SlideShare a Scribd company logo
1 of 4
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Trust Based Video Management Framework For Social Multimedia
Networks
Abstract:
Social Multimedia Networks (SMNs) have attracted much attention from both academia and
industry due to their impact on our daily lives. The requirements of SMN users are increasing
along with time, which make the satisfaction of those requirements a very challenging process.
One important challenge facing SMNs consists of their internal users that can upload and
manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and
verifying content delivered to end-users is becoming a highly challenging process. So far, many
researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein,
the aim of this paper is to propose a framework that allows collaboration between humans and
machines to ensure secure delivery of trusted videos content over SMNs while ensuring an
optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the
proposed framework consist in i) assigning to each user a level of trust based on his/her history,
ii) creating an intelligent agent that decides which content can be automatically published on the
network and which content should be reviewed or rejected, and iii) checking the videos’ integrity
and delivery during the streaming process. Accordingly, we ensure that the trust level of the
SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational
Expenditures (OPEX) can be achieved.
Index Terms—Social multimedia network, video streaming, trust model, and trust management.
Existing System:
users can easily discuss their ideas and opinions remotely, publish new articles, and meet new
persons. Moreover, they have allowed business and organizations to advertise for their products
over the world and to directly contact their customers. In addition to these social networks, other
web applications, such as Youtube, Dailymotion, and Vimeo, have enabled the exchange of
different contents, including text, images, and videos among different entities connected to their
services. The evolution of the Internet and distributed systems has led researchers to implement
applications that serve video on demand (VOD) on top of the peer-to-peer (P2P) networks.
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
VOD and videos live streaming systems are gaining momentum in SMN. They have enabled the
appearance of many multimedia-centric services such as video conferencing applications, online
meeting applications, massive open online courses (MOOC) as well as other use cases in e-
health and e-teaching. Such services attract and connect millions of users worldwide. The
providers of these services have enabled countless features that allow users to interact among
themselves by creating and sharing different contents (e.g, videos, text, and images). However,
by allowing this, the nodes composing the social networks, users and machines, generate a huge
amount of data, which can be uncontrolled, unsecured and untrusted . Such amount of generated
data are causing a congestion to the networks and posing a new security challenge to the service
providers: it becomes hard to handle and analyze all content traversing their networks. To tackle
this problem, many research efforts have been conducted so far for mitigating the upload of
malicious data to SMNs.
Proposed system:
Diverse data analytics applications have been proposed and developed with the goal to create a
trustworthy SMN. The researchers’ vision of trustworthy SMNs lies in achieving certainty,
authenticity, and security of data exchanged throughout social network nodes. In this vein, many
trust models and reputation systems have emerged with the goal to limit the spread of unsecured
data. Generally, trust models and reputation systems are designed to assign a score to each entity
in the network and establish trust among them. This score may help users to make a proper
decision on buying an item from an online store, selecting a service provider or recommending a
service to other users. Additionally, the trust score provides decisional systems with the needed
information to execute adequate actions, such as the implementation of certain policies that
restraint an entity from using some resources or accessing some services.
The main features that should be taken into consideration while defining a trust model are as
follows:
User history: The only way to predict user behavior is to study and analyze all generated
content by different users during their interactions in the network . The user history records may
contain relations and links between data, these links are valuable for the data analytics
applications in order to offer a good user experience.
Trust calculation: A user’s level of trust is one of the important metrics that should be taken into
consideration when analyzing users’ data. The computation of this value includes the selection of
various parameters that characterize the manipulated data. For this reason, there is a need to
suggest a realistic model that can capture the characteristics of uploaded data based on the
historical behavior of users.
Users collaboration: Based on the observation that human intelligence is one of the main keys to
effectively detect and remove untrusted data, many algorithms and applications have been
recently devised for detecting and measuring users’ collaborations rate. These algorithms and
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
applications allow users to rate different social multimedia items. Then, the system is able to
collect these feedbacks, applies some filtering methods and executes different needed actions.
Secure content delivery: In a trustworthy social network, every bit of data should be under
control. In other words, starting from any node in the network (e.g, user, mobile, or server), the
path that the data take to arrive at another node should be secured.
System Architecture:
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• PROCESSOR : I3.
• Hard Disk : 40 GB.
• Ram : 2 GB.
SOFTWARE REQUIREMENTS:
• Operating system : Windows.
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
• Coding Language : JAVA/J2EE
• Data Base : MYSQL
• IDE :Netbeans8.1

More Related Content

What's hot

01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
Kranthi
 
Hadoop 2.0 Architecture | HDFS Federation | NameNode High Availability |
Hadoop 2.0 Architecture | HDFS Federation | NameNode High Availability | Hadoop 2.0 Architecture | HDFS Federation | NameNode High Availability |
Hadoop 2.0 Architecture | HDFS Federation | NameNode High Availability |
Edureka!
 

What's hot (20)

Memory Forensics
Memory ForensicsMemory Forensics
Memory Forensics
 
Computer forensic ppt
Computer forensic pptComputer forensic ppt
Computer forensic ppt
 
Application of data science in healthcare
Application of data science in healthcareApplication of data science in healthcare
Application of data science in healthcare
 
Next Generation Memory Forensics
Next Generation Memory ForensicsNext Generation Memory Forensics
Next Generation Memory Forensics
 
Big data security
Big data securityBig data security
Big data security
 
Mobile Forensics
Mobile ForensicsMobile Forensics
Mobile Forensics
 
Windowsforensics
WindowsforensicsWindowsforensics
Windowsforensics
 
mobile forensic.pptx
mobile forensic.pptxmobile forensic.pptx
mobile forensic.pptx
 
01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes01 Computer Forensics Fundamentals - Notes
01 Computer Forensics Fundamentals - Notes
 
Hadoop File system (HDFS)
Hadoop File system (HDFS)Hadoop File system (HDFS)
Hadoop File system (HDFS)
 
Big Data Fundamentals
Big Data FundamentalsBig Data Fundamentals
Big Data Fundamentals
 
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPTBIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
BIG DATA TO AVOID WEATHER RELATED FLIGHT DELAYS PPT
 
Resource-Oriented Architecture (ROA)
Resource-Oriented Architecture (ROA)Resource-Oriented Architecture (ROA)
Resource-Oriented Architecture (ROA)
 
Big_data_ppt
Big_data_ppt Big_data_ppt
Big_data_ppt
 
Email recovery
Email recoveryEmail recovery
Email recovery
 
Data Mining: Application and trends in data mining
Data Mining: Application and trends in data miningData Mining: Application and trends in data mining
Data Mining: Application and trends in data mining
 
Hadoop 2.0 Architecture | HDFS Federation | NameNode High Availability |
Hadoop 2.0 Architecture | HDFS Federation | NameNode High Availability | Hadoop 2.0 Architecture | HDFS Federation | NameNode High Availability |
Hadoop 2.0 Architecture | HDFS Federation | NameNode High Availability |
 
Digital forensics
Digital forensicsDigital forensics
Digital forensics
 
data hiding techniques.ppt
data hiding techniques.pptdata hiding techniques.ppt
data hiding techniques.ppt
 
Cyber forensics question bank
Cyber forensics   question bankCyber forensics   question bank
Cyber forensics question bank
 

Similar to Trust based video management framework for social multimedia networks

App Lifecycle Management for enterprise mobile apps
App Lifecycle Management for enterprise mobile appsApp Lifecycle Management for enterprise mobile apps
App Lifecycle Management for enterprise mobile apps
Vishal Jain
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Editor IJAIEM
 

Similar to Trust based video management framework for social multimedia networks (20)

Next Generation Internet
Next Generation InternetNext Generation Internet
Next Generation Internet
 
Blockchain App Development Company.pdf
Blockchain App Development Company.pdfBlockchain App Development Company.pdf
Blockchain App Development Company.pdf
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
App Lifecycle Management for enterprise mobile apps
App Lifecycle Management for enterprise mobile appsApp Lifecycle Management for enterprise mobile apps
App Lifecycle Management for enterprise mobile apps
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Survey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using BlockchainSurvey on Peer to Peer Car Sharing System Using Blockchain
Survey on Peer to Peer Car Sharing System Using Blockchain
 
MIS330FinalReport
MIS330FinalReportMIS330FinalReport
MIS330FinalReport
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#
 
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...IRJET -  	  An Intelligent Recommendation for Social Contextual Image using H...
IRJET - An Intelligent Recommendation for Social Contextual Image using H...
 
Trustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social NetworkTrustworthy Service Enhancement in Mobile Social Network
Trustworthy Service Enhancement in Mobile Social Network
 
Mobility innovation and unknowns
Mobility innovation and unknownsMobility innovation and unknowns
Mobility innovation and unknowns
 
web security
web securityweb security
web security
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
Unification Algorithm in Hefty Iterative Multi-tier Classifiers for Gigantic ...
 
Why IAM is the Need of the Hour
Why IAM is the Need of the HourWhy IAM is the Need of the Hour
Why IAM is the Need of the Hour
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web Application
 
Research Article On Web Application Security
Research Article On Web Application SecurityResearch Article On Web Application Security
Research Article On Web Application Security
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
 
main project doument
main project doumentmain project doument
main project doument
 

More from Venkat Projects

More from Venkat Projects (20)

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
 
WATERMARKING IMAGES
WATERMARKING IMAGESWATERMARKING IMAGES
WATERMARKING IMAGES
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 

Recently uploaded

Recently uploaded (20)

Tatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf artsTatlong Kwento ni Lola basyang-1.pdf arts
Tatlong Kwento ni Lola basyang-1.pdf arts
 
dusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learningdusjagr & nano talk on open tools for agriculture research and learning
dusjagr & nano talk on open tools for agriculture research and learning
 
How to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptxHow to setup Pycharm environment for Odoo 17.pptx
How to setup Pycharm environment for Odoo 17.pptx
 
How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17How to Manage Call for Tendor in Odoo 17
How to Manage Call for Tendor in Odoo 17
 
Understanding Accommodations and Modifications
Understanding  Accommodations and ModificationsUnderstanding  Accommodations and Modifications
Understanding Accommodations and Modifications
 
Towards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptxTowards a code of practice for AI in AT.pptx
Towards a code of practice for AI in AT.pptx
 
Basic Intentional Injuries Health Education
Basic Intentional Injuries Health EducationBasic Intentional Injuries Health Education
Basic Intentional Injuries Health Education
 
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptxExploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
Exploring_the_Narrative_Style_of_Amitav_Ghoshs_Gun_Island.pptx
 
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
TỔNG ÔN TẬP THI VÀO LỚP 10 MÔN TIẾNG ANH NĂM HỌC 2023 - 2024 CÓ ĐÁP ÁN (NGỮ Â...
 
Food safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdfFood safety_Challenges food safety laboratories_.pdf
Food safety_Challenges food safety laboratories_.pdf
 
Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)Jamworks pilot and AI at Jisc (20/03/2024)
Jamworks pilot and AI at Jisc (20/03/2024)
 
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptxHMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
HMCS Max Bernays Pre-Deployment Brief (May 2024).pptx
 
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
80 ĐỀ THI THỬ TUYỂN SINH TIẾNG ANH VÀO 10 SỞ GD – ĐT THÀNH PHỐ HỒ CHÍ MINH NĂ...
 
How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17How to Add a Tool Tip to a Field in Odoo 17
How to Add a Tool Tip to a Field in Odoo 17
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdfUnit 3 Emotional Intelligence and Spiritual Intelligence.pdf
Unit 3 Emotional Intelligence and Spiritual Intelligence.pdf
 
Philosophy of china and it's charactistics
Philosophy of china and it's charactisticsPhilosophy of china and it's charactistics
Philosophy of china and it's charactistics
 
latest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answerslatest AZ-104 Exam Questions and Answers
latest AZ-104 Exam Questions and Answers
 
Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)Accessible Digital Futures project (20/03/2024)
Accessible Digital Futures project (20/03/2024)
 
Wellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptxWellbeing inclusion and digital dystopias.pptx
Wellbeing inclusion and digital dystopias.pptx
 

Trust based video management framework for social multimedia networks

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Trust Based Video Management Framework For Social Multimedia Networks Abstract: Social Multimedia Networks (SMNs) have attracted much attention from both academia and industry due to their impact on our daily lives. The requirements of SMN users are increasing along with time, which make the satisfaction of those requirements a very challenging process. One important challenge facing SMNs consists of their internal users that can upload and manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and verifying content delivered to end-users is becoming a highly challenging process. So far, many researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein, the aim of this paper is to propose a framework that allows collaboration between humans and machines to ensure secure delivery of trusted videos content over SMNs while ensuring an optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the proposed framework consist in i) assigning to each user a level of trust based on his/her history, ii) creating an intelligent agent that decides which content can be automatically published on the network and which content should be reviewed or rejected, and iii) checking the videos’ integrity and delivery during the streaming process. Accordingly, we ensure that the trust level of the SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational Expenditures (OPEX) can be achieved. Index Terms—Social multimedia network, video streaming, trust model, and trust management. Existing System: users can easily discuss their ideas and opinions remotely, publish new articles, and meet new persons. Moreover, they have allowed business and organizations to advertise for their products over the world and to directly contact their customers. In addition to these social networks, other web applications, such as Youtube, Dailymotion, and Vimeo, have enabled the exchange of different contents, including text, images, and videos among different entities connected to their services. The evolution of the Internet and distributed systems has led researchers to implement applications that serve video on demand (VOD) on top of the peer-to-peer (P2P) networks.
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com VOD and videos live streaming systems are gaining momentum in SMN. They have enabled the appearance of many multimedia-centric services such as video conferencing applications, online meeting applications, massive open online courses (MOOC) as well as other use cases in e- health and e-teaching. Such services attract and connect millions of users worldwide. The providers of these services have enabled countless features that allow users to interact among themselves by creating and sharing different contents (e.g, videos, text, and images). However, by allowing this, the nodes composing the social networks, users and machines, generate a huge amount of data, which can be uncontrolled, unsecured and untrusted . Such amount of generated data are causing a congestion to the networks and posing a new security challenge to the service providers: it becomes hard to handle and analyze all content traversing their networks. To tackle this problem, many research efforts have been conducted so far for mitigating the upload of malicious data to SMNs. Proposed system: Diverse data analytics applications have been proposed and developed with the goal to create a trustworthy SMN. The researchers’ vision of trustworthy SMNs lies in achieving certainty, authenticity, and security of data exchanged throughout social network nodes. In this vein, many trust models and reputation systems have emerged with the goal to limit the spread of unsecured data. Generally, trust models and reputation systems are designed to assign a score to each entity in the network and establish trust among them. This score may help users to make a proper decision on buying an item from an online store, selecting a service provider or recommending a service to other users. Additionally, the trust score provides decisional systems with the needed information to execute adequate actions, such as the implementation of certain policies that restraint an entity from using some resources or accessing some services. The main features that should be taken into consideration while defining a trust model are as follows: User history: The only way to predict user behavior is to study and analyze all generated content by different users during their interactions in the network . The user history records may contain relations and links between data, these links are valuable for the data analytics applications in order to offer a good user experience. Trust calculation: A user’s level of trust is one of the important metrics that should be taken into consideration when analyzing users’ data. The computation of this value includes the selection of various parameters that characterize the manipulated data. For this reason, there is a need to suggest a realistic model that can capture the characteristics of uploaded data based on the historical behavior of users. Users collaboration: Based on the observation that human intelligence is one of the main keys to effectively detect and remove untrusted data, many algorithms and applications have been recently devised for detecting and measuring users’ collaborations rate. These algorithms and
  • 3. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com applications allow users to rate different social multimedia items. Then, the system is able to collect these feedbacks, applies some filtering methods and executes different needed actions. Secure content delivery: In a trustworthy social network, every bit of data should be under control. In other words, starting from any node in the network (e.g, user, mobile, or server), the path that the data take to arrive at another node should be secured. System Architecture: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • PROCESSOR : I3. • Hard Disk : 40 GB. • Ram : 2 GB. SOFTWARE REQUIREMENTS: • Operating system : Windows.
  • 4. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com • Coding Language : JAVA/J2EE • Data Base : MYSQL • IDE :Netbeans8.1