SlideShare ist ein Scribd-Unternehmen logo
1 von 3
Downloaden Sie, um offline zu lesen
M.Bhanusri.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.05-07
www.ijera.com 5|P a g e
An Improved Explicit Profile Matching In Mobile Social
Networks
1
M.Bhanusri ,2
S.Vijaykumar ,3
S.Y.Ashok,4
P.Phani Gopal
1,2,3
,4
Pursuing B.Tech (CSE) From St. Ann’s College Of Engineering. & Technology. Chirala, Andhra Pradesh -
, 523 167 INDIA
5
Dr.A.Veeraswamy,Working As Associate Professor (CSE) In St. Ann’s College Of Engineering. & Technology.
Chirala, Andhra Pradesh -, 523 1867 INDIA 6
Dr. P Harini Working As HOD(CSE) In St. Ann’s College Of
Engineering. & Technology. Chirala, Andhra Pradesh -, 523 167 INDIA
ABSTRACT
“Fully Anonymous Profile Matching In Mobile Social Networks" is a project Privacy preservation is a
significant research issue in social networking. Here user profile matching with their interest of privacy-
preservation in mobile social networks (MSNs) so most of the family profiles matching with Two different
protocols are used.i.e ; Icpm & Ecpm. An explicit Comparison-based Profile Matching protocol (eCPM) which
runs between two parties, an initiator and a responder is proposed which enables the initiator to obtain the
comparison-based matching result about a specified attribute in their profiles, while preventing their attribute
values from disclosure. An implicit Comparison-based Profile matching protocol (iCPM) is then proposed
which allows the initiator to directly obtain some messages instead of the comparison result from the responder
Keywords: Mobile social network, profile matching, privacy preservation, Icpm,Ecpm
I. INTRODUCTION
Mobile Social networking is where
individuals with similar interests connect with each
other through their mobile/tablet. They form virtual
communities. For example Facebook, Twitter,
LinkedIn etc. What makes social network sites
unique is not that they allow individuals to meet
strangers, but rather that they enable users to
articulate and make visible their social networks.
On many of the large SNSs, participants are not
necessarily "networking" or looking to meet new
people; instead, they are primarily communicating
with people who are already a part of their
extended social network. To emphasize this
articulated social network as a critical organizing
feature of these sites, we label them "social
network sites." some web-based SNSs support
limited mobile interactions (e.g., Facebook,
MySpace, and Cyworld). Mobile Social Networks
is a means of transmitting information
(communicating) using a Mixture of voice and data
devices over networks including cellular
technology and elements of private and public IP
infrastructure (such as the Internet). Mobile Social
Networks refers to all of the enabling elements
necessary for the contribution(Posting &
Uploading) and consumption(Viewing &
Experiencing) of social media across a mobile
network.
Profile Matching: Profile matching means two
users comparing their personal profiles
II. RELATED WORK
2. I Existing System with Drawbacks
Privacy preservation is a significant
research issue in social networking. The social
networking platforms are extended into the mobile
environment, users require more extensive privacy-
preservation because they are Unfamiliar with the
neighbors’ in close vicinity who may store, and
correlate their personal information at different
time periods and locations. Once the personal
information is correlated to the location
information, the behaviour of users will be
completely disclosed to the public. To overcome
the privacy violation in MSNs, many privacy
enhancing techniques have been adopted into the
MSN applications.
PHP:
PHP, one of the Web’s most popular
programming languages. PHP was running on more
than 20 million Web servers in July 2007. At the
time of writing, it’s the fourth most popular
programming language in the world. PHP means
personal home page or Hypertext pre processor. It
is widely used in server side scripting languages.
Php is executed on the server. PHP files can
contain texts, Java Script, CSS, PHP code the code
is executed on the server, and the result is returned
to the browser as plain HTML. The PHP Extension
is “. php”.
RESEARCH ARTICLE OPEN ACCESS
M.Bhanusri.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.05-07
www.ijera.com 6|P a g e
2.2 Proposed System with Features
We first propose an explicit Comparison-
based Profile Matching protocol (eCPM) which
runs between two parties, an initiator and a
responder. The eCPM enables the initiator to obtain
the comparison-based matching result about a
specified attribute in their profiles, while
preventing their attribute values from Disclosure.
We then propose an implicit Comparison-based
Profile Matching protocol (iCPM) which allows the
initiator to directly obtain some messages instead
of the comparison result from the responder. The
messages unrelated to user profile can be divided
into multiple categories by the responder. The
initiator implicitly chooses the interested category
which is unknown to the responder. Two messages
in each category are prepared by the responder, and
only one message can be obtained by the initiator
according to the comparison result on a single
attribute.
III. SYSTEM ARCHITECTURE
IV. MODULES
The Following modules are :
1. User
2. Explicit Comparison-based Profile matching
(eCPM) Module
3. Implicit Comparison-based Profile matching
(iCPM) Module
4. Privacy Preserving Module
1. User:
First User have to register in Registration page,
attribute page & secret page and then login. User
search for the another user then a request will be
send to that particular person. If that person
accepts the request then user can view there details.
2. ECPM:
Attribute, the eCPM allows the initiator to
know the comparison result, i.e., whether the
intiator to obtain the comparision based matching
result about the specifiled attribute values in their
profile Due to the exposure of the comparison
result, user profile will be leaked and linked in
some conditions.
3. ICPM:
An Initiator and a responder proposed
which allows the initiator directly obtain some
messages instead of the comparison result from the
responder.
4. Privacy Preserving:
Privacy preservation is a significant research
issue in social networking. Since more personalized
information is shared with the public, violating the
privacy of a target user become much easier.
V. RESULTS
1. User Home Page
2.User search some Particular person
M.Bhanusri.et al. Int. Journal of Engineering Research and Applications www.ijera.com
ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.05-07
www.ijera.com 7|P a g e
3. Implicit Comparison Profile Matching
4. Explicit Comparison Profile Matching
5. By Using Icpm & Ecpm Fields we generate
Map:
VI. CONCLUSION
The fully anonymous profile matching in
mobile social networks should match to the
registered Profile. As we Implemented 2 protocols
ICPM & ECPM. Main objective of our project is
to give security while logging into websites .we can
also search the profile based on location bases. It is
not limited upto mobile networks has wide
implementation is social networking sites.
VII. FUTURE SCOPE
The scope of fully anonymous profile
matching in mobile social networks is a secure
process, this type of project is not implemented
yet. So, if this project is implemented in Social
Networking websites then, it maintains a high
Secure process from the Hackers. Moreover In
future it is implemented wide area applications like
Crime Theft Mainly in miltary etc.
REFERENCES
[1] “Comscore,”
http://www.comscoredatamine.com/.
[2] A. G. Miklas, K. K. Gollu, K. K. W.
Chan, S. Saroiu, P. K. Gummadi, and E.
de Lara, “Exploiting social interactions in
mobile systems,” in Ubicomp, 2007, pp.
409–428.
[3] D. Niyato, P. Wang, W. Saad, and A.
Hjørungnes, “Controlled coalitional games
for cooperative mobile social
networks,” IEEE Transactions on
Vehicular Technology, vol. 60, no. 4, pp.
1812–1824, 2011.
[4] M. Brereton, P. Roe, M. Foth, J. M.
Bunker, and L. Buys, “Designing
participation in agile ridesharing with
mobile social software,” in OZCHI, 2009,
pp. 257–260.
[5] Z. Yang, B. Zhang, J. Dai, A. C.
Champion, D. Xuan, and D. Li, “E-
smalltalker: A distributed mobile system
for social networking in physical
proximity,” in ICDCS, 2010, pp. 468–477.

Weitere ähnliche Inhalte

Was ist angesagt?

An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...IJASRD Journal
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloningIJNSA Journal
 
Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms InternetIRJET Journal
 
A Modular Instant Messaging System
A Modular Instant Messaging SystemA Modular Instant Messaging System
A Modular Instant Messaging SystemIJERA Editor
 
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET Journal
 
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Vinod Kumar
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networksTannistho Ghosh
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02mark scott
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksIRJET Journal
 
IRJET- Phishing Web Site
IRJET-  	  Phishing Web SiteIRJET-  	  Phishing Web Site
IRJET- Phishing Web SiteIRJET Journal
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...ijtsrd
 
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningParvathi Sanil Nair
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenCMR WORLD TECH
 
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic WebFine-Grained Trust Assertions for Privacy Management in the Social Semantic Web
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic WebOwen Sacco
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Editor IJCATR
 

Was ist angesagt? (19)

An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
An Approach to Detect and Avoid Social Engineering and Phasing Attack in Soci...
 
An iac approach for detecting profile cloning
An iac approach for detecting profile cloningAn iac approach for detecting profile cloning
An iac approach for detecting profile cloning
 
Offline Sms Internet
Offline Sms InternetOffline Sms Internet
Offline Sms Internet
 
A Modular Instant Messaging System
A Modular Instant Messaging SystemA Modular Instant Messaging System
A Modular Instant Messaging System
 
IRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A SurveyIRJET- Malicious Short Urls Detection: A Survey
IRJET- Malicious Short Urls Detection: A Survey
 
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...Design and Implementation of Efficient Integrity Protection for Open Mobile P...
Design and Implementation of Efficient Integrity Protection for Open Mobile P...
 
Security threats in social networks
Security threats in social networksSecurity threats in social networks
Security threats in social networks
 
Sip 140208055023-phpapp02
Sip 140208055023-phpapp02Sip 140208055023-phpapp02
Sip 140208055023-phpapp02
 
My Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social NetworksMy Privacy My decision: Control of Photo Sharing on Online Social Networks
My Privacy My decision: Control of Photo Sharing on Online Social Networks
 
IRJET- Phishing Web Site
IRJET-  	  Phishing Web SiteIRJET-  	  Phishing Web Site
IRJET- Phishing Web Site
 
204
204204
204
 
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
Retrieving Hidden Friends a Collusion Privacy Attack against Online Friend Se...
 
Seminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learningSeminar on detecting fake accounts in social media using machine learning
Seminar on detecting fake accounts in social media using machine learning
 
V01 i010413
V01 i010413V01 i010413
V01 i010413
 
Social engineering
Social engineeringSocial engineering
Social engineering
 
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usenProtecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
Protecting Corporete Credentials Against Threats 4 48159 wgw03071_usen
 
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic WebFine-Grained Trust Assertions for Privacy Management in the Social Semantic Web
Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web
 
Spam identification fake profile
Spam identification fake profileSpam identification fake profile
Spam identification fake profile
 
Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior Online Signature Authentication by Using Mouse Behavior
Online Signature Authentication by Using Mouse Behavior
 

Ähnlich wie An Improved Explicit Profile Matching In Mobile Social Networks

Layered programatical api framework for real time mobile social network
Layered programatical api framework for real time mobile social networkLayered programatical api framework for real time mobile social network
Layered programatical api framework for real time mobile social networkIshara Amarasekera
 
FourSquare and Facebook Graph Integrated Mobile Application
FourSquare and Facebook Graph Integrated Mobile ApplicationFourSquare and Facebook Graph Integrated Mobile Application
FourSquare and Facebook Graph Integrated Mobile ApplicationMike Taylor
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docxjoyjonna282
 
Efficient and effective video sharing in online Social network using revocati...
Efficient and effective video sharing in online Social network using revocati...Efficient and effective video sharing in online Social network using revocati...
Efficient and effective video sharing in online Social network using revocati...IRJET Journal
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web ApplicationIRJET Journal
 
Decentralized Social Network
Decentralized Social NetworkDecentralized Social Network
Decentralized Social NetworkIRJET Journal
 
College Information System using Android
College Information System using AndroidCollege Information System using Android
College Information System using Androidijtsrd
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsCSCJournals
 
Sup (Semantic User Profiling)
Sup (Semantic User Profiling)Sup (Semantic User Profiling)
Sup (Semantic User Profiling)Emanuela Boroș
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...ijwscjournal
 
Research paper on android social blogging application if deptt- sept 21 (1)
Research paper on android social blogging application if deptt- sept 21 (1)Research paper on android social blogging application if deptt- sept 21 (1)
Research paper on android social blogging application if deptt- sept 21 (1)AISSMS
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryIJERA Editor
 
Web Chat using React Framework
Web Chat using React FrameworkWeb Chat using React Framework
Web Chat using React Frameworkijtsrd
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Thomas Ryberg
 
Android Based Instant Messaging Application Using Firebase
Android Based Instant Messaging Application Using FirebaseAndroid Based Instant Messaging Application Using Firebase
Android Based Instant Messaging Application Using FirebaseIRJET Journal
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudIJERA Editor
 
Online social network
Online social networkOnline social network
Online social networkingenioustech
 
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...ijcsa
 

Ähnlich wie An Improved Explicit Profile Matching In Mobile Social Networks (20)

Layered programatical api framework for real time mobile social network
Layered programatical api framework for real time mobile social networkLayered programatical api framework for real time mobile social network
Layered programatical api framework for real time mobile social network
 
FourSquare and Facebook Graph Integrated Mobile Application
FourSquare and Facebook Graph Integrated Mobile ApplicationFourSquare and Facebook Graph Integrated Mobile Application
FourSquare and Facebook Graph Integrated Mobile Application
 
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
A4.1Proceedings of Student-Faculty Research Day, CSIS, Pa.docx
 
Proposal.docx
Proposal.docxProposal.docx
Proposal.docx
 
Efficient and effective video sharing in online Social network using revocati...
Efficient and effective video sharing in online Social network using revocati...Efficient and effective video sharing in online Social network using revocati...
Efficient and effective video sharing in online Social network using revocati...
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web Application
 
Decentralized Social Network
Decentralized Social NetworkDecentralized Social Network
Decentralized Social Network
 
College Information System using Android
College Information System using AndroidCollege Information System using Android
College Information System using Android
 
Semantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's InterestsSemantic Massage Addressing based on Social Cloud Actor's Interests
Semantic Massage Addressing based on Social Cloud Actor's Interests
 
Q046049397
Q046049397Q046049397
Q046049397
 
Sup (Semantic User Profiling)
Sup (Semantic User Profiling)Sup (Semantic User Profiling)
Sup (Semantic User Profiling)
 
Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...Semantic web approach towards interoperability and privacy issues in social n...
Semantic web approach towards interoperability and privacy issues in social n...
 
Research paper on android social blogging application if deptt- sept 21 (1)
Research paper on android social blogging application if deptt- sept 21 (1)Research paper on android social blogging application if deptt- sept 21 (1)
Research paper on android social blogging application if deptt- sept 21 (1)
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
 
Web Chat using React Framework
Web Chat using React FrameworkWeb Chat using React Framework
Web Chat using React Framework
 
Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0Interactive Innovation Through Social Software And Web 2.0
Interactive Innovation Through Social Software And Web 2.0
 
Android Based Instant Messaging Application Using Firebase
Android Based Instant Messaging Application Using FirebaseAndroid Based Instant Messaging Application Using Firebase
Android Based Instant Messaging Application Using Firebase
 
Geochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using CloudGeochronos File Sharing Application Using Cloud
Geochronos File Sharing Application Using Cloud
 
Online social network
Online social networkOnline social network
Online social network
 
Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...Vulnerabilities and attacks targeting social networks and industrial control ...
Vulnerabilities and attacks targeting social networks and industrial control ...
 

Kürzlich hochgeladen

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Bookingdharasingh5698
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxupamatechverse
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordAsst.prof M.Gokilavani
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college projectTonystark477637
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)simmis5
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...Call Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGSIVASHANKAR N
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...ranjana rawat
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escortsranjana rawat
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Christo Ananth
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxpranjaldaimarysona
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur High Profile
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINESIVASHANKAR N
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Call Girls in Nagpur High Profile
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdfKamal Acharya
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSISrknatarajan
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations120cr0395
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...ranjana rawat
 

Kürzlich hochgeladen (20)

Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur EscortsCall Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
Call Girls in Nagpur Suman Call 7001035870 Meet With Nagpur Escorts
 
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 BookingVIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
VIP Call Girls Ankleshwar 7001035870 Whatsapp Number, 24/07 Booking
 
Introduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptxIntroduction to Multiple Access Protocol.pptx
Introduction to Multiple Access Protocol.pptx
 
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete RecordCCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
CCS335 _ Neural Networks and Deep Learning Laboratory_Lab Complete Record
 
result management system report for college project
result management system report for college projectresult management system report for college project
result management system report for college project
 
Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)Java Programming :Event Handling(Types of Events)
Java Programming :Event Handling(Types of Events)
 
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...Booking open Available Pune Call Girls Pargaon  6297143586 Call Hot Indian Gi...
Booking open Available Pune Call Girls Pargaon 6297143586 Call Hot Indian Gi...
 
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTINGMANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
MANUFACTURING PROCESS-II UNIT-1 THEORY OF METAL CUTTING
 
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
The Most Attractive Pune Call Girls Budhwar Peth 8250192130 Will You Miss Thi...
 
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur EscortsHigh Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
High Profile Call Girls Nagpur Isha Call 7001035870 Meet With Nagpur Escorts
 
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
Call for Papers - Educational Administration: Theory and Practice, E-ISSN: 21...
 
Processing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptxProcessing & Properties of Floor and Wall Tiles.pptx
Processing & Properties of Floor and Wall Tiles.pptx
 
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur EscortsRussian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
Russian Call Girls in Nagpur Grishma Call 7001035870 Meet With Nagpur Escorts
 
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINEMANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
MANUFACTURING PROCESS-II UNIT-2 LATHE MACHINE
 
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...Top Rated  Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
Top Rated Pune Call Girls Budhwar Peth ⟟ 6297143586 ⟟ Call Me For Genuine Se...
 
University management System project report..pdf
University management System project report..pdfUniversity management System project report..pdf
University management System project report..pdf
 
UNIT-III FMM. DIMENSIONAL ANALYSIS
UNIT-III FMM.        DIMENSIONAL ANALYSISUNIT-III FMM.        DIMENSIONAL ANALYSIS
UNIT-III FMM. DIMENSIONAL ANALYSIS
 
Roadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and RoutesRoadmap to Membership of RICS - Pathways and Routes
Roadmap to Membership of RICS - Pathways and Routes
 
Extrusion Processes and Their Limitations
Extrusion Processes and Their LimitationsExtrusion Processes and Their Limitations
Extrusion Processes and Their Limitations
 
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
(ANVI) Koregaon Park Call Girls Just Call 7001035870 [ Cash on Delivery ] Pun...
 

An Improved Explicit Profile Matching In Mobile Social Networks

  • 1. M.Bhanusri.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.05-07 www.ijera.com 5|P a g e An Improved Explicit Profile Matching In Mobile Social Networks 1 M.Bhanusri ,2 S.Vijaykumar ,3 S.Y.Ashok,4 P.Phani Gopal 1,2,3 ,4 Pursuing B.Tech (CSE) From St. Ann’s College Of Engineering. & Technology. Chirala, Andhra Pradesh - , 523 167 INDIA 5 Dr.A.Veeraswamy,Working As Associate Professor (CSE) In St. Ann’s College Of Engineering. & Technology. Chirala, Andhra Pradesh -, 523 1867 INDIA 6 Dr. P Harini Working As HOD(CSE) In St. Ann’s College Of Engineering. & Technology. Chirala, Andhra Pradesh -, 523 167 INDIA ABSTRACT “Fully Anonymous Profile Matching In Mobile Social Networks" is a project Privacy preservation is a significant research issue in social networking. Here user profile matching with their interest of privacy- preservation in mobile social networks (MSNs) so most of the family profiles matching with Two different protocols are used.i.e ; Icpm & Ecpm. An explicit Comparison-based Profile Matching protocol (eCPM) which runs between two parties, an initiator and a responder is proposed which enables the initiator to obtain the comparison-based matching result about a specified attribute in their profiles, while preventing their attribute values from disclosure. An implicit Comparison-based Profile matching protocol (iCPM) is then proposed which allows the initiator to directly obtain some messages instead of the comparison result from the responder Keywords: Mobile social network, profile matching, privacy preservation, Icpm,Ecpm I. INTRODUCTION Mobile Social networking is where individuals with similar interests connect with each other through their mobile/tablet. They form virtual communities. For example Facebook, Twitter, LinkedIn etc. What makes social network sites unique is not that they allow individuals to meet strangers, but rather that they enable users to articulate and make visible their social networks. On many of the large SNSs, participants are not necessarily "networking" or looking to meet new people; instead, they are primarily communicating with people who are already a part of their extended social network. To emphasize this articulated social network as a critical organizing feature of these sites, we label them "social network sites." some web-based SNSs support limited mobile interactions (e.g., Facebook, MySpace, and Cyworld). Mobile Social Networks is a means of transmitting information (communicating) using a Mixture of voice and data devices over networks including cellular technology and elements of private and public IP infrastructure (such as the Internet). Mobile Social Networks refers to all of the enabling elements necessary for the contribution(Posting & Uploading) and consumption(Viewing & Experiencing) of social media across a mobile network. Profile Matching: Profile matching means two users comparing their personal profiles II. RELATED WORK 2. I Existing System with Drawbacks Privacy preservation is a significant research issue in social networking. The social networking platforms are extended into the mobile environment, users require more extensive privacy- preservation because they are Unfamiliar with the neighbors’ in close vicinity who may store, and correlate their personal information at different time periods and locations. Once the personal information is correlated to the location information, the behaviour of users will be completely disclosed to the public. To overcome the privacy violation in MSNs, many privacy enhancing techniques have been adopted into the MSN applications. PHP: PHP, one of the Web’s most popular programming languages. PHP was running on more than 20 million Web servers in July 2007. At the time of writing, it’s the fourth most popular programming language in the world. PHP means personal home page or Hypertext pre processor. It is widely used in server side scripting languages. Php is executed on the server. PHP files can contain texts, Java Script, CSS, PHP code the code is executed on the server, and the result is returned to the browser as plain HTML. The PHP Extension is “. php”. RESEARCH ARTICLE OPEN ACCESS
  • 2. M.Bhanusri.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.05-07 www.ijera.com 6|P a g e 2.2 Proposed System with Features We first propose an explicit Comparison- based Profile Matching protocol (eCPM) which runs between two parties, an initiator and a responder. The eCPM enables the initiator to obtain the comparison-based matching result about a specified attribute in their profiles, while preventing their attribute values from Disclosure. We then propose an implicit Comparison-based Profile Matching protocol (iCPM) which allows the initiator to directly obtain some messages instead of the comparison result from the responder. The messages unrelated to user profile can be divided into multiple categories by the responder. The initiator implicitly chooses the interested category which is unknown to the responder. Two messages in each category are prepared by the responder, and only one message can be obtained by the initiator according to the comparison result on a single attribute. III. SYSTEM ARCHITECTURE IV. MODULES The Following modules are : 1. User 2. Explicit Comparison-based Profile matching (eCPM) Module 3. Implicit Comparison-based Profile matching (iCPM) Module 4. Privacy Preserving Module 1. User: First User have to register in Registration page, attribute page & secret page and then login. User search for the another user then a request will be send to that particular person. If that person accepts the request then user can view there details. 2. ECPM: Attribute, the eCPM allows the initiator to know the comparison result, i.e., whether the intiator to obtain the comparision based matching result about the specifiled attribute values in their profile Due to the exposure of the comparison result, user profile will be leaked and linked in some conditions. 3. ICPM: An Initiator and a responder proposed which allows the initiator directly obtain some messages instead of the comparison result from the responder. 4. Privacy Preserving: Privacy preservation is a significant research issue in social networking. Since more personalized information is shared with the public, violating the privacy of a target user become much easier. V. RESULTS 1. User Home Page 2.User search some Particular person
  • 3. M.Bhanusri.et al. Int. Journal of Engineering Research and Applications www.ijera.com ISSN: 2248-9622, Vol. 6, Issue 4, (Part - 7) April 2016, pp.05-07 www.ijera.com 7|P a g e 3. Implicit Comparison Profile Matching 4. Explicit Comparison Profile Matching 5. By Using Icpm & Ecpm Fields we generate Map: VI. CONCLUSION The fully anonymous profile matching in mobile social networks should match to the registered Profile. As we Implemented 2 protocols ICPM & ECPM. Main objective of our project is to give security while logging into websites .we can also search the profile based on location bases. It is not limited upto mobile networks has wide implementation is social networking sites. VII. FUTURE SCOPE The scope of fully anonymous profile matching in mobile social networks is a secure process, this type of project is not implemented yet. So, if this project is implemented in Social Networking websites then, it maintains a high Secure process from the Hackers. Moreover In future it is implemented wide area applications like Crime Theft Mainly in miltary etc. REFERENCES [1] “Comscore,” http://www.comscoredatamine.com/. [2] A. G. Miklas, K. K. Gollu, K. K. W. Chan, S. Saroiu, P. K. Gummadi, and E. de Lara, “Exploiting social interactions in mobile systems,” in Ubicomp, 2007, pp. 409–428. [3] D. Niyato, P. Wang, W. Saad, and A. Hjørungnes, “Controlled coalitional games for cooperative mobile social networks,” IEEE Transactions on Vehicular Technology, vol. 60, no. 4, pp. 1812–1824, 2011. [4] M. Brereton, P. Roe, M. Foth, J. M. Bunker, and L. Buys, “Designing participation in agile ridesharing with mobile social software,” in OZCHI, 2009, pp. 257–260. [5] Z. Yang, B. Zhang, J. Dai, A. C. Champion, D. Xuan, and D. Li, “E- smalltalker: A distributed mobile system for social networking in physical proximity,” in ICDCS, 2010, pp. 468–477.