The document proposes a framework for managing trusted video content on social multimedia networks. The framework aims to ensure secure delivery of videos while optimizing computing resources. It involves assigning trust levels to users based on history, using an intelligent agent to automatically publish or reject content, and checking video integrity during streaming. The framework has modules for social networking, secure video storage and streaming, video integrity checking, incentivizing user reviews, calculating user trust levels, and a voting system. It analyzes user behavior and interactions to compute trust scores and help make publishing decisions. The goal is to increase trust in social networks while achieving efficient costs.
Trust based video management framework for social multimedia networksVenkat Projects
Trust based video management framework for social multimedia networks
Social Multimedia Networks (SMNs) have attracted much attention from both academia and industry due to their impact on our daily lives. The requirements of SMN users are increasing along with time, which make the satisfaction of those requirements a very challenging process. One important challenge facing SMNs consists of their internal users that can upload and manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and verifying content delivered to end-users is becoming a highly challenging process. So far, many researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein, the aim of this paper is to propose a framework that allows collaboration between humans and machines to ensure secure delivery of trusted videos content over SMNs while ensuring an optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the proposed framework consist in i) assigning to each user a level of trust based on his/her history, ii) creating an intelligent agent that decides which content can be automatically published on the network and which content should be reviewed or rejected, and iii) checking the videos’ integrity and delivery during the streaming process. Accordingly, we ensure that the trust level of the SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational Expenditures (OPEX) can be achieved
With the advent of mobile network communication system, users have been offered lots of services
such as ability to send multimedia messages like SMS, Video, Data files, Images e.t.c. This paper describes the
design and implementation of a system (Result Alert System) that conveniently provides examination results to
students with the use of Email and SMS technology via their Mobile phones and devices.
Mobile phones and devices are necessary assets, most especially to students as it makes communication and the
spread of information a lot easier. Result Alert System takes advantage of some of the technologies that Mobile
devices provide, technologies such as the Email and Short Message Service (SMS). The implemented system
allows registered students to access their results, including past results, provided they are available in the system’s database.
We are offering new innovative concept oriented projects for final year students in the technology of Vb.Net. Visual Basic .NET (VB.NET or VB .NET) is a version of Microsoft's Visual Basic that was designed, as part of the company's .NET product group, to make Web services applications easier to develop. Generally there are mainly two types of Vb.Net projects we can develop. 1. Application Side Projects: This type of projects interact with database oriented. 2. System Side Projects:The projects which deal with the system application are called as Projects in system design. These are very difficult and Expensive to implement in real time. We are using following technologies for windows application projects development: Visual Studio 2012, Dot.Net framework 4.5, Form Designing – Vb.Net, Coding Language - C# or Vb.Net, Backend (Database) - SQL Server 2008, Report – Crystal Report. Here we are supporting to project documentation, source code training and paper presentation. Your new innovative ideas also we appreciate and developing. For more projects references kindly contact our branch.
Trust based video management framework for social multimedia networksVenkat Projects
Trust based video management framework for social multimedia networks
Social Multimedia Networks (SMNs) have attracted much attention from both academia and industry due to their impact on our daily lives. The requirements of SMN users are increasing along with time, which make the satisfaction of those requirements a very challenging process. One important challenge facing SMNs consists of their internal users that can upload and manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and verifying content delivered to end-users is becoming a highly challenging process. So far, many researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein, the aim of this paper is to propose a framework that allows collaboration between humans and machines to ensure secure delivery of trusted videos content over SMNs while ensuring an optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the proposed framework consist in i) assigning to each user a level of trust based on his/her history, ii) creating an intelligent agent that decides which content can be automatically published on the network and which content should be reviewed or rejected, and iii) checking the videos’ integrity and delivery during the streaming process. Accordingly, we ensure that the trust level of the SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational Expenditures (OPEX) can be achieved
With the advent of mobile network communication system, users have been offered lots of services
such as ability to send multimedia messages like SMS, Video, Data files, Images e.t.c. This paper describes the
design and implementation of a system (Result Alert System) that conveniently provides examination results to
students with the use of Email and SMS technology via their Mobile phones and devices.
Mobile phones and devices are necessary assets, most especially to students as it makes communication and the
spread of information a lot easier. Result Alert System takes advantage of some of the technologies that Mobile
devices provide, technologies such as the Email and Short Message Service (SMS). The implemented system
allows registered students to access their results, including past results, provided they are available in the system’s database.
We are offering new innovative concept oriented projects for final year students in the technology of Vb.Net. Visual Basic .NET (VB.NET or VB .NET) is a version of Microsoft's Visual Basic that was designed, as part of the company's .NET product group, to make Web services applications easier to develop. Generally there are mainly two types of Vb.Net projects we can develop. 1. Application Side Projects: This type of projects interact with database oriented. 2. System Side Projects:The projects which deal with the system application are called as Projects in system design. These are very difficult and Expensive to implement in real time. We are using following technologies for windows application projects development: Visual Studio 2012, Dot.Net framework 4.5, Form Designing – Vb.Net, Coding Language - C# or Vb.Net, Backend (Database) - SQL Server 2008, Report – Crystal Report. Here we are supporting to project documentation, source code training and paper presentation. Your new innovative ideas also we appreciate and developing. For more projects references kindly contact our branch.
In Stock Market Prediction, the aim is to predict the future value of the financial stocks of a company. The recent trend in stock market prediction technologies is the use of machine learning which makes predictions based on the values of current stock market indices by training on their previous values. Machine learning itself employs different models to make prediction easier and authentic.
Gear Sport smartwatch user manual SM-R600TizenExperts
The Gear Sport is a smartwatch that can analyse your exercise pattern, manage your health and allows you to use a variety of convenient apps for making phone calls, playing music, and managing your health. By rotating the bezel, you can access convenient features quickly and easily. You can also change the watch face to your taste.
Today's police departments utilize computers in almost every aspect of functioning. From extensive national databases to community service websites, computers have increased the efficiency of compiling, processing, researching and analyzing all forms of e data, which is equally applicable to the Police.
To understand the need and importance of
Office Automation Systems
To understand the benefits of paperless Office
To know about the components of Office
Automation
To study the concept of Office Information
System
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Mobile content generation application | Wireless Community Network Enabler#Mike Taylor
Mobile content generation application for Wireless Community Network Enabler or Content Management Portal Mobile Devices Integration of RSS and ATOM feeds on Mobile Devices
In Stock Market Prediction, the aim is to predict the future value of the financial stocks of a company. The recent trend in stock market prediction technologies is the use of machine learning which makes predictions based on the values of current stock market indices by training on their previous values. Machine learning itself employs different models to make prediction easier and authentic.
Gear Sport smartwatch user manual SM-R600TizenExperts
The Gear Sport is a smartwatch that can analyse your exercise pattern, manage your health and allows you to use a variety of convenient apps for making phone calls, playing music, and managing your health. By rotating the bezel, you can access convenient features quickly and easily. You can also change the watch face to your taste.
Today's police departments utilize computers in almost every aspect of functioning. From extensive national databases to community service websites, computers have increased the efficiency of compiling, processing, researching and analyzing all forms of e data, which is equally applicable to the Police.
To understand the need and importance of
Office Automation Systems
To understand the benefits of paperless Office
To know about the components of Office
Automation
To study the concept of Office Information
System
Using Data Mining Techniques to Analyze Crime PatternZakaria Zubi
Our proposed model will be able to extract crime patterns by using association rule mining and clustering to classify crime records on the basis of the values of crime attributes.
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09666155510, 09849539085 or mail us - ieeefinalsemprojects@gmail.com-Visit Our Website: www.finalyearprojects.org
Mobile content generation application | Wireless Community Network Enabler#Mike Taylor
Mobile content generation application for Wireless Community Network Enabler or Content Management Portal Mobile Devices Integration of RSS and ATOM feeds on Mobile Devices
Online Social Network (OSN) sites act as a medium to spread their own views, activities and their thoughts to some camaraderie. Contents of this network are spread over web, so it was hard to determine by a human decision. Currently, they do not provide any mechanism to ensure privacy concerns towards data associated with each user. Due to this problem, number of users lacks from their ownership control. In this paper, we proposed AC2P (Activity Control-Access Control Protocol) for information control on the web. Alternatively, Tag Refinement strategy determines illegal tagging over images and send notification about particular image spread within different communities/groups. These techniques reduce risk of information flow and avoid unwanted tagging toward images.
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique to replace passwords, that leverages the pervasive user mobile
devices, QR codes and the strength of symmetric and asymmetric cryptography. In BMBAT, the user’s
mobile device acts as a user identity prover and a verifier for the server; it employs a challenge-response model with a dual mode of encryption using AES and RSA keys to mutually authenticate the client to the server and vice-versa. BMBAT combats a set of attack vectors including phishing attacks, man in the middle attacks, eavesdropping and session hijacking. A prototype of BMBAT has been developed and evaluated; the evaluation results show that BMBAT is a feasible and competitive alternative to passwords.
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
Despite their proven security breaches, text passwords have been dominating all other methods of human authentication over the web for tens of years, however, the frequent successful attacks that exploit the passwords vulnerable model raises the need to enhance web authentication security. This paper proposes BMBAT; a new authentication technique to replace passwords, that leverages the pervasive user mobile
devices, QR codes and the strength of symmetric and asymmetric cryptography. In BMBAT, the user’s mobile device acts as a user identity prover and a verifier for the server; it employs a challenge-response model with a dual mode of encryption using AES and RSA keys to mutually authenticate the client to the server and vice-versa. BMBAT combats a set of attack vectors including phishing attacks, man in the middle attacks, eavesdropping and session hijacking. A prototype of BMBAT has been developed and evaluated; the evaluation results show that BMBAT is a feasible and competitive alternative to passwords.
Grid computing is concerned with the sharing and use of resources in dynamic distributed virtual
organizations. The dynamic nature of Grid environments introduces challenging security concerns that
demand new technical approaches. In this brief overview we review key Grid security issues and outline
the technologies that are being developed to address those issues. We focus on works done by Globus
Toolkits to provide security and also we will discuss about the cyber security in Grid.
Examining the Nature and Development of Services for Cryptocurrency Wallet De...av0763436
A trustworthy cryptocurrency wallet app development Company, RichestSoft offers development solutions that go through multiple stages of the creation of cryptocurrency wallet apps. But it also guarantees that all of our client's criteria are met in full. Crypto wallets are crucial for robust crypto swapping capabilities in addition to being used for payment transactions.
Wireless mobile content genteration application with RSS feed integrationMike Taylor
Case Study for Wireless content generation application/ Content Management Portal with Integration of RSS and ATOM feeds on Mobile Devices and other hand held devices.visit us @ http://www.brainvire.com/case-study/
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSIJNSA Journal
The majority of current web authentication is built on username/password. Unfortunately, password replacement offers more security, but it is difficult to use and expensive to deploy. In this paper, we propose a new mutual authentication scheme called StrongAuth which preserves most password authentication advantages and simultaneously improves security using cryptographic primitives. Our scheme not only offers webmasters a clear framework which to build secure user authentication, but it also provides almost the same conventional user experience. Security analysis shows that the proposed scheme fulfills the required user authentication security benefits, and can resist various possible attacks.
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
IOSR Journal of Computer Engineering (IOSR-JCE) is a double blind peer reviewed International Journal that provides rapid publication (within a month) of articles in all areas of computer engineering and its applications. The journal welcomes publications of high quality papers on theoretical developments and practical applications in computer technology. Original research papers, state-of-the-art reviews, and high quality technical notes are invited for publications.
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
Presentation on Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based Encryption done at my college during Mini Project Review..
Hope you like it and can be thank me later..
yashkruk@gmail.com
The ubiquitous and connected nature of camera loaded mobile devices has greatly estimated the value and importance of visual information they capture. Today, sending videos from camera phones uploaded by unknown users is relevant on news networks, and banking customers expect to be able to deposit checks using mobile devices. In this paper we represent Movee, a system that addresses the fundamental question of whether the visual stream exchange by a user has been captured live on a mobile device, and has not been tampered with by an adversary. Movee leverages the mobile device motion sensors and the inherent user movements during the shooting of the video. Movee exploits the observation that the movement of the scene recorded on the video stream should be related to the movement of the device simultaneously captured by the accelerometer. the last decade e-lecturing has become more and more popular. We model the distribution of correlation of temporal noise residue in a forged video as a Gaussian mixture model (GMM). We propose a twostep scheme to estimate the model parameters. Consequently, a Bayesian classifier is used to find the optimal threshold value based on the estimated parameters. Cyrus Deboo | Shubham Kshatriya | Rajat Bhat"Video Liveness Verification" Published in International Journal of Trend in Scientific Research and Development (ijtsrd), ISSN: 2456-6470, Volume-2 | Issue-3 , April 2018, URL: http://www.ijtsrd.com/papers/ijtsrd12772.pdf http://www.ijtsrd.com/computer-science/other/12772/video-liveness-verification/cyrus-deboo
To Get any Project for CSE, IT ECE, EEE Contact Me @ 09849539085, 09966235788 or mail us - ieeefinalsemprojects@gmail.co¬m-Visit Our Website: www.finalyearprojects.org
Similar to trust based video management framework for social multimedia networks (20)
2021 python projects list
A BI-OBJECTIVE HYPER-HEURISTIC SUPPORT VECTOR MACHINES FOR BIG DATA CYBER-SECURITY
AN ARTIFICIAL INTELLIGENCE AND CLOUD BASED COLLABORATIVE PLATFORM FOR PLANT DISEASE IDENTIFICATION, TRACKING AND FORECASTING FOR FARMERS
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
10.sentiment analysis of customer product reviews using machine learning In this project author is detecting sentiments from amazon reviews by using various machine learning algorithms such as SVM, Decision Tree and Naïve Bayes. In all 3 algorithms SVM is giving better accuracy and to train this algorithms author has used AMAZON reviews dataset and this dataset is saved inside ‘Amazon_Reviews_dataset’ folder. Below screen shot show example reviews from dataset
9.data analysis for understanding the impact of covid–19 vaccinations on the ...Venkat Projects
9.data analysis for understanding the impact of covid–19 vaccinations on the society
In this paper author analysing vaccines dataset to forecast required vaccines compare to manufacturing or available vaccines and by using this forecasting manufacturers may increase and decrease their manufacturing quantity. This forecasting can impact society by taking decision on manufacturing vaccines and if in society more cases occurred then forecasting will be high and by seeing forecasting manufacturers may increase production.
Vaccines are manufacturing by multiple manufacturers such as JOHNSON AND JOHNSON, PFIZER and many more. In this forecasting will take all manufacturers and their production quantity as well as usage of vaccines and based on this Machine Learning algorithm called Decision Tree will forecast require vaccines for next 30 days
To implement this project we are using vaccines dataset to train decision tree algorithm and then this algorithm will predict require vaccines quantity for next 30 days. This dataset is saved inside ‘Dataset’ folder and below screen showing some records from dataset
6.iris recognition using machine learning techniqueVenkat Projects
In this project to recognize person from IRIS we are using CASIA IRIS dataset which contains images from 108 peoples and by using this dataset we are training CNN model and then we can use this CNN model to predict/recognize persons. To train CNN model we are extracting IRIS features by using HoughCircles algorithm which extract IRIS circle from eye images. Below screen shots showing dataset with person id and this dataset saved inside ‘CASIA1’ folder
HEAP SORT ILLUSTRATED WITH HEAPIFY, BUILD HEAP FOR DYNAMIC ARRAYS.
Heap sort is a comparison-based sorting technique based on Binary Heap data structure. It is similar to the selection sort where we first find the minimum element and place the minimum element at the beginning. Repeat the same process for the remaining elements.
Understanding Inductive Bias in Machine LearningSUTEJAS
This presentation explores the concept of inductive bias in machine learning. It explains how algorithms come with built-in assumptions and preferences that guide the learning process. You'll learn about the different types of inductive bias and how they can impact the performance and generalizability of machine learning models.
The presentation also covers the positive and negative aspects of inductive bias, along with strategies for mitigating potential drawbacks. We'll explore examples of how bias manifests in algorithms like neural networks and decision trees.
By understanding inductive bias, you can gain valuable insights into how machine learning models work and make informed decisions when building and deploying them.
Saudi Arabia stands as a titan in the global energy landscape, renowned for its abundant oil and gas resources. It's the largest exporter of petroleum and holds some of the world's most significant reserves. Let's delve into the top 10 oil and gas projects shaping Saudi Arabia's energy future in 2024.
KuberTENes Birthday Bash Guadalajara - K8sGPT first impressionsVictor Morales
K8sGPT is a tool that analyzes and diagnoses Kubernetes clusters. This presentation was used to share the requirements and dependencies to deploy K8sGPT in a local environment.
We have compiled the most important slides from each speaker's presentation. This year’s compilation, available for free, captures the key insights and contributions shared during the DfMAy 2024 conference.
Hierarchical Digital Twin of a Naval Power SystemKerry Sado
A hierarchical digital twin of a Naval DC power system has been developed and experimentally verified. Similar to other state-of-the-art digital twins, this technology creates a digital replica of the physical system executed in real-time or faster, which can modify hardware controls. However, its advantage stems from distributing computational efforts by utilizing a hierarchical structure composed of lower-level digital twin blocks and a higher-level system digital twin. Each digital twin block is associated with a physical subsystem of the hardware and communicates with a singular system digital twin, which creates a system-level response. By extracting information from each level of the hierarchy, power system controls of the hardware were reconfigured autonomously. This hierarchical digital twin development offers several advantages over other digital twins, particularly in the field of naval power systems. The hierarchical structure allows for greater computational efficiency and scalability while the ability to autonomously reconfigure hardware controls offers increased flexibility and responsiveness. The hierarchical decomposition and models utilized were well aligned with the physical twin, as indicated by the maximum deviations between the developed digital twin hierarchy and the hardware.
Online aptitude test management system project report.pdfKamal Acharya
The purpose of on-line aptitude test system is to take online test in an efficient manner and no time wasting for checking the paper. The main objective of on-line aptitude test system is to efficiently evaluate the candidate thoroughly through a fully automated system that not only saves lot of time but also gives fast results. For students they give papers according to their convenience and time and there is no need of using extra thing like paper, pen etc. This can be used in educational institutions as well as in corporate world. Can be used anywhere any time as it is a web based application (user Location doesn’t matter). No restriction that examiner has to be present when the candidate takes the test.
Every time when lecturers/professors need to conduct examinations they have to sit down think about the questions and then create a whole new set of questions for each and every exam. In some cases the professor may want to give an open book online exam that is the student can take the exam any time anywhere, but the student might have to answer the questions in a limited time period. The professor may want to change the sequence of questions for every student. The problem that a student has is whenever a date for the exam is declared the student has to take it and there is no way he can take it at some other time. This project will create an interface for the examiner to create and store questions in a repository. It will also create an interface for the student to take examinations at his convenience and the questions and/or exams may be timed. Thereby creating an application which can be used by examiners and examinee’s simultaneously.
Examination System is very useful for Teachers/Professors. As in the teaching profession, you are responsible for writing question papers. In the conventional method, you write the question paper on paper, keep question papers separate from answers and all this information you have to keep in a locker to avoid unauthorized access. Using the Examination System you can create a question paper and everything will be written to a single exam file in encrypted format. You can set the General and Administrator password to avoid unauthorized access to your question paper. Every time you start the examination, the program shuffles all the questions and selects them randomly from the database, which reduces the chances of memorizing the questions.
Water billing management system project report.pdfKamal Acharya
Our project entitled “Water Billing Management System” aims is to generate Water bill with all the charges and penalty. Manual system that is employed is extremely laborious and quite inadequate. It only makes the process more difficult and hard.
The aim of our project is to develop a system that is meant to partially computerize the work performed in the Water Board like generating monthly Water bill, record of consuming unit of water, store record of the customer and previous unpaid record.
We used HTML/PHP as front end and MYSQL as back end for developing our project. HTML is primarily a visual design environment. We can create a android application by designing the form and that make up the user interface. Adding android application code to the form and the objects such as buttons and text boxes on them and adding any required support code in additional modular.
MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software. It is a stable ,reliable and the powerful solution with the advanced features and advantages which are as follows: Data Security.MySQL is free open source database that facilitates the effective management of the databases by connecting them to the software.
DESIGN AND ANALYSIS OF A CAR SHOWROOM USING E TABS
trust based video management framework for social multimedia networks
1. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Trust Based Video Management Framework For Social Multimedia
Networks
Abstract:
Social Multimedia Networks (SMNs) have attracted much attention from both academia and
industry due to their impact on our daily lives. The requirements of SMN users are increasing
along with time, which make the satisfaction of those requirements a very challenging process.
One important challenge facing SMNs consists of their internal users that can upload and
manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and
verifying content delivered to end-users is becoming a highly challenging process. So far, many
researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein,
the aim of this paper is to propose a framework that allows collaboration between humans and
machines to ensure secure delivery of trusted videos content over SMNs while ensuring an
optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the
proposed framework consist in i) assigning to each user a level of trust based on his/her history,
ii) creating an intelligent agent that decides which content can be automatically published on the
network and which content should be reviewed or rejected, and iii) checking the videos’ integrity
and delivery during the streaming process. Accordingly, we ensure that the trust level of the
SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational
Expenditures (OPEX) can be achieved.
Index Terms—Social multimedia network, video streaming, trust model, and trust management.
Existing System:
users can easily discuss their ideas and opinions remotely, publish new articles, and meet new
persons. Moreover, they have allowed business and organizations to advertise for their products
over the world and to directly contact their customers. In addition to these social networks, other
web applications, such as Youtube, Dailymotion, and Vimeo, have enabled the exchange of
different contents, including text, images, and videos among different entities connected to their
services. The evolution of the Internet and distributed systems has led researchers to implement
applications that serve video on demand (VOD) on top of the peer-to-peer (P2P) networks.
2. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
VOD and videos live streaming systems are gaining momentum in SMN. They have enabled the
appearance of many multimedia-centric services such as video conferencing applications, online
meeting applications, massive open online courses (MOOC) as well as other use cases in e-
health and e-teaching. Such services attract and connect millions of users worldwide. The
providers of these services have enabled countless features that allow users to interact among
themselves by creating and sharing different contents (e.g, videos, text, and images). However,
by allowing this, the nodes composing the social networks, users and machines, generate a huge
amount of data, which can be uncontrolled, unsecured and untrusted . Such amount of generated
data are causing a congestion to the networks and posing a new security challenge to the service
providers: it becomes hard to handle and analyze all content traversing their networks. To tackle
this problem, many research efforts have been conducted so far for mitigating the upload of
malicious data to SMNs.
Proposed system:
Diverse data analytics applications have been proposed and developed with the goal to create a
trustworthy SMN. The researchers’ vision of trustworthy SMNs lies in achieving certainty,
authenticity, and security of data exchanged throughout social network nodes. In this vein, many
trust models and reputation systems have emerged with the goal to limit the spread of unsecured
data. Generally, trust models and reputation systems are designed to assign a score to each entity
in the network and establish trust among them. This score may help users to make a proper
decision on buying an item from an online store, selecting a service provider or recommending a
service to other users. Additionally, the trust score provides decisional systems with the needed
information to execute adequate actions, such as the implementation of certain policies that
restraint an entity from using some resources or accessing some services.
The main features that should be taken into consideration while defining a trust model are as
follows:
User history: The only way to predict user behavior is to study and analyze all generated
content by different users during their interactions in the network . The user history records may
contain relations and links between data, these links are valuable for the data analytics
applications in order to offer a good user experience.
Trust calculation: A user’s level of trust is one of the important metrics that should be taken into
consideration when analyzing users’ data. The computation of this value includes the selection of
various parameters that characterize the manipulated data. For this reason, there is a need to
suggest a realistic model that can capture the characteristics of uploaded data based on the
historical behavior of users.
Users collaboration: Based on the observation that human intelligence is one of the main keys to
effectively detect and remove untrusted data, many algorithms and applications have been
recently devised for detecting and measuring users’ collaborations rate. These algorithms and
3. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
applications allow users to rate different social multimedia items. Then, the system is able to
collect these feedbacks, applies some filtering methods and executes different needed actions.
Secure content delivery: In a trustworthy social network, every bit of data should be under
control. In other words, starting from any node in the network (e.g, user, mobile, or server), the
path that the data take to arrive at another node should be secured.
MODULES:
1. SOCIAL NETWORK MODULE
2. SECURE VIDEOS MODULE
3. VIDEO INTEGRITY CHECKER MODULE
4. INCENTIVE MODULE
5. TRUST CALCULATION MODULE
6. VOTING SYSTEM MODULE
1. SOCIAL NETWORK MODULE(SNM)
This module is the first component that interacts with the users. It permits them to do all kind of
social interactions, such as the upload of videos, the post of comments, and the sharing of
different videos. This module is composed of many microservices that communicate with each
other in order to offer a user-friendly application that fulfills the end-users needs. The main
micro-services are i) the web server that responds to the users’ requests, ii) a database that stores
all information of users and their generated content, iii) a caching microservice for reducing the
response time and allowing the users to have good experiences while interacting with the system,
iv) a message broker that allows the communication between the different components, and v) a
central authentication service that authenticates the users and gives them the right to request
other services.
2. SECURE VIDEOS MODULE(SVM)
This module allows authorized users to upload their media files to the secure storage, as well as
it allows the social network users to watch the videos streamed on demand from the secure
streaming. The SVM consists of three components:
Secure storage: this component mainly works as follows: first of all, an authorized user sends an
upload request to the SNM. Then, the social network module (SNM), more precisely the central
authentication micro-service, generates and stores a unique token in the database, and then sends
4. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
it to the user as a response. The user starts sending the video chunks to the storage server while
including that token within the messages sent. The storage server (SS) checks the received token
and then decides either to accept or reject the upload. This component adopts the HTTP live
stream (HLS) for serving diverse users with different resolutions adapted to their network
bandwidth and devices. Also, this component uses the Rivest Cipher 4 (RC4) algorithm in order
to encrypt the video chunks sent to the end users.
Secure transcoder: this component allows the transcoding of the uploaded videos to different
resolutions using softwares such as FFMPEG. Each resolution is subdivided into small chunks of
fixed time duration [35]. After the transcoding operation ends, the secure transcoder creates a
hash for each chunk and sends that hash to the video integrity checker module (VICM). The
VICM saves that hash in a public or private BLOCKCHAIN service as a transaction. The hashed
values will be used by the user video player to verify that the chunks received were approved by
the system and the chunks were not modified from the time that a user uploaded the video to the
secure storage.
3. Video integrity checker module(VICM)
The main feature of this module is to allow the timestamping of the chunks generated from an
uploaded video. This helps in checking the integrity of these chunks in the future. Formally, the
VICM module saves the video content, its signature and its date-time of creation in a trusted and
a shared database. Also, this module checks that the file has not been altered or modified thanks
to Blockchain technologies. Moreover, the service will be also used from a client (e.g, browser,
tablet, smartphone, etc) to verify that the video chunks received were not altered during the
streaming process.
4. Incentive module (IM)
In order to motivate users to review some uploaded videos and decide to publish them or not, an
incentive component was created to reward the users for their contributions. This component is
responsible for remunerating the reviewers when they make a true vote. A vote is considered true
when the decision made at the proposed framework is to publish the uploaded video.
5. Trust calculation module
This sub-module has the responsibility to compute the trustworthiness of different users. For this
reason, it keeps monitoring the behavior of each user by taking into consideration his/her social
interactions with other users. These social interactions include, but not limited to, the following
parameters: i) the number of followers (NOF); ii) the number of true votes (NOTV) received
5. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
from trusted users through the voting service sub-module; iii) the percentage of true reports
(PTR) received from different users of the social network; iv) the percentage of likes (POL)
received from the user network mainly his friends; and v) the average trust of published videos
(ATPV).
For the sake of simplicity, the trust value of each user is computed using a weighted sum
function of the different parameters. However, any more sophisticated method can be also used
with slight modification. For instance, the entropy of Shanon can be also applied to these
parameters for computing the trust degree of each user. In what follows, we will show how the
trust values of users and videos are computed.
6.Voting system module
The voting service is one of the main components of the system. It allows users to review and
vote certain videos in order to be published or not. It also permits users to reestablish their trust
level. The set of reviewers is selected according to a method that ensures that there is always a
sufficient number of reviewers. The method also allows a subset of users with low values of trust
to re-establish their reputations and gradually increase their factor of trust. Moreover, the voting
service collects votes and sends the gathered data to the decision making algorithm. The decision
algorithm explores the received feedbacks to take decisions on whether to publish or not a video.
System Architecture:
6. Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• PROCESSOR : I3.
• Hard Disk : 40 GB.
• Ram : 2 GB.
SOFTWARE REQUIREMENTS:
• Operating system : Windows.
• Coding Language : JAVA/J2EE
• Data Base : MYSQL
• IDE :Netbeans8.1