SlideShare a Scribd company logo
IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613
All rights reserved by www.ijsrd.com 75
Trustworthy Service Enhancement in Mobile Social Network
Ms. Deepa Bagde1
Prof. Sulabha Patil2
1
M. Tech Student 2
Assistant Professor
1,2
Department of Computer Science and Engineering
1,2
Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur, India
Abstract— Mobile Social Network is network which allows
mobile users to discover and interact with existing and
potential friends. A Trustworthy Service Evaluation (TSE)
system is a system that enables users to share service
reviews in Service oriented mobile social networks (S-
MSNs). Each service provider should independently
maintain a TSE for itself that collects and stores users’
reviews about its services without requiring any third trusted
authority. These service reviews can be made available to
interested users to make service selection decisions. In this
three unique service review attacks are identified, i.e., link
ability, rejection, and modification attacks, and then develop
security mechanisms for the TSE to deal with these attacks.
In this we extend the bTSE(basic TSE) to a Sybil-resisted
TSE (SrTSE) which enable the detection of two typical sybil
attacks. In SrTSE if a user generates multiple reviews
toward a vendor in a predefined time slot with different
pseudonyms, the real identity of that user will be revealed.
Hence a Trustworthy Service in Mobile Social Network is
introduces so that users can access services securely.
Key words: Mobile social networks trust evaluation, Sybil
attack, and distributed system.
I. INTRODUCTION
Trustworthy service evaluation (TSE) systems [7] enable the
service providers or any third authority to receive user
feedback, such as service reviews or simply reviews, as
compliments and complaints about their services. By using
the TSE, the service providers come to know the service
experiences of the users and are able to improve the service
strategy in time. The collected reviews can then be made
available to the public, which enhances service advertising
and assists the users in making wise service selections. The
TSE is maintained by a third trusted authority that is trusted
to host authentic reviews. Popular TSE can found in web
based social networks such as Facebook and eBay. They are
important marketing tools for service providers who target
the global market. In this paper, we move the TSE into the
S-MSN settings. We require service providers to maintain
the TSE by themselves. In the meantime, we consider the
users participate in the TSE in a cooperative manner.
In the S-MSNs, service providers offer location
based services to local users and attract the users by various
advertising approaches, for example, sending e-flyers to the
nearby passengers via wireless connections. With a higher
reputation, a service provider is likely to be chosen by the
users. However, the S-MSNs are autonomous and
distributed networks where no third trusted authority needed
for bootstrapping the trust relations. Therefore, for the users
in the S-MSNs, enable the trust evaluation of the service
providers that is a challenging problem. Location-based
services now emerge as an imperative need of mobile users.
It can be integrated into various types of networks to obtain
promising applications while their implementation has many
outstanding and independent research issues.
In the design of the TSE for the S-MSN, security
mechanisms must be included for these attacks. Notorious
Sybil attacks [5], [6], [7], [8] cause damage to the
effectiveness of the TSE. The multiple pseudonym
techniques [9] are adopted in many distributed networking
systems for privacy preservation and locations of users. On
the one hand, users are able to frequently change their
pseudonyms to prevent the linkage of their behaviors at
different time/location. Their behavior cannot be tracked as
well as their personal information cannot be disclosed. As a
result, they are more willing to use mobile applications.
We consider S-MSN composed of static vendors
and mobile users that. Each vendor should equip with a
wireless communication device that is having a large storage
space [4]. In the TSE, vendor stores and disseminates
service information to the users. Without in-network third
authorities in the SMSN, vendor is required to manage
reviews for themselves. These requirements bring unique
security problems to the review submission process. For
example, vendors can reject or delete negative reviews and
insert forged positive ones, and the malicious users may
leave false negative reviews or drop reviews from others to
decrease reputation of some particular vendors. In design of
the TSE for S-MSN, security mechanisms are included to
resist these attacks. In the design of TSE for the S-MSN,
security is present to deal with these attacks. Under Sybil
attacks, the bTSE cannot work as expected because single
user can abuse pseudonyms to generate multiple unlikable
false reviews in a short time.
II. LITERATURE SURVEY
Mobile social networks extend social networks in the by
allowing mobile users to discover and interact with existing
and potential friends. Despite their promise to enable
exciting applications, serious security and privacy concerns
have hindered wide adoption of these networks [1].
A. Secure Friend Discovery
An important capability offered by mobile social networks
is that to allow mobile users to discover and interact with
friends. Suppose you are waiting for your flight in an airport
and your mobile phone discovers your friend’s friend is in
the next aisle and you can talk with face-to-face. Or you
visit a new place and your mobile phone finds someone in
your vicinity shares similar attributes as you so that you can
interact with. Suppose you are waiting for your flight in an
airport and your mobile phone discovers your friend’s friend
is in the next aisle and you can talk with face-to-face. Or
you visit a new place and your mobile phone finds someone
in your vicinity shares similar attributes as you so that you
can interact with.
One way to address the privacy and security issues
is to take advantage of a trusted central server, which
collects information from individual users, computes and
disseminates the proximity results on demand. Server-based
Trustworthy Service Enhancement in Mobile Social Network
(IJSRD/Vol. 2/Issue 08/2014/019)
All rights reserved by www.ijsrd.com 76
solution is not suitable for mobile social networks for the
following reasons. First, users in a mobile social network
may not have direct access to a computer or the Internet.
B. Dynamic Privacy-Preserving Key Management
For vehicle user’s privacy preservation to improve key
update efficiency of location based services (LBSs) in
vehicular ad -hoc networks (VANETs), we propose a
dynamic privacy-preserving key management scheme,
called DIKE. We divide session into several time slots so t
each time slot holds a different key, when no vehicle user
departs from the service session. In this also integrate a
novel dynamic threshold technique in traditional V-2-V and
V-2-I communications to achieve session key’s backward-
secrecy. Performance evaluations for extensive simulations
demonstrate the efficiency and effectiveness of the proposed
DIKE scheme for low key update delay and fast key update
ratio.
In this paper, we achieve vehicle user’s privacy
Preservation and to improve the key update efficiency. In
this a Dynamic privacy-preserving Key management
scheme, called DIKE, for the LBSs in VANETs. With this
scheme, each user can use a pseudo-id to conceal its real
identity during a service session. First, introduce a privacy-
preserving authentication (PPA) mechanism, which can
derive from an efficient group Signature.
However, each vehicle user can hold multiple
pseudonyms; so cannot prevent a compromised but
unrevoked vehicle user to do double registration in the same
session. That’s why we divide a session into several time
slots, and each time slot can hold a different session key.
When no vehicle departs from the service session, each
joined user use forward-secrecy technique to autonomously
update new session key to reduce key update delay. To
achieve backward-secrecy, we integrate a novel dynamic
threshold technique in traditional V-2-V and V-2-I
communications.
C. The Sybil Attack
The Sybil attack was first introduced by Douceur in the
context of peer-to-peer networks. In this, we investigate the
Sybil attack, which is a harmful attack in sensor networks.
In Sybil attack, a malicious node behaves like it was a larger
number of nodes, like by impersonating other nodes or
simply by claiming false identities. We propose novel
techniques to defend against Sybil attack, and analyze their
effectiveness properly. In this paper, we examine how the
Sybil attack can used to attack several protocols in wireless
sensor network. So first consider attacks on distributed
storage an algorithm, similar to the Douceur describes in the
peer-to-peer environment.
To defend the Sybil attack, we can value that each
node identity is an identity presented by the corresponding
physical node. There are two types to validate an identity we
define the Sybil attack and establish taxonomy of that attack
by distinguishing different attack types. The definition and
taxonomy are important in understanding and analyzing the
threat that defenses of Sybil attack. We present several
novel methods by which a node can be verified whether
other identities are Sybil identities.
A Sybil attack is like computer hacker attack on a
peer-to-peer (P2P) network. It is named by the novel Sybil,
which recounts medical treatment of a woman with extreme
dissociative identity disorder. The attack target only
reputation system of the P2P program and also allows the
hacker to have an unfair advantage in influencing the
reputation and the score of files stored on the P2P network.
Several factors determine that how a Sybil attack can be
equally affects the reputation system and how easy it is to
make an entity; finally whether the program accepts non-
trusted entities and their input. Validating accounts can be
the best way for administrators to prevent these kinds of
attacks, but this sacrifices the anonymity of users.
III. PROPOSED SYSTEM
In the proposed system, we are requiring service providers
that will maintain the TSE by themselves. In this, we
consider the users that participate in the TSE in a
cooperative manner. So we are going to study possible
malicious behaviors that are conducted by the service
providers and users.
Due to the proposed system, there are advantages
that offer the user of the services, it identifies three unique
review attacks, i.e., review link ability attack, review
rejection attack, and review modification attack in the bTSE
each user should firstly register in the social network and
then they can use the services provided by the service
provider. Similarly each service provider should also
provide their credentials to register in a social network.
After using the services the user should also
provide reviews for every service. So that the users who
wanted to use that services should get the idea about that
service.
As the system is trustworthy so each service
provider and user should provide valid credentials. The
system uses the Ranking technique for making the ranking
easy. Using the TSE, service providers learn that the service
experiences of the users and that are able to improve their
service strategy in time. The collected reviews can then
make available to the public, which are enhances service
advertising and helpful the users in making wise service
selections. They are important tools for service providers
who target the global market. In this, we move the TSE into
the S-MSN settings. Each user should firstly register in the
social network and then they can use the services provided
by the service provider. Similarly each service provider
should also provide their credentials to register in a social
network. We develop security mechanisms for the TSE to
deal with the attacks that are arise during mobile social
network. The basic TSE (bTSE) is enables users to
distribute and cooperatively should submit their reviews in
an integrated chain form by using hierarchical and aggregate
signature techniques. It restricts the service providers to
reject, modify, or delete the reviews. Thus, the integrity and
authenticity of reviews are improved. Further, we extend the
bTSE to a Sybil-resisted TSE (SrTSE) to enable the
detection of two types of Sybil attacks. In the SrTSE, if a
user generates multiple reviews toward a vendor in a time
slot with different pseudonyms, the real identity of the user
will be revealed. Through security analysis and numerical
results, we show that the bTSE and the SrTSE effectively
resist the service review attacks and the SrTSE additionally
detects the Sybil attacks in an efficient manner.
Through performance evaluation, we show that the
bTSE achieves better performance in terms of submission
Trustworthy Service Enhancement in Mobile Social Network
(IJSRD/Vol. 2/Issue 08/2014/019)
All rights reserved by www.ijsrd.com 77
rate and delay than a service review system that does not
adopt user cooperation. First, users in a mobile social
network cannot have direct Access to service providers or
any third trusted authority to receive user feedback that is
service reviews or simply reviews, such as compliments and
complaints about their services or products.
IV. CONCLUSIONS
In this paper, we proposed a TSE system for S-MSNs. The
system uses hierarchical signature and aggregate signature
techniques to transform independent reviews into structured
review chains. This transformation includes distributed user
cooperation, which improves review integrity and
significantly reduces vendors’ modification capability. We
have presented three review attacks which shows that the
bTSE can effectively resist review attacks without relying
on a third trusted authority. Construction of pseudonyms and
the secret keys in the bTSE, and obtained a SrTSE system.
REFERENCES
[1] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure
Friend Discovery in Mobile Social Networks,” Proc.
IEEE INFOCOM, pp. 1647-1655, 2011.
[2] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Seer: A
Secure and Efficient Service Review System for
Service-Oriented Mobile Social Networks,” Proc.
IEEE 32nd Int’l Conf. Distributed Computing
Systems (ICDCS), pp. 647-656, 2012.
[3] X. Liang, X. Li, T. Luan, R. Lu, X. Lin, and X. Shen,
“Morality- Driven Data Forwarding with Privacy
Preservation in Mobile Social Networks,” IEEE
Trans. Vehicular Technology, vol. 61, no. 7, pp.
3209-3222, Sept. 2012.
[4] T.H. Luan, L.X. Cai, J. Chen, X. Shen, and F. Bai,
“VTube: Towards the Media Rich City Life with
Autonomous Vehicular Content Distribution,” Proc.
IEEE CS Eighth Ann. Conf. Sensor, Mesh and Ad
Hoc Comm. Networks (SECON), pp. 359-367, 2011.
[5] J.R. Douceur, “The Sybil Attack,” Proc. Revised
Papers First Int’l Workshop Peer-to-Peer Systems
(IPTPS), pp. 251-260, 2002.
[6] Newsome, E. Shi, D.X. Song, and A. Perrig, “The
Sybil Attack in Sensor Networks: Analysis &
Defenses,” Proc. Third Int’l Symp. Information
Processing in Sensor Networks (IPSN), pp. 259-268,
2004.
[7] Quercia and S. Hailes, “Sybil Attacks Against Mobile
Users: Friends and Foes to the Rescue,” Proc. IEEE
INFOCOM, pp. 336- 340, 2010.
[8] R. Lu, X. Lin, X. Liang, and X. Shen, “A Dynamic
Privacy- Preserving Key Management Scheme for
Location-Based Services in VANETs,” IEEE Trans.
Intelligent Transportation Systems, vol. 13, no. 1, pp.
127-139, Mar. 2012.
[9] R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen,
“Pseudonym Changing at Social Spots: An Effective
Strategy for Location Privacy in VANETs,” IEEE
Trans. Vehicular Technology, vol. 61, no. 1, pp. 86-
96, Jan. 2012.
[10] X. Boyen and B. Waters, “Full-Domain Subgroup
Hiding and Constant-Size Group Signatures,” Proc.
10th Int’l Conf. Practice and Theory Public Key
Cryptography, pp. 1-15, 2007.

More Related Content

What's hot

Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
Uvaraj Shan
 
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
IEEEFINALYEARPROJECTS
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
IJNSA Journal
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
IJERA Editor
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET Journal
 
VANET Trust
VANET TrustVANET Trust
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secureUvaraj Shan
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
eSAT Publishing House
 
I03402059063
I03402059063I03402059063
I03402059063
theijes
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsCovid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Gokul Alex
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Telefónica
 
Do4301690695
Do4301690695Do4301690695
Do4301690695
IJERA Editor
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
IJERA Editor
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
IRJET Journal
 
Method to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has FailedMethod to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has Failed
Association of Scientists, Developers and Faculties
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
Chema Alonso
 
An approach to revoke blacklisted anonymous credential users through ttp
An approach to revoke blacklisted anonymous credential users through ttpAn approach to revoke blacklisted anonymous credential users through ttp
An approach to revoke blacklisted anonymous credential users through ttpIAEME Publication
 

What's hot (17)

Two aspect authentication system using secure mobile
Two aspect authentication system using secure mobileTwo aspect authentication system using secure mobile
Two aspect authentication system using secure mobile
 
Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...Privacy preserving distributed profile matching in proximity-based mobile soc...
Privacy preserving distributed profile matching in proximity-based mobile soc...
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
Android Based Total Security for System Authentication
Android Based Total Security for System AuthenticationAndroid Based Total Security for System Authentication
Android Based Total Security for System Authentication
 
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning AlgorithmsIRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
IRJET- Security Attacks Detection in Cloud using Machine Learning Algorithms
 
VANET Trust
VANET TrustVANET Trust
VANET Trust
 
Two aspect authentication system using secure
Two aspect authentication system using secureTwo aspect authentication system using secure
Two aspect authentication system using secure
 
Brisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communicationBrisk and secure ad hoc vehicular communication
Brisk and secure ad hoc vehicular communication
 
I03402059063
I03402059063I03402059063
I03402059063
 
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity ProtocolsCovid19 ContactTracing - Privacy Preserving Proximity Protocols
Covid19 ContactTracing - Privacy Preserving Proximity Protocols
 
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO  PREVENT ATTACKS AGAINST...
Us20140380431 Patent: COMPUTER IMPLEMENTED METHOD TO PREVENT ATTACKS AGAINST...
 
Do4301690695
Do4301690695Do4301690695
Do4301690695
 
An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...An Overview on Authentication Approaches and Their Usability in Conjunction w...
An Overview on Authentication Approaches and Their Usability in Conjunction w...
 
Smart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal systemSmart-Authentication: A secure web service for providing bus pass renewal system
Smart-Authentication: A secure web service for providing bus pass renewal system
 
Method to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has FailedMethod to Provide Mobile Signal when the Network Provider Has Failed
Method to Provide Mobile Signal when the Network Provider Has Failed
 
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
New Paradigms of Digital Identity: Authentication & Authorization as a Servic...
 
An approach to revoke blacklisted anonymous credential users through ttp
An approach to revoke blacklisted anonymous credential users through ttpAn approach to revoke blacklisted anonymous credential users through ttp
An approach to revoke blacklisted anonymous credential users through ttp
 

Viewers also liked

Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
ijsrd.com
 
Optimization of Machining Parameters for Turned Parts Through Taguchi’...
Optimization of Machining Parameters for Turned Parts Through Taguchi’...Optimization of Machining Parameters for Turned Parts Through Taguchi’...
Optimization of Machining Parameters for Turned Parts Through Taguchi’...
ijsrd.com
 
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
A Review on Parametric Programming Techniques Utilized For Advanced CNC MachinesA Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
ijsrd.com
 
A Study on Quality of Work Life
A Study on Quality of Work LifeA Study on Quality of Work Life
A Study on Quality of Work Life
ijsrd.com
 
A Review on Design of a Fixture for Rear Cover
A Review on Design of a Fixture for Rear CoverA Review on Design of a Fixture for Rear Cover
A Review on Design of a Fixture for Rear Cover
ijsrd.com
 
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
ijsrd.com
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
ijsrd.com
 
Involute Spline Profile Generation using Wire EDM Process
Involute Spline Profile Generation using Wire EDM ProcessInvolute Spline Profile Generation using Wire EDM Process
Involute Spline Profile Generation using Wire EDM Process
ijsrd.com
 
Review of Implementation of lean manufacturing in cement industry
Review of Implementation of lean manufacturing in cement industryReview of Implementation of lean manufacturing in cement industry
Review of Implementation of lean manufacturing in cement industry
ijsrd.com
 
Study of Case-Based Reasoning System
Study of Case-Based Reasoning SystemStudy of Case-Based Reasoning System
Study of Case-Based Reasoning System
ijsrd.com
 
Real World Application of Big Data In Data Mining Tools
Real World Application of Big Data In Data Mining ToolsReal World Application of Big Data In Data Mining Tools
Real World Application of Big Data In Data Mining Tools
ijsrd.com
 
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
ijsrd.com
 
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cell
Generation of Electricity Using Paper Waste Water by Microbial Fuel CellGeneration of Electricity Using Paper Waste Water by Microbial Fuel Cell
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cell
ijsrd.com
 
Parallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching ModelParallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching Model
ijsrd.com
 
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
ijsrd.com
 
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPICSpeed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
ijsrd.com
 
Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...
ijsrd.com
 
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODELCOMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
ijsrd.com
 
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
Combustion and Mixing Analysis of a Scramjet Combustor Using CFDCombustion and Mixing Analysis of a Scramjet Combustor Using CFD
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
ijsrd.com
 

Viewers also liked (19)

Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
Drinking Water Quality Assessment of Commercial Areas in Shivamogga Town usin...
 
Optimization of Machining Parameters for Turned Parts Through Taguchi’...
Optimization of Machining Parameters for Turned Parts Through Taguchi’...Optimization of Machining Parameters for Turned Parts Through Taguchi’...
Optimization of Machining Parameters for Turned Parts Through Taguchi’...
 
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
A Review on Parametric Programming Techniques Utilized For Advanced CNC MachinesA Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
A Review on Parametric Programming Techniques Utilized For Advanced CNC Machines
 
A Study on Quality of Work Life
A Study on Quality of Work LifeA Study on Quality of Work Life
A Study on Quality of Work Life
 
A Review on Design of a Fixture for Rear Cover
A Review on Design of a Fixture for Rear CoverA Review on Design of a Fixture for Rear Cover
A Review on Design of a Fixture for Rear Cover
 
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
An Experimental Investigation on Strength Behavior of Concrete by Replacing N...
 
Back-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANETBack-Bone Assisted HOP Greedy Routing for VANET
Back-Bone Assisted HOP Greedy Routing for VANET
 
Involute Spline Profile Generation using Wire EDM Process
Involute Spline Profile Generation using Wire EDM ProcessInvolute Spline Profile Generation using Wire EDM Process
Involute Spline Profile Generation using Wire EDM Process
 
Review of Implementation of lean manufacturing in cement industry
Review of Implementation of lean manufacturing in cement industryReview of Implementation of lean manufacturing in cement industry
Review of Implementation of lean manufacturing in cement industry
 
Study of Case-Based Reasoning System
Study of Case-Based Reasoning SystemStudy of Case-Based Reasoning System
Study of Case-Based Reasoning System
 
Real World Application of Big Data In Data Mining Tools
Real World Application of Big Data In Data Mining ToolsReal World Application of Big Data In Data Mining Tools
Real World Application of Big Data In Data Mining Tools
 
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
Study of Solar Interplanetary and Geomagnetic Disturbances in Solar Cycle 23
 
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cell
Generation of Electricity Using Paper Waste Water by Microbial Fuel CellGeneration of Electricity Using Paper Waste Water by Microbial Fuel Cell
Generation of Electricity Using Paper Waste Water by Microbial Fuel Cell
 
Parallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching ModelParallel Key Value Pattern Matching Model
Parallel Key Value Pattern Matching Model
 
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
Carbon Nano tubes and its Applications in the Field of Electronics and Comput...
 
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPICSpeed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
Speed Control of BLDC Motor with Four Quadrant Operation Using dsPIC
 
Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...Reality based mobility model Analyzed over reactive and proactive routing pro...
Reality based mobility model Analyzed over reactive and proactive routing pro...
 
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODELCOMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
COMPARISION OF SINGLE PHASE AND FOUR PHASE BOOST CONVERTER FOR CLOSED LOOP MODEL
 
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
Combustion and Mixing Analysis of a Scramjet Combustor Using CFDCombustion and Mixing Analysis of a Scramjet Combustor Using CFD
Combustion and Mixing Analysis of a Scramjet Combustor Using CFD
 

Similar to Trustworthy Service Enhancement in Mobile Social Network

enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
swathi78
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
IRJET Journal
 
A017130104
A017130104A017130104
A017130104
IOSR Journals
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
IOSR Journals
 
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing NetworksNYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
rahulmonikasharma
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
IJNSA Journal
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET Journal
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
AM Publications
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Editor IJCATR
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
ijsptm
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
ijcnes
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
Alexander Decker
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
IJCI JOURNAL
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
IRJET Journal
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
ijwscjournal
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Control
ijwscjournal
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Control
ijwscjournal
 
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksTrust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
Venkat Projects
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET Journal
 

Similar to Trustworthy Service Enhancement in Mobile Social Network (20)

enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...enabling trustworthy service evaluation in service-oriented mobile social net...
enabling trustworthy service evaluation in service-oriented mobile social net...
 
Trust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud EnvironmentTrust Based Management with User Feedback Service in Cloud Environment
Trust Based Management with User Feedback Service in Cloud Environment
 
A017130104
A017130104A017130104
A017130104
 
Identified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud ComputingIdentified Vulnerabilitis And Threats In Cloud Computing
Identified Vulnerabilitis And Threats In Cloud Computing
 
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing NetworksNYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
NYMBLE: Servers Overcrowding Disobedient Users in Anonymizing Networks
 
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUSTSECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
SECURING MOBILE AGENTS IN MANET AGAINST ATTACKS USING TRUST
 
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
Vulnerability Analysis of 802.11 Authentications and Encryption Protocols: CV...
 
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
Evasion Streamline Intruders Using Graph Based Attacker model Analysis and Co...
 
Measuring privacy in online social
Measuring privacy in online socialMeasuring privacy in online social
Measuring privacy in online social
 
Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...Wireless Information Security System via Role based Access Control Pattern Us...
Wireless Information Security System via Role based Access Control Pattern Us...
 
An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...An improvement to trust based cross layer security protocol against sybil att...
An improvement to trust based cross layer security protocol against sybil att...
 
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMSA SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
A SECURE SCHEMA FOR RECOMMENDATION SYSTEMS
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
azd document
azd documentazd document
azd document
 
International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)International Journal on Web Service Computing (IJWSC)
International Journal on Web Service Computing (IJWSC)
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Control
 
A Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access ControlA Literature Review on Trust Management in Web Services Access Control
A Literature Review on Trust Management in Web Services Access Control
 
Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksTrust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
 
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack DetectionIRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
IRJET- Phishdect & Mitigator: SDN based Phishing Attack Detection
 

More from ijsrd.com

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
ijsrd.com
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
ijsrd.com
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
ijsrd.com
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
ijsrd.com
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
ijsrd.com
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
ijsrd.com
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
ijsrd.com
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
ijsrd.com
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
ijsrd.com
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
ijsrd.com
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
ijsrd.com
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
ijsrd.com
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
ijsrd.com
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
ijsrd.com
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
ijsrd.com
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
ijsrd.com
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
ijsrd.com
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
ijsrd.com
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
ijsrd.com
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
ijsrd.com
 

More from ijsrd.com (20)

IoT Enabled Smart Grid
IoT Enabled Smart GridIoT Enabled Smart Grid
IoT Enabled Smart Grid
 
A Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of ThingsA Survey Report on : Security & Challenges in Internet of Things
A Survey Report on : Security & Challenges in Internet of Things
 
IoT for Everyday Life
IoT for Everyday LifeIoT for Everyday Life
IoT for Everyday Life
 
Study on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOTStudy on Issues in Managing and Protecting Data of IOT
Study on Issues in Managing and Protecting Data of IOT
 
Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...Interactive Technologies for Improving Quality of Education to Build Collabor...
Interactive Technologies for Improving Quality of Education to Build Collabor...
 
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...Internet of Things - Paradigm Shift of Future Internet Application for Specia...
Internet of Things - Paradigm Shift of Future Internet Application for Specia...
 
A Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's LifeA Study of the Adverse Effects of IoT on Student's Life
A Study of the Adverse Effects of IoT on Student's Life
 
Pedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language LearningPedagogy for Effective use of ICT in English Language Learning
Pedagogy for Effective use of ICT in English Language Learning
 
Virtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation SystemVirtual Eye - Smart Traffic Navigation System
Virtual Eye - Smart Traffic Navigation System
 
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...Ontological Model of Educational Programs in Computer Science (Bachelor and M...
Ontological Model of Educational Programs in Computer Science (Bachelor and M...
 
Understanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart RefrigeratorUnderstanding IoT Management for Smart Refrigerator
Understanding IoT Management for Smart Refrigerator
 
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
DESIGN AND ANALYSIS OF DOUBLE WISHBONE SUSPENSION SYSTEM USING FINITE ELEMENT...
 
A Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processingA Review: Microwave Energy for materials processing
A Review: Microwave Energy for materials processing
 
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web LogsWeb Usage Mining: A Survey on User's Navigation Pattern from Web Logs
Web Usage Mining: A Survey on User's Navigation Pattern from Web Logs
 
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEMAPPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
APPLICATION OF STATCOM to IMPROVED DYNAMIC PERFORMANCE OF POWER SYSTEM
 
Making model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point TrackingMaking model of dual axis solar tracking with Maximum Power Point Tracking
Making model of dual axis solar tracking with Maximum Power Point Tracking
 
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
A REVIEW PAPER ON PERFORMANCE AND EMISSION TEST OF 4 STROKE DIESEL ENGINE USI...
 
Study and Review on Various Current Comparators
Study and Review on Various Current ComparatorsStudy and Review on Various Current Comparators
Study and Review on Various Current Comparators
 
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
Reducing Silicon Real Estate and Switching Activity Using Low Power Test Patt...
 
Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.Defending Reactive Jammers in WSN using a Trigger Identification Service.
Defending Reactive Jammers in WSN using a Trigger Identification Service.
 

Recently uploaded

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
Peter Windle
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
Jisc
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
vaibhavrinwa19
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
Jisc
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
beazzy04
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
Pavel ( NSTU)
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
Mohd Adib Abd Muin, Senior Lecturer at Universiti Utara Malaysia
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
TechSoup
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
TechSoup
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
timhan337
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
Peter Windle
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
Vikramjit Singh
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
Jean Carlos Nunes Paixão
 

Recently uploaded (20)

Embracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic ImperativeEmbracing GenAI - A Strategic Imperative
Embracing GenAI - A Strategic Imperative
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Supporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptxSupporting (UKRI) OA monographs at Salford.pptx
Supporting (UKRI) OA monographs at Salford.pptx
 
Acetabularia Information For Class 9 .docx
Acetabularia Information For Class 9  .docxAcetabularia Information For Class 9  .docx
Acetabularia Information For Class 9 .docx
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...How libraries can support authors with open access requirements for UKRI fund...
How libraries can support authors with open access requirements for UKRI fund...
 
Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345Sha'Carri Richardson Presentation 202345
Sha'Carri Richardson Presentation 202345
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Synthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptxSynthetic Fiber Construction in lab .pptx
Synthetic Fiber Construction in lab .pptx
 
Chapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptxChapter 3 - Islamic Banking Products and Services.pptx
Chapter 3 - Islamic Banking Products and Services.pptx
 
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup   New Member Orientation and Q&A (May 2024).pdfWelcome to TechSoup   New Member Orientation and Q&A (May 2024).pdf
Welcome to TechSoup New Member Orientation and Q&A (May 2024).pdf
 
Introduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp NetworkIntroduction to AI for Nonprofits with Tapp Network
Introduction to AI for Nonprofits with Tapp Network
 
Honest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptxHonest Reviews of Tim Han LMA Course Program.pptx
Honest Reviews of Tim Han LMA Course Program.pptx
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
A Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in EducationA Strategic Approach: GenAI in Education
A Strategic Approach: GenAI in Education
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
Digital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and ResearchDigital Tools and AI for Teaching Learning and Research
Digital Tools and AI for Teaching Learning and Research
 
Lapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdfLapbook sobre os Regimes Totalitários.pdf
Lapbook sobre os Regimes Totalitários.pdf
 

Trustworthy Service Enhancement in Mobile Social Network

  • 1. IJSRD - International Journal for Scientific Research & Development| Vol. 2, Issue 08, 2014 | ISSN (online): 2321-0613 All rights reserved by www.ijsrd.com 75 Trustworthy Service Enhancement in Mobile Social Network Ms. Deepa Bagde1 Prof. Sulabha Patil2 1 M. Tech Student 2 Assistant Professor 1,2 Department of Computer Science and Engineering 1,2 Tulsiramji Gaikwad Patil College of Engineering and Technology Nagpur, India Abstract— Mobile Social Network is network which allows mobile users to discover and interact with existing and potential friends. A Trustworthy Service Evaluation (TSE) system is a system that enables users to share service reviews in Service oriented mobile social networks (S- MSNs). Each service provider should independently maintain a TSE for itself that collects and stores users’ reviews about its services without requiring any third trusted authority. These service reviews can be made available to interested users to make service selection decisions. In this three unique service review attacks are identified, i.e., link ability, rejection, and modification attacks, and then develop security mechanisms for the TSE to deal with these attacks. In this we extend the bTSE(basic TSE) to a Sybil-resisted TSE (SrTSE) which enable the detection of two typical sybil attacks. In SrTSE if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Hence a Trustworthy Service in Mobile Social Network is introduces so that users can access services securely. Key words: Mobile social networks trust evaluation, Sybil attack, and distributed system. I. INTRODUCTION Trustworthy service evaluation (TSE) systems [7] enable the service providers or any third authority to receive user feedback, such as service reviews or simply reviews, as compliments and complaints about their services. By using the TSE, the service providers come to know the service experiences of the users and are able to improve the service strategy in time. The collected reviews can then be made available to the public, which enhances service advertising and assists the users in making wise service selections. The TSE is maintained by a third trusted authority that is trusted to host authentic reviews. Popular TSE can found in web based social networks such as Facebook and eBay. They are important marketing tools for service providers who target the global market. In this paper, we move the TSE into the S-MSN settings. We require service providers to maintain the TSE by themselves. In the meantime, we consider the users participate in the TSE in a cooperative manner. In the S-MSNs, service providers offer location based services to local users and attract the users by various advertising approaches, for example, sending e-flyers to the nearby passengers via wireless connections. With a higher reputation, a service provider is likely to be chosen by the users. However, the S-MSNs are autonomous and distributed networks where no third trusted authority needed for bootstrapping the trust relations. Therefore, for the users in the S-MSNs, enable the trust evaluation of the service providers that is a challenging problem. Location-based services now emerge as an imperative need of mobile users. It can be integrated into various types of networks to obtain promising applications while their implementation has many outstanding and independent research issues. In the design of the TSE for the S-MSN, security mechanisms must be included for these attacks. Notorious Sybil attacks [5], [6], [7], [8] cause damage to the effectiveness of the TSE. The multiple pseudonym techniques [9] are adopted in many distributed networking systems for privacy preservation and locations of users. On the one hand, users are able to frequently change their pseudonyms to prevent the linkage of their behaviors at different time/location. Their behavior cannot be tracked as well as their personal information cannot be disclosed. As a result, they are more willing to use mobile applications. We consider S-MSN composed of static vendors and mobile users that. Each vendor should equip with a wireless communication device that is having a large storage space [4]. In the TSE, vendor stores and disseminates service information to the users. Without in-network third authorities in the SMSN, vendor is required to manage reviews for themselves. These requirements bring unique security problems to the review submission process. For example, vendors can reject or delete negative reviews and insert forged positive ones, and the malicious users may leave false negative reviews or drop reviews from others to decrease reputation of some particular vendors. In design of the TSE for S-MSN, security mechanisms are included to resist these attacks. In the design of TSE for the S-MSN, security is present to deal with these attacks. Under Sybil attacks, the bTSE cannot work as expected because single user can abuse pseudonyms to generate multiple unlikable false reviews in a short time. II. LITERATURE SURVEY Mobile social networks extend social networks in the by allowing mobile users to discover and interact with existing and potential friends. Despite their promise to enable exciting applications, serious security and privacy concerns have hindered wide adoption of these networks [1]. A. Secure Friend Discovery An important capability offered by mobile social networks is that to allow mobile users to discover and interact with friends. Suppose you are waiting for your flight in an airport and your mobile phone discovers your friend’s friend is in the next aisle and you can talk with face-to-face. Or you visit a new place and your mobile phone finds someone in your vicinity shares similar attributes as you so that you can interact with. Suppose you are waiting for your flight in an airport and your mobile phone discovers your friend’s friend is in the next aisle and you can talk with face-to-face. Or you visit a new place and your mobile phone finds someone in your vicinity shares similar attributes as you so that you can interact with. One way to address the privacy and security issues is to take advantage of a trusted central server, which collects information from individual users, computes and disseminates the proximity results on demand. Server-based
  • 2. Trustworthy Service Enhancement in Mobile Social Network (IJSRD/Vol. 2/Issue 08/2014/019) All rights reserved by www.ijsrd.com 76 solution is not suitable for mobile social networks for the following reasons. First, users in a mobile social network may not have direct access to a computer or the Internet. B. Dynamic Privacy-Preserving Key Management For vehicle user’s privacy preservation to improve key update efficiency of location based services (LBSs) in vehicular ad -hoc networks (VANETs), we propose a dynamic privacy-preserving key management scheme, called DIKE. We divide session into several time slots so t each time slot holds a different key, when no vehicle user departs from the service session. In this also integrate a novel dynamic threshold technique in traditional V-2-V and V-2-I communications to achieve session key’s backward- secrecy. Performance evaluations for extensive simulations demonstrate the efficiency and effectiveness of the proposed DIKE scheme for low key update delay and fast key update ratio. In this paper, we achieve vehicle user’s privacy Preservation and to improve the key update efficiency. In this a Dynamic privacy-preserving Key management scheme, called DIKE, for the LBSs in VANETs. With this scheme, each user can use a pseudo-id to conceal its real identity during a service session. First, introduce a privacy- preserving authentication (PPA) mechanism, which can derive from an efficient group Signature. However, each vehicle user can hold multiple pseudonyms; so cannot prevent a compromised but unrevoked vehicle user to do double registration in the same session. That’s why we divide a session into several time slots, and each time slot can hold a different session key. When no vehicle departs from the service session, each joined user use forward-secrecy technique to autonomously update new session key to reduce key update delay. To achieve backward-secrecy, we integrate a novel dynamic threshold technique in traditional V-2-V and V-2-I communications. C. The Sybil Attack The Sybil attack was first introduced by Douceur in the context of peer-to-peer networks. In this, we investigate the Sybil attack, which is a harmful attack in sensor networks. In Sybil attack, a malicious node behaves like it was a larger number of nodes, like by impersonating other nodes or simply by claiming false identities. We propose novel techniques to defend against Sybil attack, and analyze their effectiveness properly. In this paper, we examine how the Sybil attack can used to attack several protocols in wireless sensor network. So first consider attacks on distributed storage an algorithm, similar to the Douceur describes in the peer-to-peer environment. To defend the Sybil attack, we can value that each node identity is an identity presented by the corresponding physical node. There are two types to validate an identity we define the Sybil attack and establish taxonomy of that attack by distinguishing different attack types. The definition and taxonomy are important in understanding and analyzing the threat that defenses of Sybil attack. We present several novel methods by which a node can be verified whether other identities are Sybil identities. A Sybil attack is like computer hacker attack on a peer-to-peer (P2P) network. It is named by the novel Sybil, which recounts medical treatment of a woman with extreme dissociative identity disorder. The attack target only reputation system of the P2P program and also allows the hacker to have an unfair advantage in influencing the reputation and the score of files stored on the P2P network. Several factors determine that how a Sybil attack can be equally affects the reputation system and how easy it is to make an entity; finally whether the program accepts non- trusted entities and their input. Validating accounts can be the best way for administrators to prevent these kinds of attacks, but this sacrifices the anonymity of users. III. PROPOSED SYSTEM In the proposed system, we are requiring service providers that will maintain the TSE by themselves. In this, we consider the users that participate in the TSE in a cooperative manner. So we are going to study possible malicious behaviors that are conducted by the service providers and users. Due to the proposed system, there are advantages that offer the user of the services, it identifies three unique review attacks, i.e., review link ability attack, review rejection attack, and review modification attack in the bTSE each user should firstly register in the social network and then they can use the services provided by the service provider. Similarly each service provider should also provide their credentials to register in a social network. After using the services the user should also provide reviews for every service. So that the users who wanted to use that services should get the idea about that service. As the system is trustworthy so each service provider and user should provide valid credentials. The system uses the Ranking technique for making the ranking easy. Using the TSE, service providers learn that the service experiences of the users and that are able to improve their service strategy in time. The collected reviews can then make available to the public, which are enhances service advertising and helpful the users in making wise service selections. They are important tools for service providers who target the global market. In this, we move the TSE into the S-MSN settings. Each user should firstly register in the social network and then they can use the services provided by the service provider. Similarly each service provider should also provide their credentials to register in a social network. We develop security mechanisms for the TSE to deal with the attacks that are arise during mobile social network. The basic TSE (bTSE) is enables users to distribute and cooperatively should submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, we extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable the detection of two types of Sybil attacks. In the SrTSE, if a user generates multiple reviews toward a vendor in a time slot with different pseudonyms, the real identity of the user will be revealed. Through security analysis and numerical results, we show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the Sybil attacks in an efficient manner. Through performance evaluation, we show that the bTSE achieves better performance in terms of submission
  • 3. Trustworthy Service Enhancement in Mobile Social Network (IJSRD/Vol. 2/Issue 08/2014/019) All rights reserved by www.ijsrd.com 77 rate and delay than a service review system that does not adopt user cooperation. First, users in a mobile social network cannot have direct Access to service providers or any third trusted authority to receive user feedback that is service reviews or simply reviews, such as compliments and complaints about their services or products. IV. CONCLUSIONS In this paper, we proposed a TSE system for S-MSNs. The system uses hierarchical signature and aggregate signature techniques to transform independent reviews into structured review chains. This transformation includes distributed user cooperation, which improves review integrity and significantly reduces vendors’ modification capability. We have presented three review attacks which shows that the bTSE can effectively resist review attacks without relying on a third trusted authority. Construction of pseudonyms and the secret keys in the bTSE, and obtained a SrTSE system. REFERENCES [1] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure Friend Discovery in Mobile Social Networks,” Proc. IEEE INFOCOM, pp. 1647-1655, 2011. [2] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Seer: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks,” Proc. IEEE 32nd Int’l Conf. Distributed Computing Systems (ICDCS), pp. 647-656, 2012. [3] X. Liang, X. Li, T. Luan, R. Lu, X. Lin, and X. Shen, “Morality- Driven Data Forwarding with Privacy Preservation in Mobile Social Networks,” IEEE Trans. Vehicular Technology, vol. 61, no. 7, pp. 3209-3222, Sept. 2012. [4] T.H. Luan, L.X. Cai, J. Chen, X. Shen, and F. Bai, “VTube: Towards the Media Rich City Life with Autonomous Vehicular Content Distribution,” Proc. IEEE CS Eighth Ann. Conf. Sensor, Mesh and Ad Hoc Comm. Networks (SECON), pp. 359-367, 2011. [5] J.R. Douceur, “The Sybil Attack,” Proc. Revised Papers First Int’l Workshop Peer-to-Peer Systems (IPTPS), pp. 251-260, 2002. [6] Newsome, E. Shi, D.X. Song, and A. Perrig, “The Sybil Attack in Sensor Networks: Analysis & Defenses,” Proc. Third Int’l Symp. Information Processing in Sensor Networks (IPSN), pp. 259-268, 2004. [7] Quercia and S. Hailes, “Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue,” Proc. IEEE INFOCOM, pp. 336- 340, 2010. [8] R. Lu, X. Lin, X. Liang, and X. Shen, “A Dynamic Privacy- Preserving Key Management Scheme for Location-Based Services in VANETs,” IEEE Trans. Intelligent Transportation Systems, vol. 13, no. 1, pp. 127-139, Mar. 2012. [9] R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen, “Pseudonym Changing at Social Spots: An Effective Strategy for Location Privacy in VANETs,” IEEE Trans. Vehicular Technology, vol. 61, no. 1, pp. 86- 96, Jan. 2012. [10] X. Boyen and B. Waters, “Full-Domain Subgroup Hiding and Constant-Size Group Signatures,” Proc. 10th Int’l Conf. Practice and Theory Public Key Cryptography, pp. 1-15, 2007.