IJMTES – ASSURED RATINGS IN CHECK_IN SERVICES

Journal Title : International Journal of Modern Trends in Engineering and Science

Author’s Name : G Priyadharshini | V Umadevi  unnamed

Volume 03 Issue 05 2016

ISSN no:  2348-3121

Page no: 96-101

Abstract – Exploring of Smartphone and tablet which increase the number of uses in location based service networking which is accessible with mobile device through the network and which uses information on the geographical position of the user. Location based service network (LBSN) allow the users to share their location through GPS and add reviews about the place they visited. The review can be made available to interested users in making service selection decisions. POIs merchant or business can get additional benefit through the analysis of user check in and review data in LBSN.So POIs merchant or business can able to modify or reject the negative reviews to attractive the users. To overcome this issue, consider the trustworthiness of a SRS without a trusted review management center in location-based Service-oriented Mobile Social Networks (S-MSNs).To propose hierarchical and aggregate signature technique which enables users to submit their review in integrated chain form. Hence the system could effectively resist the existing service review attacks, and it is efficient in terms of review submission and review authenticity verification for the whole system.

Keywords— Location based social network, POI, Service review system, Sybil attack 

Reference

  1. Kuan Zhang; Department of Electrical & Computer Engineering, University. Of Waterloo, Waterloo, On, Canada ; Xiaohui Liang ; Rongxing Lu ; Kan Yang “Exploiting Mobile Social Behaviors For Sybil Detection” IEEE Conference On Computer Communications (Infocom), 2015.
  2. Samuel, S.J. ; Dept. of Inf. Technol., Sathyabama University., Chennai, India ; Dhivya, B. “An efficient technique to detect and prevent Sybil attacks in social network applications” IEEE International Conference on Electrical, Computer and Communication Technologies (ICECCT), 2015.
  3. Zhang, J. ; Department of Electrical, Computer, and Energy Engineering, Arizona State University, Tempe, ; Zhang, R. ; Sun, J. ; Zhang, Y. “TrueTop: A Sybil-Resilient System for User Influence Measurement on Twitter” Networking, IEEE/ACM Transactions on (Volume:PP , Issue: 99 ).
  4. Jilong Xue; Computer Science Department, Peking University, Beijing, China ; Zhi Yang ; Xiaoyong Yang ; Xiao Wang “Vote Trust: Leveraging friend invitation graph to defend against social network Sybil’s” INFOCOM, 2013 Proceedings IEEE.
  5. Qiang Cao ; Duke Univ., Durham, NC, USA ; Sirivianos, M. ; Xiaowei Yang ; Munagala, K. “Combating Friend Spam Using Social Rejections” IEEE 35th International Conference on Distributed Computing Systems (ICDCS), 2015.
  6. G. Danezis and P. Mittal, “Sybilinfer: Detecting Sybil nodes using social networks,” in Proc of NDSS, 2009.
  7. Haifeng Yu; Computer Science. Department Nat. University of Singapore, Singapore; Kaminsky, M.Gibbons, P.B.; Flaxman, A.D. “Sybil Guard: Defending Against Sybil Attacks via Social Networks” Networking, IEEE/ACM Transactions on (Volume: 16, Issue: 3).
  8. Haifeng Yu; Nat. Univ. of Singapore, Singapore; Gibbons, P.B.; Kaminsky, M.; Feng Xiao “SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks” IEEE Symposium on Security and Privacy, 2008. SP 2008.
  9. Wei Wei ; Coll. of William & Mary, Williamsburg, VA, USA ; Fengyuan Xu ; Tan, C.C. ; Qun Li “SybilDefender: A Defense Mechanism for Sybil Attacks in Large Social Networks” Parallel and Distributed Systems, IEEE Transactions on (Volume:24 , Issue: 12 ).
  10. Xiaohui Liang; Department of Electrical & Computer Engineering, University of Waterloo, Waterloo, ON, Canada ; Xu Li ; Rongxing Lu ; Xiaodong Lin “SEER: A Secure and Efficient Service Review System for Service-Oriented Mobile Social Networks” IEEE 32nd International Conference on Distributed Computing Systems (ICDCS), 2012.
Scroll Up