Blocking Misbehaving User & Activities in Social Network
International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
www.ijsr.net | Open Access | Fully Refereed | Peer Reviewed International Journal

ISSN: 2319-7064

Research Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Social network security and privacy issues result from the astronomical amounts of information these sites process each day. Features that invite users to participate in messages, invitations, photos, open platform applications and other applications are often the venues for others to gain access to a user's private information.Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms, storing and sharing a wealth of personal information [1]. This information, as well as the possibility of contacting thousands of users, also attracts the interest of cyber criminals. For example, cybercriminals might exploit the implicit trust relationships between users in order to make the malicious website. cybercriminals might find personal information valuable for identity theft or to drive targeted spam campaigns [2]. In this paper, we detect & block the misbehaving user in social network by using nymble unique token provided by nymble manager and pseudonym manager to which detect and block to misuse or spam things.

Keywords: Nymble, Pseudonym, Nymbles manager, Pseudonym manager

Edition: Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Share this Article

How to Cite this Article?

Rashmi Gourkar, Garima Singh, "Blocking Misbehaving User & Activities in Social Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163109, Volume 5 Issue 4, April 2016, 2178 - 2179

67 PDF Views | 48 PDF Downloads

Download Article PDF



Similar Articles with Keyword 'Nymble'

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 515 - 517

Allowing Genuine Users and Blocking Bad Users in Anonymizing Network: The Nymble

Anand A. Maha, P. B. Kumbarkar

Share this Article

Review Papers, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020

Pages: 236 - 238

Nymber Server in Anonymizing Network: A Review

Anand A. Maha, Jayprakash D. Sonone

Share this Article

Similar Articles with Keyword 'Pseudonym'

Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014

Pages: 1486 - 1489

Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System

Digvijay A. Patil, Yogesh B. Gurav

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016

Pages: 2178 - 2179

Blocking Misbehaving User & Activities in Social Network

Rashmi Gourkar, Garima Singh

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015

Pages: 2161 - 2167

Preserving Trajectory Privacy in Participatory Sensing Applications

Gauri R Virkar, Sanchika A Bajpai

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014

Pages: 391 - 393

Achieving Location Privacy through the Impact of Changing Pseudonyms

S. Sharath Chandra, Dasu Vaman Ravi Prasad

Share this Article

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016

Pages: 1314 - 1316

Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing

Kirti Patil, Sonali Patil

Share this Article
Top