Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015
Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems
Vrushali G. Chabilwad, A. D. Gujar
Abstract: Over last few years numbers of people are using Internet for Social Networking, Businesses and entertainment. Because users are unknown of third party, it is quiet difficult for users to evaluate honesty and quality of third party. So it is becoming a risky task to perform an online transaction. Large scale research is going on reputation systems. With the fast improvement of reputation systems in different online social networks, exploitations against such frameworks are advancing rapidly. To tackle this problem, a system can be implemented, which secures reputation systems from another point the combination of time domain anomaly detection and DempsterShafer hypothesis based trust calculation. Genuine client assault information gathered from a digital cyber competition is utilized to build the testing data set. Evaluated with two representative reputation plans and existing system, Temporal And Trust Analysis attains an essentially improved performance regarding distinguishing items under attack, discovering malicious clients who embed fraudulent ratings, and improving reputation scores.
Keywords: Reputation systems, Anonymity, Information security, Information filtering
Edition: Volume 4 Issue 1, January 2015,
Pages: 984 - 986
How to Cite this Article?
Vrushali G. Chabilwad, A. D. Gujar, "Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems", International Journal of Science and Research (IJSR), https://www.ijsr.net/get_abstract.php?paper_id=SUB15320, Volume 4 Issue 1, January 2015, 984 - 986
How to Share this Article?
Similar Articles with Keyword 'Reputation systems'
Trust Evaluation by Mining of E-commerce Feedback Comments
Priyanka Kumbhar, Manjushri Mahajan
A Survey on CommTrust: Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
Swetha Sam, Vani V Prakash
Similar Articles with Keyword 'Anonymity'
Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
A Cloud Storage System for Preserving Privacy and Data Integrity of User
M. S. Tore, S. K. Sonkar
Similar Articles with Keyword 'Information security'
A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Secure and Efficient Item Information Retrieval in Cloud Computing
Dr. Shameem Akther, Tahseen Begum
Similar Articles with Keyword 'Information filtering'
Unwanted Message Filtering in OSN User Walls
Ashwini Swami, Jayashri Chaudhari
Survey of Travel Package Recommendation System
Parnika Patil, V. L. Kolhe
Similar Articles with Keyword 'Reputation'
Data Integrity Proof in Cloud Computing using TPA with Privacy Preserving
Rushikesh P. Dhanokar
Trust Checking in Social Networks Using Data Mining
Similar Articles with Keyword 'systems'
Managing Uncertainty in Supply Chain Operating Cost Using Genetic Algorithm
Dr. Niju P. Joseph, Dr. Priyanka Surendran
Performance Analysis of Clustal W Algorithm on Linux Cluster
Swati Jasrotia, Salam Din