Research Paper | Computer Science & Engineering | India | Volume 5 Issue 4, April 2016
Blocking Misbehaving User & Activities in Social Network
Rashmi Gourkar, Garima Singh
Social network security and privacy issues result from the astronomical amounts of information these sites process each day. Features that invite users to participate in messages, invitations, photos, open platform applications and other applications are often the venues for others to gain access to a user's private information.Social networking has become a popular way for users to meet and interact online. Users spend a significant amount of time on popular social network platforms, storing and sharing a wealth of personal information [1]. This information, as well as the possibility of contacting thousands of users, also attracts the interest of cyber criminals. For example, cybercriminals might exploit the implicit trust relationships between users in order to make the malicious website. cybercriminals might find personal information valuable for identity theft or to drive targeted spam campaigns [2]. In this paper, we detect & block the misbehaving user in social network by using nymble unique token provided by nymble manager and pseudonym manager to which detect and block to misuse or spam things.
Keywords: Nymble, Pseudonym, Nymbles manager, Pseudonym manager
Edition: Volume 5 Issue 4, April 2016
Pages: 2178 - 2179
How to Cite this Article?
Rashmi Gourkar, Garima Singh, "Blocking Misbehaving User & Activities in Social Network", International Journal of Science and Research (IJSR), https://www.ijsr.net/search_index_results_paperid.php?id=NOV163109, Volume 5 Issue 4, April 2016, 2178 - 2179
122 PDF Views | 96 PDF Downloads
Similar Articles with Keyword 'Nymble'
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2178 - 2179Blocking Misbehaving User & Activities in Social Network
Rashmi Gourkar, Garima Singh
Review Papers, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 515 - 517Allowing Genuine Users and Blocking Bad Users in Anonymizing Network: The Nymble
Anand A. Maha, P. B. Kumbarkar
Review Papers, Computer Science & Engineering, India, Volume 9 Issue 2, February 2020
Pages: 236 - 238Nymber Server in Anonymizing Network: A Review
Anand A. Maha, Jayprakash D. Sonone
Similar Articles with Keyword 'Pseudonym'
Survey Paper, Computer Science & Engineering, India, Volume 3 Issue 12, December 2014
Pages: 1486 - 1489Mobile Based Marketing System Using Privacy and Security Aware Location Based Rewarding System
Digvijay A. Patil, Yogesh B. Gurav
Research Paper, Computer Science & Engineering, India, Volume 4 Issue 7, July 2015
Pages: 2161 - 2167Preserving Trajectory Privacy in Participatory Sensing Applications
Gauri R Virkar, Sanchika A Bajpai
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 4, April 2016
Pages: 2178 - 2179Blocking Misbehaving User & Activities in Social Network
Rashmi Gourkar, Garima Singh
Research Paper, Computer Science & Engineering, India, Volume 3 Issue 9, September 2014
Pages: 391 - 393Achieving Location Privacy through the Impact of Changing Pseudonyms
S. Sharath Chandra, Dasu Vaman Ravi Prasad
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 6, June 2016
Pages: 1314 - 1316Pseudonym Generation with Combining the Identity Based and Attribute Based Encryption with Outsourced Revocation in Cloud Computing
Kirti Patil, Sonali Patil