Downloads: 108 | Views: 337
Survey Paper | Computer Science & Engineering | India | Volume 4 Issue 1, January 2015 | Popularity: 6.3 / 10
Survey for Detecting Malicious user using Trust Evaluation and User Correlation for Protecting Online Reputation Systems
Vrushali G. Chabilwad, A. D. Gujar
Abstract: Over last few years numbers of people are using Internet for Social Networking, Businesses and entertainment. Because users are unknown of third party, it is quiet difficult for users to evaluate honesty and quality of third party. So it is becoming a risky task to perform an online transaction. Large scale research is going on reputation systems. With the fast improvement of reputation systems in different online social networks, exploitations against such frameworks are advancing rapidly. To tackle this problem, a system can be implemented, which secures reputation systems from another point the combination of time domain anomaly detection and DempsterShafer hypothesis based trust calculation. Genuine client assault information gathered from a digital cyber competition is utilized to build the testing data set. Evaluated with two representative reputation plans and existing system, Temporal And Trust Analysis attains an essentially improved performance regarding distinguishing items under attack, discovering malicious clients who embed fraudulent ratings, and improving reputation scores.
Keywords: Reputation systems, Anonymity, Information security, Information filtering
Edition: Volume 4 Issue 1, January 2015
Pages: 984 - 986
Make Sure to Disable the Pop-Up Blocker of Web Browser
Similar Articles
Downloads: 124 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 5 Issue 8, August 2016
Pages: 991 - 995A Study and Comparative Analysis of Cryptographic Algorithms for Various File Formats
M. Meena, A. Komathi
Downloads: 1 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, India, Volume 13 Issue 9, September 2024
Pages: 1075 - 1080Improving Health Information Security in Mobile Cloud Computing with Blockchain and Modular Encryption Techniques
Vikasa Bheemashankara Pateela, K Rahul Krishna, Dr. Krishna Kumar P R, Triveni N
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Research Paper, Computer Science & Engineering, Bangladesh, Volume 11 Issue 7, July 2022
Pages: 1076 - 1080Issues in IT & Information Security System Development
Shakila Shams, M. Abdus Sobhan, Farruk Ahmed, Ali Shihab Sabbir
Downloads: 2 | Weekly Hits: ⮙1 | Monthly Hits: ⮙1
Analysis Study Research Paper, Computer Science & Engineering, India, Volume 8 Issue 4, April 2019
Pages: 2003 - 2009Enhancing Scalability in Cloud Computing: Strategies and Best Practices
Sai Tarun Kaniganti
Downloads: 94
M.Tech / M.E / PhD Thesis, Computer Science & Engineering, India, Volume 3 Issue 7, July 2014
Pages: 1253 - 1257Implementation Details of Anonymization of Sensitive Labels in Collaborative Data Publishing
Vandhana V