Stategy And Necessity Trades For Smile Networks

Abstract

The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed users abuse the information’s. So this new approach challenges network basically different by previous social network designs this new approach presents challenges that are fundamentally different from those tackled by previous social network designs. In this paper, we explore the functional and security requirements for these new systems, such as availability, security, and privacy, and present several design options for building secure encounter-based social networks. Here also we explore different requirements for these new systems. We first provide an introduction to the surveillance, social and institutional privacy perspectives. We then explore the differences between these approaches in order to understand their complementarity. In this paper, we explore the privacy requirements for Encounter- based social networks. We provide an overview on the privacy guarantees and feasibility of SMILE and also its drawback in meeting certain requirements. So we describes the design of SMILE, is secure for a privacy-protection “missed-connections” service for mobile users. It also provides services using mobile devices without relying on trusted coordinating server. Here SMILE design using key exchange protocols. We develop cryptography hash technique for protect the information through the mobile application. This paper presents a design of secure encounter-based social network by implementing in android application called MeetUp.

Authors and Affiliations

Dendukuri rama Manohar, Barigala Srikanth, Saritha Seelam

Keywords

Related Articles

Enhancement of Power Quality in Multi Feeders by using MC-DPFC

According to growth of electricity demand and the increased number of non-linear loads in power grids, providing a high quality electrical power should be considered. In this paper, voltage sag and swell of the power...

Sentiment Analysis Approach for Movie Reviews of Natural Language

Sentimental Analysis (SA) or Opinion Mining (OM) refers to the application of NLP, computational linguistics, and text analytics to identify and extract subjective information in source materials. It involves classif...

Evaluation of Forecast Scheme Performances Based on Statistical Error Measurements

This paper will review various forecast schemes. Some of the forecast schemes are based on data mining. Forecast schemes are introduced to reduce urban traffic congestion and to manage the travel information. The und...

Stategy And Necessity Trades For Smile Networks

The mobile social networks are likely to a large extent enhance interaction with mobile users and shared the information in encounter-based social network. In this encounter traditional social network as opposed user...

Vampire Attacks:Draining Life From Wireless Ad-Hoc Sensor Networks

Wireless Ad – hoc Sensor Network is a newly introduced platform in the field of remote sensing, data collection, analysis, rectification of the problem and research in various studies. Prior security work in this are...

Download PDF file
  • EP ID EP28013
  • DOI -
  • Views 259
  • Downloads 0

How To Cite

Dendukuri rama Manohar, Barigala Srikanth, Saritha Seelam (2014). Stategy And Necessity Trades For Smile Networks. International Journal of Research in Computer and Communication Technology, 3(9), -. https://www.europub.co.uk/articles/-A-28013