SlideShare a Scribd company logo
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
Enabling Trustworthy Service Evaluation in Service- 
Oriented Mobile Social Networks 
In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to 
share service reviews in service-oriented mobile social networks (S-MSNs). Each service 
provider independently maintains a TSE for itself, which collects and stores users’ reviews about 
its services without requiring any third trusted authority. The service reviews can then be made 
available to interested users in making wise service selection decisions. We identify three unique 
service review attacks, i.e., linkability, rejection, and modification attacks, and develop 
sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basic 
TSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an 
integrated chain form by using hierarchical and aggregate signature techniques. It restricts the 
service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of 
reviews are improved. Further, we extend the bTSE to a Sybil- resisted TSE (SrTSE) to enable 
the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews 
toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user 
will be revealed. Through security analysis and numerical results, we show that the bTSE and the 
SrTSE effectively resist the service review attacks and the SrTSE additionally detects the sybil 
attacks in an efficient manner. Through performance evaluation, we show that the bTSE achieves 
better performance in terms of submission rate and delay than a service review system that does 
not adopt user cooperation. 
EXISTING SYSTEM: 
Service-oriented mobile social networks (S-MSNs) are emerging social networking platforms 
over which one or more individuals are able to communicate with local service providers using 
handheld wireless communication devices such as smartphones. In the S-MSNs, service 
providers (restaurants and grocery stores) offer location-based services to local users and aim to 
attract the users by employing various advertising approaches, for example, sending e-flyers to 
Contact: 9703109334, 9533694296 
ABSTRACT: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
the nearby passengers via wireless connections. Unlike the global counterparts, the interests of 
the local service providers are in serving the users in close geographic vicinity because most 
users choose services based on the comparison of the service quality and the distance advantage. 
In the S-MSNs, to establish the trust relations between the service providers and the users is 
particularly important. With a higher reputation, a service provider is more likely to be chosen by 
the users. However, the S-MSNs are autonomous and distributed networks 
DISADVANTAGES OF EXISTING SYSTEM: 
 Vendors may reject or delete negative reviews and insert forged positive ones 
 The malicious users can leave false negative reviews or drop the reviews from 
others to decrease the reputation of some particular vendors. 
 In this paper, we move the TSE into the S-MSN settings. We require service providers to 
maintain the TSE by themselves. In the meantime, we consider the users participate in the 
TSE in a cooperative manner. 
 We will study possible malicious behaviors conducted by the service providers and the 
users. For ease of presentation, we refer to service providers as vendors in the sequel. We 
consider an S-MSN composed of static vendors and mobile users that interconnect 
opportunistically. 
 Each vendor is equipped with a wireless communication device that has a large storage 
space. In the TSE, the vendor stores and disseminates service information to the users. 
Note that the adoption of the TSE is subject to vendors’ own decisions. However, the 
users expect to read comprehensive and authentic reviews of services, and this 
expectation makes vendors who support the TSE appear more attractive than the others. 
ADVANTAGES OF PROPOSED SYSTEM: 
 On the one hand, users are able to frequently change their pseudonyms to prevent the 
linkage of their behaviors at different time/location. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
 Their behavior cannot be tracked and their personal information cannot be disclosed. 
 A user generates and submits a non forgeable review to the vendor. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
Xiaohui Liang, Student Member, IEEE, Xiaodong Lin, Member, IEEE, and Xuemin (Sherman) 
Shen, Fellow, IEEE “Enabling Trustworthy Service Evaluation in Service-Oriented Mobile 
Social Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED 
SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

More Related Content

PDF
A scalable server architecture for mobile presence services in social network...
Bijoy L
 
PPT
Transitioning Enterprise Architectures to Service Oriented Architectures
Nathaniel Palmer
 
PDF
Trustworthy Service Enhancement in Mobile Social Network
ijsrd.com
 
PDF
Trust and reputation in mobile environments
Andrada Astefanoaie
 
PDF
An Efficient Trust Evaluation using Fact-Finder Technique
IJCSIS Research Publications
 
PPT
Open Reputation Management Systems
Abbie Barbir
 
PDF
IRJET- Efficiently Analyzing and Detecting Fake Reviews
IRJET Journal
 
DOCX
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
A scalable server architecture for mobile presence services in social network...
Bijoy L
 
Transitioning Enterprise Architectures to Service Oriented Architectures
Nathaniel Palmer
 
Trustworthy Service Enhancement in Mobile Social Network
ijsrd.com
 
Trust and reputation in mobile environments
Andrada Astefanoaie
 
An Efficient Trust Evaluation using Fact-Finder Technique
IJCSIS Research Publications
 
Open Reputation Management Systems
Abbie Barbir
 
IRJET- Efficiently Analyzing and Detecting Fake Reviews
IRJET Journal
 
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 

Similar to enabling trustworthy service evaluation in service-oriented mobile social networks (20)

PDF
Sas web 2010 lora-aroyo
Lora Aroyo
 
PDF
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
IRJET Journal
 
PDF
Ijnsa050203
IJNSA Journal
 
PDF
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
IAEME Publication
 
DOCX
Sort a self organizing trust model for peer-to-peer systems
IEEEFINALYEARPROJECTS
 
DOCX
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
PDF
Introduction of Trustie Software Repository & Passion-Lab Data Center, OW2con...
OW2
 
PDF
5. FOMS_ Mobile Social_Networks_Robert Mullins
FOMS011
 
DOCX
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
PDF
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
IRJET Journal
 
PPTX
A trust aggregation portal
Erandhi Abeynayake
 
PPT
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Tin180 VietNam
 
PDF
Enhanced User-driven Ranking System with Splay Tree
TELKOMNIKA JOURNAL
 
PPTX
A novel approach for trust management for peer peer
Snehith
 
PDF
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
IJERA Editor
 
PDF
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
rahulmonikasharma
 
PDF
TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...
IJNSA Journal
 
PDF
Travel Recommendation Approach using Collaboration Filter in Social Networking
IRJET Journal
 
PDF
An exaustive survey of trust models in p2 p network
ijwscjournal
 
PDF
In this paper we present a necessary and sufficient condition for Hamiltonian...
graphhoc
 
Sas web 2010 lora-aroyo
Lora Aroyo
 
Location Privacy Protection Mechanisms using Order-Retrievable Encryption for...
IRJET Journal
 
Ijnsa050203
IJNSA Journal
 
PRODUCT REPUTATION AND GLOBAL RATING IN E-COMMERCE
IAEME Publication
 
Sort a self organizing trust model for peer-to-peer systems
IEEEFINALYEARPROJECTS
 
JAVA 2013 IEEE NETWORKSECURITY PROJECT SORT: A Self-ORganizing Trust Model fo...
IEEEGLOBALSOFTTECHNOLOGIES
 
Introduction of Trustie Software Repository & Passion-Lab Data Center, OW2con...
OW2
 
5. FOMS_ Mobile Social_Networks_Robert Mullins
FOMS011
 
Sort a self o rganizing trust model for peer-to-peer systems
JPINFOTECH JAYAPRAKASH
 
Automatic Recommendation of Trustworthy Users in Online Product Rating Sites
IRJET Journal
 
A trust aggregation portal
Erandhi Abeynayake
 
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Tin180 VietNam
 
Enhanced User-driven Ranking System with Splay Tree
TELKOMNIKA JOURNAL
 
A novel approach for trust management for peer peer
Snehith
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
IJERA Editor
 
Enhancement of Privacy and User Interaction in a Social Network with the Aid ...
rahulmonikasharma
 
TULUNGAN: A SLANDERING-RESISTANT REPUTATION SYSTEM FOR COLLABORATIVE WEB FILT...
IJNSA Journal
 
Travel Recommendation Approach using Collaboration Filter in Social Networking
IRJET Journal
 
An exaustive survey of trust models in p2 p network
ijwscjournal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
graphhoc
 
Ad

More from swathi78 (20)

DOC
secure mining of association rules in horizontally distributed databases
swathi78
 
DOCX
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
DOCX
web service recommendation via exploiting location and qo s information
swathi78
 
DOCX
privacy-enhanced web service composition
swathi78
 
DOCX
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
DOCX
friend book a semantic-based friend recommendation system for social networks
swathi78
 
DOCX
efficient authentication for mobile and pervasive computing
swathi78
 
DOCX
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
DOCX
an incentive framework for cellular traffic offloading
swathi78
 
DOCX
secure outsourced attribute-based signatures
swathi78
 
DOCX
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
DOCX
the design and evaluation of an information sharing system for human networks
swathi78
 
DOCX
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
DOCX
sos a distributed mobile q&a system based on social networks
swathi78
 
DOCX
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
DOCX
rre a game-theoretic intrusion response and recovery engine
swathi78
 
DOCX
on false data-injection attacks against power system state estimation modelin...
swathi78
 
DOCX
loca ward a security and privacy aware location-based rewarding system
swathi78
 
DOCX
exploiting service similarity for privacy in location-based search queries
swathi78
 
DOCX
secure data retrieval for decentralized disruption-tolerant military networks
swathi78
 
secure mining of association rules in horizontally distributed databases
swathi78
 
a system for denial-of-service attack detection based on multivariate correla...
swathi78
 
web service recommendation via exploiting location and qo s information
swathi78
 
privacy-enhanced web service composition
swathi78
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
swathi78
 
friend book a semantic-based friend recommendation system for social networks
swathi78
 
efficient authentication for mobile and pervasive computing
swathi78
 
cooperative caching for efficient data access in disruption tolerant networks
swathi78
 
an incentive framework for cellular traffic offloading
swathi78
 
secure outsourced attribute-based signatures
swathi78
 
traffic pattern-based content leakage detection for trusted content delivery ...
swathi78
 
the design and evaluation of an information sharing system for human networks
swathi78
 
the client assignment problem for continuous distributed interactive applicat...
swathi78
 
sos a distributed mobile q&a system based on social networks
swathi78
 
securing broker-less publish subscribe systems using identity-based encryption
swathi78
 
rre a game-theoretic intrusion response and recovery engine
swathi78
 
on false data-injection attacks against power system state estimation modelin...
swathi78
 
loca ward a security and privacy aware location-based rewarding system
swathi78
 
exploiting service similarity for privacy in location-based search queries
swathi78
 
secure data retrieval for decentralized disruption-tolerant military networks
swathi78
 
Ad

Recently uploaded (20)

PDF
All chapters of Strength of materials.ppt
girmabiniyam1234
 
PPTX
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
PDF
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
PDF
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
PPTX
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
PPT
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
PDF
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
PPTX
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
PDF
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
PDF
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
PPT
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
PDF
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
PPTX
Inventory management chapter in automation and robotics.
atisht0104
 
PPTX
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
PDF
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
PPTX
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
PPTX
Tunnel Ventilation System in Kanpur Metro
220105053
 
PPTX
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
PDF
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
PPTX
Online Cab Booking and Management System.pptx
diptipaneri80
 
All chapters of Strength of materials.ppt
girmabiniyam1234
 
database slide on modern techniques for optimizing database queries.pptx
aky52024
 
2010_Book_EnvironmentalBioengineering (1).pdf
EmilianoRodriguezTll
 
Advanced LangChain & RAG: Building a Financial AI Assistant with Real-Time Data
Soufiane Sejjari
 
22PCOAM21 Session 1 Data Management.pptx
Guru Nanak Technical Institutions
 
Understanding the Key Components and Parts of a Drone System.ppt
Siva Reddy
 
FLEX-LNG-Company-Presentation-Nov-2017.pdf
jbloggzs
 
Chapter_Seven_Construction_Reliability_Elective_III_Msc CM
SubashKumarBhattarai
 
Machine Learning All topics Covers In This Single Slides
AmritTiwari19
 
LEAP-1B presedntation xxxxxxxxxxxxxxxxxxxxxxxxxxxxx
hatem173148
 
1. SYSTEMS, ROLES, AND DEVELOPMENT METHODOLOGIES.ppt
zilow058
 
Chad Ayach - A Versatile Aerospace Professional
Chad Ayach
 
Inventory management chapter in automation and robotics.
atisht0104
 
MSME 4.0 Template idea hackathon pdf to understand
alaudeenaarish
 
AI-Driven IoT-Enabled UAV Inspection Framework for Predictive Maintenance and...
ijcncjournal019
 
22PCOAM21 Session 2 Understanding Data Source.pptx
Guru Nanak Technical Institutions
 
Tunnel Ventilation System in Kanpur Metro
220105053
 
MULTI LEVEL DATA TRACKING USING COOJA.pptx
dollysharma12ab
 
settlement FOR FOUNDATION ENGINEERS.pdf
Endalkazene
 
Online Cab Booking and Management System.pptx
diptipaneri80
 

enabling trustworthy service evaluation in service-oriented mobile social networks

  • 1. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Enabling Trustworthy Service Evaluation in Service- Oriented Mobile Social Networks In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores users’ reviews about its services without requiring any third trusted authority. The service reviews can then be made available to interested users in making wise service selection decisions. We identify three unique service review attacks, i.e., linkability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basic TSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, we extend the bTSE to a Sybil- resisted TSE (SrTSE) to enable the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Through security analysis and numerical results, we show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the sybil attacks in an efficient manner. Through performance evaluation, we show that the bTSE achieves better performance in terms of submission rate and delay than a service review system that does not adopt user cooperation. EXISTING SYSTEM: Service-oriented mobile social networks (S-MSNs) are emerging social networking platforms over which one or more individuals are able to communicate with local service providers using handheld wireless communication devices such as smartphones. In the S-MSNs, service providers (restaurants and grocery stores) offer location-based services to local users and aim to attract the users by employing various advertising approaches, for example, sending e-flyers to Contact: 9703109334, 9533694296 ABSTRACT: Email id: [email protected], www.logicsystems.org.in
  • 2. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks the nearby passengers via wireless connections. Unlike the global counterparts, the interests of the local service providers are in serving the users in close geographic vicinity because most users choose services based on the comparison of the service quality and the distance advantage. In the S-MSNs, to establish the trust relations between the service providers and the users is particularly important. With a higher reputation, a service provider is more likely to be chosen by the users. However, the S-MSNs are autonomous and distributed networks DISADVANTAGES OF EXISTING SYSTEM:  Vendors may reject or delete negative reviews and insert forged positive ones  The malicious users can leave false negative reviews or drop the reviews from others to decrease the reputation of some particular vendors.  In this paper, we move the TSE into the S-MSN settings. We require service providers to maintain the TSE by themselves. In the meantime, we consider the users participate in the TSE in a cooperative manner.  We will study possible malicious behaviors conducted by the service providers and the users. For ease of presentation, we refer to service providers as vendors in the sequel. We consider an S-MSN composed of static vendors and mobile users that interconnect opportunistically.  Each vendor is equipped with a wireless communication device that has a large storage space. In the TSE, the vendor stores and disseminates service information to the users. Note that the adoption of the TSE is subject to vendors’ own decisions. However, the users expect to read comprehensive and authentic reviews of services, and this expectation makes vendors who support the TSE appear more attractive than the others. ADVANTAGES OF PROPOSED SYSTEM:  On the one hand, users are able to frequently change their pseudonyms to prevent the linkage of their behaviors at different time/location. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: [email protected], www.logicsystems.org.in
  • 3. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks  Their behavior cannot be tracked and their personal information cannot be disclosed.  A user generates and submits a non forgeable review to the vendor. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7. Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 4. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Contact: 9703109334, 9533694296 Email id: [email protected], www.logicsystems.org.in
  • 5. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Xiaohui Liang, Student Member, IEEE, Xiaodong Lin, Member, IEEE, and Xuemin (Sherman) Shen, Fellow, IEEE “Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: [email protected], www.logicsystems.org.in