Impact Factor:6.549
 Scopus Suggested Journal: Tracking ID for this title suggestion is: 55EC484EE39417F0

International Journal
of Computer Engineering in Research Trends (IJCERT)

Scholarly, Peer-Reviewed, Open Access and Multidisciplinary




Welcome to IJCERT

International Journal of Computer Engineering in Research Trends. Scholarly, Peer-Reviewed, Open Access and Multidisciplinary

ISSN(Online):2349-7084                 Submit Paper    Check Paper Status    Conference Proposal

Back to Current Issues

In Service-Oriented MSN Providing Trustworthy Service Evaluation

D.RAMANJANEYULU, U.USHA RANI , , ,
Affiliations
M.Tech (CSE), Priyadarshini Institute of Technology & Science
Associate Professor ( Dept.of CSE), Priyadarshini Institute of Technology & Science
:NOT ASSIGNED


Abstract
In this paper, we are going to propose survey based administration assessment to empower clients to share administration audit in administration situated versatile interpersonal organization. Every administration supplier freely keeps up a TSE for itself, which gathers and stores clients' surveys about its administrations without requiring any third trusted power. The administration surveys can then be made accessible to intrigued clients in settling on savvy administration choice choices. This paper portrays how the audit related normal dangers are destroyed and makes these surveys more fitting and valid. It portrays two frameworks bTSE and SrTSE, these frameworks are depicted to survey related issues and their suitable arrangements. The regular dangers of audits are Linkability, survey dismissal and change which are evacuated by utilizing bTSE; which makes utilization of tokens give incorporated surveys and the framework is progressed and the most vital risk called as Sybil assault is uprooted by utilizing SrTSE; which makes utilization of pseudonyms. Through execution assessment, we demonstrate that the bTSE accomplishes better execution as far as accommodation rate and defer than an administration audit framework that does not receive client collaboration.


Citation
D.RAMANJANEYULU,U.USHA RANI."In Service-Oriented MSN Providing Trustworthy Service Evaluation". International Journal of Computer Engineering In Research Trends (IJCERT) ,ISSN:2349-7084 ,Vol.2, Issue 12,pp.1192-1197, December - 2015, URL :https://ijcert.org/ems/ijcert_papers/V2I1269.pdf,


Keywords : Mobile Social Networks, Trust Evaluation, Sybil Attack, Distributed System

References
[1] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure
Friend Discovery in Mobile Social Networks,” IEEE,
2011.
[2] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Seer: A
Secure and Efficient Service Review System for
ServiceOriented Mobile Social Networks,” IEEE, 2012.
[3] X. Liang, X. Li, T. Luan, R. Lu, X. Lin, and X. Shen,
“Morality- Driven Data Forwarding with Privacy
Preservation in Mobile Social Networks,” IEEE, 2012.
[4] T.H. Luan, L.X. Cai, J. Chen, X. Shen, and F. Bai,
“VTube: Towards the Media Rich City Life with
Autonomous Vehicular Content Distribution,” IEEE,
2011.
[5] J.R. Douceur, “The Sybil Attack,” Proc. Revised
Papers First Int’l Workshop IPTPS, 2002.
[6] J. Newsome, E. Shi, D.X. Song, and A. Perrig, “The
Sybil Attack in Sensor Networks: Analysis & Defenses,”
IPSN, 2004.
[7] D. Quercia and S. Hailes, “Sybil Attacks Against
Mobile Users: Friends and Foes to the Rescue,” IEEE,
2010.
[8] D. Quercia and S. Hailes, “Sybil Attacks Against
Mobile Users: Friends and Foes to the Rescue,” Proc.
IEEE INFOCOM, pp. 336- 340, 2010.
[9] R. Lu, X. Lin, X. Liang, and X. Shen, “A Dynamic
Privacy-Preserving Key Management Scheme for
LocationBased Services in VANETs,” IEEE Trans.
Intelligent Transportation Systems, vol. 13, no. 1, pp.
127-139, Mar. 2012.
[10] R. Lu, X. Lin, T. Luan, X. Liang, and X. Shen,
“Pseudonym Changing at Social Spots: An Effective
Strategy for Location Privacy in VANETs,” IEEE Trans.
Vehicular Technology, vol. 61, no. 1, pp. 86-96, Jan.
2012.
[11] X. Boyen and B. Waters, “Full-Domain Subgroup
Hiding and Constant-Size Group Signatures,” Proc.
10th Int’l Conf. Practice and Theory Public Key
Cryptography, pp. 1- 15, 2007.
[12] X. Liang, Z. Cao, J. Shao, and H. Lin, “Short Group
Signature without Random Oracles,” Proc. Ninth Int’l
Conf. Information and Comm. Security (ICICS), pp. 69-
82, 2007.


DOI Link : NOT ASSIGNED

Download :
  V2I1269.pdf


Refbacks : Currently there are no Refbacks

Quick Links



DOI:10.22362/ijcert


Science Central

Score: 13.30





Submit your paper to [email protected]