Downloads: 108
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015
Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems
Vrushali G. Chabilwad | A. D. Gujar
Abstract: Over last few years numbers of people are using Internet for Social Networking, Businesses and entertainment. Because users are unknown of third party, it is quiet difficult for users to evaluate honesty and quality of third party. So it is becoming a risky task to perform an online transaction. Large scale research is going on reputation systems. With the fast improvement of reputation systems in different online social networks, exploitations against such frameworks are advancing rapidly. To tackle this problem, a system can be implemented, which secures reputation systems from another point the combination of time domain anomaly detection and DempsterShafer hypothesis based trust calculation. Genuine client assault information gathered from a digital cyber competition is utilized to build the testing data set. Evaluated with two representative reputation plans and existing system, Temporal And Trust Analysis attains an essentially improved performance regarding distinguishing items under attack, discovering malicious clients who embed fraudulent ratings, and improving reputation scores.
Keywords: Reputation systems, Anonymity, Information security, Information filtering
Edition: Volume 4 Issue 1, January 2015,
Pages: 984 - 986
Similar Articles with Keyword 'Reputation systems'
Downloads: 105
Survey Paper, Computer Science & Engineering, India, Volume 4 Issue 11, November 2015
Pages: 2095 - 2097Trust Evaluation by Mining of E-commerce Feedback Comments
Priyanka Kumbhar | Manjushri Mahajan [3]
Downloads: 113
Survey Paper, Computer Science & Engineering, India, Volume 5 Issue 7, July 2016
Pages: 1876 - 1878A Survey on CommTrust: Computing Multi-Dimensional Trust by Mining E-Commerce Feedback Comments
Swetha Sam | Vani V Prakash