be achieved
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionJPINFOTECH JAYAPRAKASH
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
To get this project in ONLINE or through TRAINING Sessions, Contact:JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai -83.
Landmark: Next to Kotak Mahendra Bank.
Pondicherry Office: JP INFOTECH, #45, Kamaraj Salai, Thattanchavady, Puducherry -9.
Landmark: Next to VVP Nagar Arch.
Mobile: (0) 9952649690 , Email: jpinfotechprojects@gmail.com, web: www.jpinfotech.org
JAVA 2013 IEEE NETWORKSECURITY PROJECT Secure encounter based mobile social n...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Privacy preserving distributed profile matching in proximity-based mobile soc...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based EncryptionJPINFOTECH JAYAPRAKASH
Securing Broker-Less Publish/Subscribe Systems Using Identity-Based Encryption
To get this project in ONLINE or through TRAINING Sessions, Contact:JP INFOTECH, Old No.31, New No.86, 1st Floor, 1st Avenue, Ashok Pillar, Chennai -83.
Landmark: Next to Kotak Mahendra Bank.
Pondicherry Office: JP INFOTECH, #45, Kamaraj Salai, Thattanchavady, Puducherry -9.
Landmark: Next to VVP Nagar Arch.
Mobile: (0) 9952649690 , Email: jpinfotechprojects@gmail.com, web: www.jpinfotech.org
JAVA 2013 IEEE NETWORKSECURITY PROJECT Secure encounter based mobile social n...IEEEGLOBALSOFTTECHNOLOGIES
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Privacy preserving distributed profile matching in proximity-based mobile soc...IEEEFINALYEARPROJECTS
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Wireless Information Security System via Role based Access Control Pattern Us...ijcnes
Business delivery value added more via security services to the service providers and service users. Organization system developing various models to achieve the security system according to the modern development and technology; which they requires for their own operations and for their interactions within departments, customers and partners. Business securities pattern will be aid to establish a powerful methodology to identify and understand these relationships to maximize the value of security system. This paper presents a study of important business patterns in Roles Right Definition Model Use Cases linking to Object oriented Analysis and Design approach for Secured Internet Information access.
AWhile there are several ways of gathering information on a kacie8xcheco
A
While there are several ways of gathering information on a potential victim, information ciphering is a commonly used method implemented by cybersecurity criminals via an activity known as 'footprinting.' Footprinting involves gathering as much information as one can about a targeted network and its assets before launching an attack. Companies today use cookies and XML hooks in order to attach themselves to the surfing routine of unsuspecting users. This type of footprinting can traverse multiple personal and business devices, as many devices now use common authentication infrastructures, which inherently allow for a single individual or business to be followed, regardless of the devices that they use. This type of footprinting, while meant to benefit the marketing efforts of legit businesses, has been exploited by cybersecurity criminals. Research footprinting and discuss methodologies that can be employed by cybersecurity experts to ensure that footprinting mechanics, such as those aforementioned, can be used legitimately by businesses, instead of being hijacked by cyber criminals looking to tail personal or business private data streams.
B
Social engineering infrastructures can consist of several logical layers of communication. Some of the components within each layer may or may not include handlers. That is to say that there are certain aspects of social engineering infrastructures that are handled by manual labor, which consists of people watching and responding to the responses of others on a given social media network. Other components consists of bots, which feed responses to users in the form of both true and false information. The combination of the two component resources have led to inconsistency in social media technology infrastructures, as bots and humans compete for communication distribution space. This has led to a myriad of cybersecurity issues as bots and humans alike penetrate the information, endangering the general privacy of those participating on social media networks. Describe a strategy for dealing with such a severe issue and discuss the security methodologies you would deploy to amend the current issues surrounding social network data vulnerability.
...
Trustworthy Service Enhancement in Mobile Social Networkijsrd.com
Mobile Social Network is network which allows mobile users to discover and interact with existing and potential friends. A Trustworthy Service Evaluation (TSE) system is a system that enables users to share service reviews in Service oriented mobile social networks (S-MSNs). Each service provider should independently maintain a TSE for itself that collects and stores users’ reviews about its services without requiring any third trusted authority. These service reviews can be made available to interested users to make service selection decisions. In this three unique service review attacks are identified, i.e., link ability, rejection, and modification attacks, and then develop security mechanisms for the TSE to deal with these attacks. In this we extend the bTSE(basic TSE) to a Sybil-resisted TSE (SrTSE) which enable the detection of two typical sybil attacks. In SrTSE if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Hence a Trustworthy Service in Mobile Social Network is introduces so that users can access services securely.
I want you to Read intensively papers and give me a summary for ever.pdfamitkhanna2070
I want you to Read intensively papers and give me a summary for every paper and the linghth for
each paper is 2 pages or more. In the summary, you need to provide some of your own ideas.
Research Interests: Privacy-Aware Computing,Wireless and Mobile Security,Fog
Computing,Mobile Health and Safety, Cognitive Radio Networking,Algorithm Design and
Analysis.
You should select papers from the following conferences:
IEEE INFOCOM, IEEE Symposium on security and privacy, ACM CCS, USENIX Security.
Solution
PRIVACY AWARE COMPUTING
Introduction
With the increasing public concerns of security and personal data privacy worldwide, security
and privacy become an important research area. This research area is very broad and covers
many application domains.
The security and privacy aware computing research group actually focuses on
(1) privacy-preserved computing,
(2) Video surveillance, and
(3) secure biometric system.
Now let us briefly discuss the above three groups.
Privacy-preserved Computing
Concerns on the data privacy have been increasing worldwide. For example, Apple was
reportedly fined by South Korea’s telecommunications regulator for allegedly collecting and
storing private location data of iPhone users. The privacy concerns raised by both end-users and
government authorities have been hindering the deployment of many valuable IT services, such
as data mining and analysis, data outsourcing, and mobile location-aware computing.
soo, in response to the growing necessity of protecting data privacy, our research group has been
focusing on developing innovative solutions towards information services --- to support these
services while preserving users’ personal privacy.
Video Surveillance
With the growing installation of surveillance video cameras in both private and public areas, the
closed-circuit TV (CCTV) has been evolved from a single camera system to a multiple camera
system; and has recently been extended to a large-scale network of cameras.
One of the objectives of a camera network is to monitor and understand security issues in the
area under surveillance. While the camera network hardware is generally well-designed and
roundly installed, the development of intelligent video analysis software lags far behind. As
such, our group has been focusing on developing video surveillance algorithms such as face
tracking, person re-identification, human action recognition.
Our goal is to develop an intelligent video surveillance system.
Secure Biometric System
With the growing use of biometrics, there is a rising concern about the security and privacy of
the biometric data. Recent studies show that simple attacks on a biometric system, such as hill
climbing, are able to recover the raw biometric data from stolen biometric template. Moreover,
the attacker may be able to make use of the stolen face template to access the system or cross-
match across databases. Our group has been working on face template protection, multimodality
template protection, and .
Electronic copy available at httpsssrn.comabstract=28526.docxAASTHA76
Electronic copy available at: https://ssrn.com/abstract=2852689
0
The interplay between decentralization and privacy:
the case of blockchain technologies
Primavera De Filippi
CERSA — CNRS — Université Paris II
Berkman Center for Internet & Society at Harvard
Abstract:
Decentralized architectures are gaining popularity as a way to protect one’s privacy against
the ubiquitous surveillance of states and corporations. Yet, in spite of the obvious benefits
they provide when it comes to data sovereignty, decentralized architectures also present
certain characteristics that—if not properly accounted for—might ultimately impinge upon
users’ privacy. While they are capable of preserving the confidentiality of data, decentralized
architectures cannot easily protect themselves against the analysis of metadata. Accordingly,
if not properly designed, decentralized infrastructures intended to promote individual privacy
and autonomy might turn out to be much more vulnerable to governmental or corporate
surveillance than their centralized counterparts.
This paper analyses the case of Bitcoin and other blockchain-based networks, as an example
of decentralized infrastructures which suffers from radical transparency. While they provide
a series of privacy benefits to end-users, the characteristics of these networks present both
advantages and risks to the privacy of end-users. On the one hand, the pseudonymous nature
of many blockchain-based networks allows for people to transact on a peer-to-peer basis,
without disclosing their identity to anyone. On the other hand, the transparency inherent to
these networks is such that anyone can retrieve the history of all transactions performed on a
blockchain and rely on big data analytics in order to retrieve potentially sensitive
information.
The paper concludes that, in spite of the apparent dichotomy between transparency and
privacy, there is no real conflict between the two. With the use of advanced cryptographic
techniques, it is only a matter of time before people identify news ways to preserve
individual privacy in decentralized architectures.
Keywords: blockchain technology, decentralization, privacy, transparency, cryptography.
Electronic copy available at: https://ssrn.com/abstract=2852689
1
Introduction
With the current state of telecommunication technologies, it is becoming harder to
communicate on the Internet without leaving traces or disclosing information to centralized
third parties —be they governmental agencies or private companies (Lyon, 2014). The trend
towards the growing centralization of online platforms has important privacy implications.
Not only do these unifying network points constitute a single point of failure, they also
qualify as a valuable source of data that might fall prey to hackers. Centralized online
operators can also be coerced by governmental agencies to disclose sensitive information
about their us.
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
Enhanced Privacy in Mobile Online Social Networks to providing the location information to the User /server in the
online location server. MOSNs, more and more users‘ location information will be collected by the service providers
in mOSN. The users‘ privacy, including location privacy and social network privacy can be improved using the User
Registration & encryption of the data stored into the server. It should aiming at achieving enhanced privacy against
the insider attack launched by the service providers in mOSNs, we introduce a new architecture with multiple location
servers for the first time and propose a secure solution supporting location sharing among friends and strangers in
location-based applications. In our construction, the user‘s friend set in each friend‘s query submitted to the location
servers is divided into multiple subsets by the social network server randomly. Location-based services (LBSs) are
one of the most important components in mOSNs, which provides information and entertainment service based on the
geographical position of the mobile device. The entity of users, with mobile devices, is able to communicate with
other users and share their locations. Online social network Server manages users‘ identity-related information such as
users‘ profiles and friend lists. Location server stores users‘ location information and provides LBSs according to the
requests sent from users. Here we are going to improve the user location privacy, social network privacy.
Generic Security Framework for Multiple Heterogeneous Virtual InfrastructuresIJRES Journal
Virtualization continues to take center stage at IT industry, yet many organizations are finding it difficult to secure virtualized environments. Security is a critical component in the growing IT system surrounding virtualization. Many organizations find the security challenges associated with virtualization to be a major hurdle, companies of all kinds across all industries are looking towards addressing business and security needs in the virtual infrastructure. There are many research work done before about how to check the compliance status of the cloud platform, not of the virtual machines running on the platform. This paper proposes the security framework for multiple heterogeneous virtual machines which assess the compliance security of the virtual machines. In this paper we make use of REST APIs, using which we create remote session on the virtual machines and fetch the machine values which will be parsed to get the required values for assessment.
In this paper, we present an overview of existing cloud security algorithms. All these algorithms are described more or less on their own. Cloud security is a very popular task. We also explain the fundamentals of sequential rule mining. We describe today's approaches for cloud security. From the broad variety of efficient algorithms that have been developed we will compare the most important ones. We will systematize the algorithms and analyze their performance based on both their run time performance and theoretical considerations. Their strengths and weaknesses are also investigated. It turns out that the behavior of the algorithms is much more similar as to be expected.
International Journal of Engineering Research and Applications (IJERA) is an open access online peer reviewed international journal that publishes research and review articles in the fields of Computer Science, Neural Networks, Electrical Engineering, Software Engineering, Information Technology, Mechanical Engineering, Chemical Engineering, Plastic Engineering, Food Technology, Textile Engineering, Nano Technology & science, Power Electronics, Electronics & Communication Engineering, Computational mathematics, Image processing, Civil Engineering, Structural Engineering, Environmental Engineering, VLSI Testing & Low Power VLSI Design etc.
International Journal of Engineering Research and DevelopmentIJERD Editor
Electrical, Electronics and Computer Engineering,
Information Engineering and Technology,
Mechanical, Industrial and Manufacturing Engineering,
Automation and Mechatronics Engineering,
Material and Chemical Engineering,
Civil and Architecture Engineering,
Biotechnology and Bio Engineering,
Environmental Engineering,
Petroleum and Mining Engineering,
Marine and Agriculture engineering,
Aerospace Engineering.
Synthetic Fiber Construction in lab .pptxPavel ( NSTU)
Synthetic fiber production is a fascinating and complex field that blends chemistry, engineering, and environmental science. By understanding these aspects, students can gain a comprehensive view of synthetic fiber production, its impact on society and the environment, and the potential for future innovations. Synthetic fibers play a crucial role in modern society, impacting various aspects of daily life, industry, and the environment. ynthetic fibers are integral to modern life, offering a range of benefits from cost-effectiveness and versatility to innovative applications and performance characteristics. While they pose environmental challenges, ongoing research and development aim to create more sustainable and eco-friendly alternatives. Understanding the importance of synthetic fibers helps in appreciating their role in the economy, industry, and daily life, while also emphasizing the need for sustainable practices and innovation.
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...Levi Shapiro
Letter from the Congress of the United States regarding Anti-Semitism sent June 3rd to MIT President Sally Kornbluth, MIT Corp Chair, Mark Gorenberg
Dear Dr. Kornbluth and Mr. Gorenberg,
The US House of Representatives is deeply concerned by ongoing and pervasive acts of antisemitic
harassment and intimidation at the Massachusetts Institute of Technology (MIT). Failing to act decisively to ensure a safe learning environment for all students would be a grave dereliction of your responsibilities as President of MIT and Chair of the MIT Corporation.
This Congress will not stand idly by and allow an environment hostile to Jewish students to persist. The House believes that your institution is in violation of Title VI of the Civil Rights Act, and the inability or
unwillingness to rectify this violation through action requires accountability.
Postsecondary education is a unique opportunity for students to learn and have their ideas and beliefs challenged. However, universities receiving hundreds of millions of federal funds annually have denied
students that opportunity and have been hijacked to become venues for the promotion of terrorism, antisemitic harassment and intimidation, unlawful encampments, and in some cases, assaults and riots.
The House of Representatives will not countenance the use of federal funds to indoctrinate students into hateful, antisemitic, anti-American supporters of terrorism. Investigations into campus antisemitism by the Committee on Education and the Workforce and the Committee on Ways and Means have been expanded into a Congress-wide probe across all relevant jurisdictions to address this national crisis. The undersigned Committees will conduct oversight into the use of federal funds at MIT and its learning environment under authorities granted to each Committee.
• The Committee on Education and the Workforce has been investigating your institution since December 7, 2023. The Committee has broad jurisdiction over postsecondary education, including its compliance with Title VI of the Civil Rights Act, campus safety concerns over disruptions to the learning environment, and the awarding of federal student aid under the Higher Education Act.
• The Committee on Oversight and Accountability is investigating the sources of funding and other support flowing to groups espousing pro-Hamas propaganda and engaged in antisemitic harassment and intimidation of students. The Committee on Oversight and Accountability is the principal oversight committee of the US House of Representatives and has broad authority to investigate “any matter” at “any time” under House Rule X.
• The Committee on Ways and Means has been investigating several universities since November 15, 2023, when the Committee held a hearing entitled From Ivory Towers to Dark Corners: Investigating the Nexus Between Antisemitism, Tax-Exempt Universities, and Terror Financing. The Committee followed the hearing with letters to those institutions on January 10, 202
Unit 8 - Information and Communication Technology (Paper I).pdfThiyagu K
This slides describes the basic concepts of ICT, basics of Email, Emerging Technology and Digital Initiatives in Education. This presentations aligns with the UGC Paper I syllabus.
Honest Reviews of Tim Han LMA Course Program.pptxtimhan337
Personal development courses are widely available today, with each one promising life-changing outcomes. Tim Han’s Life Mastery Achievers (LMA) Course has drawn a lot of interest. In addition to offering my frank assessment of Success Insider’s LMA Course, this piece examines the course’s effects via a variety of Tim Han LMA course reviews and Success Insider comments.
Embracing GenAI - A Strategic ImperativePeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Biological screening of herbal drugs: Introduction and Need for
Phyto-Pharmacological Screening, New Strategies for evaluating
Natural Products, In vitro evaluation techniques for Antioxidants, Antimicrobial and Anticancer drugs. In vivo evaluation techniques
for Anti-inflammatory, Antiulcer, Anticancer, Wound healing, Antidiabetic, Hepatoprotective, Cardio protective, Diuretics and
Antifertility, Toxicity studies as per OECD guidelines
Francesca Gottschalk - How can education support child empowerment.pptxEduSkills OECD
Francesca Gottschalk from the OECD’s Centre for Educational Research and Innovation presents at the Ask an Expert Webinar: How can education support child empowerment?
Palestine last event orientationfvgnh .pptxRaedMohamed3
An EFL lesson about the current events in Palestine. It is intended to be for intermediate students who wish to increase their listening skills through a short lesson in power point.
A Strategic Approach: GenAI in EducationPeter Windle
Artificial Intelligence (AI) technologies such as Generative AI, Image Generators and Large Language Models have had a dramatic impact on teaching, learning and assessment over the past 18 months. The most immediate threat AI posed was to Academic Integrity with Higher Education Institutes (HEIs) focusing their efforts on combating the use of GenAI in assessment. Guidelines were developed for staff and students, policies put in place too. Innovative educators have forged paths in the use of Generative AI for teaching, learning and assessments leading to pockets of transformation springing up across HEIs, often with little or no top-down guidance, support or direction.
This Gasta posits a strategic approach to integrating AI into HEIs to prepare staff, students and the curriculum for an evolving world and workplace. We will highlight the advantages of working with these technologies beyond the realm of teaching, learning and assessment by considering prompt engineering skills, industry impact, curriculum changes, and the need for staff upskilling. In contrast, not engaging strategically with Generative AI poses risks, including falling behind peers, missed opportunities and failing to ensure our graduates remain employable. The rapid evolution of AI technologies necessitates a proactive and strategic approach if we are to remain relevant.
Operation “Blue Star” is the only event in the history of Independent India where the state went into war with its own people. Even after about 40 years it is not clear if it was culmination of states anger over people of the region, a political game of power or start of dictatorial chapter in the democratic setup.
The people of Punjab felt alienated from main stream due to denial of their just demands during a long democratic struggle since independence. As it happen all over the word, it led to militant struggle with great loss of lives of military, police and civilian personnel. Killing of Indira Gandhi and massacre of innocent Sikhs in Delhi and other India cities was also associated with this movement.
Thesis Statement for students diagnonsed withADHD.ppt
Secure encounter based mobile social networks requirements, designs, and tradeoffs
1. Secure Encounter-based Mobile Social Networks:
Requirements, Designs, and Tradeoffs
ABSTRACT:
Encounter-based social networks and encounter-based systems link users who
share a location at the same time, as opposed to the traditional social network
paradigm of linking users who have an offline friendship. This new approach
presents challenges that are fundamentally different from those tackled by previous
social network designs. In this paper, we explore the functional and security
requirements for these new systems, such as availability, security, and privacy, and
present several design options for building secure encounter-based social networks.
To highlight these challenges we examine one recently proposed encounter-based
social network design and compare it to a set of idealized security and functionality
requirements. We show that it is vulnerable to several attacks, including
impersonation, collusion, and privacy breaching, even though it was designed
specifically for security. Mindful of the possible pitfalls, we construct a flexible
framework for secure encounter-based social networks, which can be used to
construct networks that offer different security, privacy, and availability
guarantees. We describe two example constructions derived from this framework,
2. and consider each in terms of the ideal requirements. Some of our new designs
fulfill more requirements in terms of system security, reliability, and privacy than
previous work. We also evaluate real-world performance of one of our designs by
implementing a proof-of-concept iPhone application called MeetUp. Experiments
highlight the potential of our system and hint at the deployability of our designs on
a large scale.
EXISTING SYSTEM:
In the conventional model of social networks, users select their contacts from a set
of off-line acquaintances. Despite their utility, these conventional networks support
only a subset of social networking: two users will only be able to establish a
relationship in the social network if they know of, or are introduced to each other.
On the other hand, in an encounter based social network, the only requirement for
establishing a connection is to be in the same place at the same time—similar to
striking up a conversation at a public place. Encounter-based social networks
would provide a computing infrastructure to allow for creation of varied services
such as a ―missed connections‖ virtual bulletin board, on-the-fly introductions
(business card exchange), or real-time in-person key distribution to bootstrap
secure communication in other systems. Although at first glance encounter-based
systems appear very similar to existing social networks, they present a dramatically
different set of challenges, not the least of which are security and privacy of users
3. and authenticity of the other party in a conversation. Guarantees that are trivial in
traditional social networks, such as authenticity (ensuring one is communicating
with the desired person), become open problems in encounter-based networks.
Additionally, requirements like anonymity—a feature that is not needed in most
traditional online social networks based on prior face-to-face contact— need to be
considered in encounter-based networks. This is desirable because users would
expect information about people they happen to meet to stay private. Furthermore,
since people do not automatically place their trust in others simply based on
presence in the same location, it is also desirable to reveal the minimum amount of
information required for future secure communication. Sharing detailed personal
information is not the primary goal of encounter-based networks, but can of course
be easily implemented if both users agree upon the successful verified encounter.
DISADVANTAGES OF EXISTING SYSTEM:
Although at first glance encounter-based systems appear very similar to existing
social networks, they present a dramatically different set of challenges, not the
least of which are security and privacy of users and authenticity of the other
party in a conversation.
Guarantees that are trivial in traditional social networks, such as authenticity
(ensuring one is communicating with the desired person), become open
problems in encounter-based networks.
4. Additionally, requirements like anonymity—a feature that is not needed in most
traditional online social networks based on prior face-to-face contact— need to
be considered in encounter-based networks.
PROPOSED SYSTEM:
In this paper we consider fundamental requirements for encounter-based social
networks. We note that in addition to basic functionality like high availability,
scalability, and robustness to failure, these systems should provide several security
guarantees, including privacy in the form of unlink ability of users sharing an
encounter, confidentiality of data exchanged among encounter participants, and
authentication of both users in a two-party conversation. We show that SMILE a
recent state-of-the-art design, fails to meet a number of these requirements (even
though it was built explicitly with security in mind). We propose a generic design
that can be used to construct networks that provide different security guarantees.
We then describe individual designs and show the benefits and trade-offs of
specific security design
ADVANTAGES OF PROPOSED SYSTEM:
i. By first outlining security and functional requirements that are ideally
desired for encounter-based social network and arguing that these are
5. minimal requirements for many distributed system with reasonable security
and privacy guarantees, we examine the extent to which SMILE, a recent
state-of-the art design of secure encounter-based social network, meets these
requirements, showing that it is vulnerable to many attacks.
ii. We propose a new and generic architecture for encounter-based social
networking that greatly differs from the architecture of previously proposed
systems and suggest two possible implementations, each striking a balance
between performance and security.
iii. We show the feasibility of our designs by implementing a proof-of-concept
system— including an iPhone application called Meet Up—conforming to
our requirements and evaluating its performance in real world settings using
mobile devices, and by bringing further evidence on the usability of our
design and rationality of used assumptions based on several user studies.
SYSTEM CONFIGURATION:-
HARDWARE CONFIGURATION:-
Processor - Pentium –IV
Speed - 1.1 Ghz
RAM - 256 MB(min)
Hard Disk - 20 GB
6. Key Board - Standard Windows Keyboard
Mouse - Two or Three Button Mouse
Monitor - SVGA
SOFTWARE CONFIGURATION:-
Operating System : Windows XP
Programming Language : JAVA
Java Version : JDK 1.6 & above.
REFERENCE:
Abedelaziz Mohaien, Denis Foo Kune,Member, IEEE,Eugene
Vasserman,Member, IEEE, Myungsun Kim, and Yongdae Kim,Member, IEEE
―Secure Encounter-based Mobile Social Networks: Requirements, Designs, and
Tradeoffs‖- IEEE TRANSACTIONS ON DEPENDABLE AND SECURE
COMPUTING, VOL. 1, NO. 8, AUGUST 2013.