International Journal of Science and Research (IJSR)

International Journal of Science and Research (IJSR)
Call for Papers | Fully Refereed | Open Access | Double Blind Peer Reviewed

ISSN: 2319-7064


Downloads: 108 | Views: 337

Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.3 / 10


     

Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems

Vrushali G. Chabilwad, A. D. Gujar


Abstract: Over last few years numbers of people are using Internet for Social Networking, Businesses and entertainment. Because users are unknown of third party, it is quiet difficult for users to evaluate honesty and quality of third party. So it is becoming a risky task to perform an online transaction. Large scale research is going on reputation systems. With the fast improvement of reputation systems in different online social networks, exploitations against such frameworks are advancing rapidly. To tackle this problem, a system can be implemented, which secures reputation systems from another point the combination of time domain anomaly detection and DempsterShafer hypothesis based trust calculation. Genuine client assault information gathered from a digital cyber competition is utilized to build the testing data set. Evaluated with two representative reputation plans and existing system, Temporal And Trust Analysis attains an essentially improved performance regarding distinguishing items under attack, discovering malicious clients who embed fraudulent ratings, and improving reputation scores.


Keywords: Reputation systems, Anonymity, Information security, Information filtering


Edition: Volume 4 Issue 1, January 2015


Pages: 984 - 986



Make Sure to Disable the Pop-Up Blocker of Web Browser




Text copied to Clipboard!
Vrushali G. Chabilwad, A. D. Gujar, "Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems", International Journal of Science and Research (IJSR), Volume 4 Issue 1, January 2015, pp. 984-986, https://www.ijsr.net/getabstract.php?paperid=SUB15320, DOI: https://www.doi.org/10.21275/SUB15320



Similar Articles

Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016

Pages: 991 - 995

A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats

M. Meena, A. Komathi

Share this Article

Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024

Pages: 1075 - 1080

Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques

Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Research Paper, Computer Science & Engineering, Bangladesh, Volume 11 Issue 7, July 2022

Pages: 1076 - 1080

Issues in IT & Information Security System Development

Shakila Shams, M. Abdus Sobhan, Farruk Ahmed, Ali Shihab Sabbir

Share this Article

Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1

Analysis Study Research Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019

Pages: 2003 - 2009

Enhancing Scalability in Cloud Computing: Strategies and Best Practices

Sai Tarun Kaniganti

Share this Article

Downloads: 94

M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014

Pages: 1253 - 1257

Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing

Vandhana V

Share this Article



Top