SlideShare uma empresa Scribd logo
1 de 5
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
Enabling Trustworthy Service Evaluation in Service- 
Oriented Mobile Social Networks 
In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to 
share service reviews in service-oriented mobile social networks (S-MSNs). Each service 
provider independently maintains a TSE for itself, which collects and stores users’ reviews about 
its services without requiring any third trusted authority. The service reviews can then be made 
available to interested users in making wise service selection decisions. We identify three unique 
service review attacks, i.e., linkability, rejection, and modification attacks, and develop 
sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basic 
TSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an 
integrated chain form by using hierarchical and aggregate signature techniques. It restricts the 
service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of 
reviews are improved. Further, we extend the bTSE to a Sybil- resisted TSE (SrTSE) to enable 
the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews 
toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user 
will be revealed. Through security analysis and numerical results, we show that the bTSE and the 
SrTSE effectively resist the service review attacks and the SrTSE additionally detects the sybil 
attacks in an efficient manner. Through performance evaluation, we show that the bTSE achieves 
better performance in terms of submission rate and delay than a service review system that does 
not adopt user cooperation. 
EXISTING SYSTEM: 
Service-oriented mobile social networks (S-MSNs) are emerging social networking platforms 
over which one or more individuals are able to communicate with local service providers using 
handheld wireless communication devices such as smartphones. In the S-MSNs, service 
providers (restaurants and grocery stores) offer location-based services to local users and aim to 
attract the users by employing various advertising approaches, for example, sending e-flyers to 
Contact: 9703109334, 9533694296 
ABSTRACT: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
the nearby passengers via wireless connections. Unlike the global counterparts, the interests of 
the local service providers are in serving the users in close geographic vicinity because most 
users choose services based on the comparison of the service quality and the distance advantage. 
In the S-MSNs, to establish the trust relations between the service providers and the users is 
particularly important. With a higher reputation, a service provider is more likely to be chosen by 
the users. However, the S-MSNs are autonomous and distributed networks 
DISADVANTAGES OF EXISTING SYSTEM: 
 Vendors may reject or delete negative reviews and insert forged positive ones 
 The malicious users can leave false negative reviews or drop the reviews from 
others to decrease the reputation of some particular vendors. 
 In this paper, we move the TSE into the S-MSN settings. We require service providers to 
maintain the TSE by themselves. In the meantime, we consider the users participate in the 
TSE in a cooperative manner. 
 We will study possible malicious behaviors conducted by the service providers and the 
users. For ease of presentation, we refer to service providers as vendors in the sequel. We 
consider an S-MSN composed of static vendors and mobile users that interconnect 
opportunistically. 
 Each vendor is equipped with a wireless communication device that has a large storage 
space. In the TSE, the vendor stores and disseminates service information to the users. 
Note that the adoption of the TSE is subject to vendors’ own decisions. However, the 
users expect to read comprehensive and authentic reviews of services, and this 
expectation makes vendors who support the TSE appear more attractive than the others. 
ADVANTAGES OF PROPOSED SYSTEM: 
 On the one hand, users are able to frequently change their pseudonyms to prevent the 
linkage of their behaviors at different time/location. 
Contact: 9703109334, 9533694296 
PROPOSED SYSTEM: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
 Their behavior cannot be tracked and their personal information cannot be disclosed. 
 A user generates and submits a non forgeable review to the vendor. 
SYSTEM ARCHITECTURE: 
SYSTEM REQUIREMENTS: 
HARDWARE REQUIREMENTS: 
 System : Pentium IV 2.4 GHz. 
 Hard Disk : 40 GB. 
 Floppy Drive : 1.44 Mb. 
 Monitor : 15 VGA Colour. 
 Mouse : Logitech. 
 Ram : 512 Mb. 
SOFTWARE REQUIREMENTS: 
 Operating system : Windows XP/7. 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
 Coding Language : JAVA/J2EE 
 IDE : Netbeans 7.4 
 Database : MYSQL 
Contact: 9703109334, 9533694296 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks 
Xiaohui Liang, Student Member, IEEE, Xiaodong Lin, Member, IEEE, and Xuemin (Sherman) 
Shen, Fellow, IEEE “Enabling Trustworthy Service Evaluation in Service-Oriented Mobile 
Social Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED 
SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014. 
Contact: 9703109334, 9533694296 
REFERENCE: 
Email id: academicliveprojects@gmail.com, www.logicsystems.org.in

Mais conteúdo relacionado

Semelhante a enabling trustworthy service evaluation in service-oriented mobile social networks

Bipartite Recommender Algorithm for RBTS - IESL 2016 Final Reviewed
Bipartite Recommender Algorithm for RBTS - IESL 2016 Final ReviewedBipartite Recommender Algorithm for RBTS - IESL 2016 Final Reviewed
Bipartite Recommender Algorithm for RBTS - IESL 2016 Final Reviewed
Asoka Korale
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
JPINFOTECH JAYAPRAKASH
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
IJERA Editor
 
BSS Applications Managed Services for CSPs
BSS Applications Managed Services for CSPsBSS Applications Managed Services for CSPs
BSS Applications Managed Services for CSPs
Saurabh Jain
 

Semelhante a enabling trustworthy service evaluation in service-oriented mobile social networks (20)

IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
IRJET - Dynamic and Privacy-Preserving Reputation Management for Block Chain-...
 
Constraint Aware Dynamic Web Service Composition for A Specific Business Requ...
Constraint Aware Dynamic Web Service Composition for A Specific Business Requ...Constraint Aware Dynamic Web Service Composition for A Specific Business Requ...
Constraint Aware Dynamic Web Service Composition for A Specific Business Requ...
 
Securing Location of User in Geo Social Networking
Securing Location of User in Geo Social NetworkingSecuring Location of User in Geo Social Networking
Securing Location of User in Geo Social Networking
 
A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...A scalable server architecture for mobile presence services in social network...
A scalable server architecture for mobile presence services in social network...
 
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
DOTNET 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for m...
 
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
JAVA 2013 IEEE MOBILECOMPUTING PROJECT A scalable server architecture for mob...
 
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
PriGuard: A Semantic Approach to Detect Privacy Violation in Online Social Ne...
 
Bipartite Recommender Algorithm for RBTS - IESL 2016 Final Reviewed
Bipartite Recommender Algorithm for RBTS - IESL 2016 Final ReviewedBipartite Recommender Algorithm for RBTS - IESL 2016 Final Reviewed
Bipartite Recommender Algorithm for RBTS - IESL 2016 Final Reviewed
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
Exploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queriesExploiting service similarity for privacy in location based search queries
Exploiting service similarity for privacy in location based search queries
 
Customer experience analytics
Customer experience analyticsCustomer experience analytics
Customer experience analytics
 
Data enhances customer experience
Data enhances customer experienceData enhances customer experience
Data enhances customer experience
 
JPD1435 Preserving Location Privacy in Geosocial Applications
JPD1435   Preserving Location Privacy in Geosocial ApplicationsJPD1435   Preserving Location Privacy in Geosocial Applications
JPD1435 Preserving Location Privacy in Geosocial Applications
 
Hiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaborationHiding in the mobile crowd location privacy through collaboration
Hiding in the mobile crowd location privacy through collaboration
 
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS DeliveryLocation Sharing System Using GPS Technology for Minimizing SMS Delivery
Location Sharing System Using GPS Technology for Minimizing SMS Delivery
 
NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...
NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...
NOC to SOC: A Next-Gen Approach to Understanding and Proactively Assuring Cus...
 
International Journal of Engineering Research and Development
International Journal of Engineering Research and DevelopmentInternational Journal of Engineering Research and Development
International Journal of Engineering Research and Development
 
H1085863
H1085863H1085863
H1085863
 
BSS Applications Managed Services for CSPs
BSS Applications Managed Services for CSPsBSS Applications Managed Services for CSPs
BSS Applications Managed Services for CSPs
 
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
Testing Vitality Ranking and Prediction in Social Networking Services With Dy...
 

Mais de swathi78

Mais de swathi78 (20)

secure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databasessecure mining of association rules in horizontally distributed databases
secure mining of association rules in horizontally distributed databases
 
a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...a system for denial-of-service attack detection based on multivariate correla...
a system for denial-of-service attack detection based on multivariate correla...
 
web service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s informationweb service recommendation via exploiting location and qo s information
web service recommendation via exploiting location and qo s information
 
privacy-enhanced web service composition
privacy-enhanced web service compositionprivacy-enhanced web service composition
privacy-enhanced web service composition
 
optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...optimal distributed malware defense in mobile networks with heterogeneous dev...
optimal distributed malware defense in mobile networks with heterogeneous dev...
 
friend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networksfriend book a semantic-based friend recommendation system for social networks
friend book a semantic-based friend recommendation system for social networks
 
efficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computingefficient authentication for mobile and pervasive computing
efficient authentication for mobile and pervasive computing
 
cooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networkscooperative caching for efficient data access in disruption tolerant networks
cooperative caching for efficient data access in disruption tolerant networks
 
an incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloadingan incentive framework for cellular traffic offloading
an incentive framework for cellular traffic offloading
 
secure outsourced attribute-based signatures
secure outsourced attribute-based signaturessecure outsourced attribute-based signatures
secure outsourced attribute-based signatures
 
traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...traffic pattern-based content leakage detection for trusted content delivery ...
traffic pattern-based content leakage detection for trusted content delivery ...
 
the design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networksthe design and evaluation of an information sharing system for human networks
the design and evaluation of an information sharing system for human networks
 
the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...the client assignment problem for continuous distributed interactive applicat...
the client assignment problem for continuous distributed interactive applicat...
 
sos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networkssos a distributed mobile q&a system based on social networks
sos a distributed mobile q&a system based on social networks
 
securing broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryptionsecuring broker-less publish subscribe systems using identity-based encryption
securing broker-less publish subscribe systems using identity-based encryption
 
rre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery enginerre a game-theoretic intrusion response and recovery engine
rre a game-theoretic intrusion response and recovery engine
 
on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...on false data-injection attacks against power system state estimation modelin...
on false data-injection attacks against power system state estimation modelin...
 
loca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding systemloca ward a security and privacy aware location-based rewarding system
loca ward a security and privacy aware location-based rewarding system
 
exploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queriesexploiting service similarity for privacy in location-based search queries
exploiting service similarity for privacy in location-based search queries
 
secure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networkssecure data retrieval for decentralized disruption-tolerant military networks
secure data retrieval for decentralized disruption-tolerant military networks
 

Último

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
Neometrix_Engineering_Pvt_Ltd
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
Epec Engineered Technologies
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
HenryBriggs2
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
MsecMca
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
9953056974 Low Rate Call Girls In Saket, Delhi NCR
 

Último (20)

Integrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - NeometrixIntegrated Test Rig For HTFE-25 - Neometrix
Integrated Test Rig For HTFE-25 - Neometrix
 
Learn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic MarksLearn the concepts of Thermodynamics on Magic Marks
Learn the concepts of Thermodynamics on Magic Marks
 
Bridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptxBridge Jacking Design Sample Calculation.pptx
Bridge Jacking Design Sample Calculation.pptx
 
kiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal loadkiln thermal load.pptx kiln tgermal load
kiln thermal load.pptx kiln tgermal load
 
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptxHOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
HOA1&2 - Module 3 - PREHISTORCI ARCHITECTURE OF KERALA.pptx
 
Computer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to ComputersComputer Lecture 01.pptxIntroduction to Computers
Computer Lecture 01.pptxIntroduction to Computers
 
Online food ordering system project report.pdf
Online food ordering system project report.pdfOnline food ordering system project report.pdf
Online food ordering system project report.pdf
 
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKARHAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
HAND TOOLS USED AT ELECTRONICS WORK PRESENTED BY KOUSTAV SARKAR
 
Standard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power PlayStandard vs Custom Battery Packs - Decoding the Power Play
Standard vs Custom Battery Packs - Decoding the Power Play
 
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
Bhubaneswar🌹Call Girls Bhubaneswar ❤Komal 9777949614 💟 Full Trusted CALL GIRL...
 
Employee leave management system project.
Employee leave management system project.Employee leave management system project.
Employee leave management system project.
 
Block diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.pptBlock diagram reduction techniques in control systems.ppt
Block diagram reduction techniques in control systems.ppt
 
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
scipt v1.pptxcxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxxx...
 
notes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.pptnotes on Evolution Of Analytic Scalability.ppt
notes on Evolution Of Analytic Scalability.ppt
 
Introduction to Serverless with AWS Lambda
Introduction to Serverless with AWS LambdaIntroduction to Serverless with AWS Lambda
Introduction to Serverless with AWS Lambda
 
A Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna MunicipalityA Study of Urban Area Plan for Pabna Municipality
A Study of Urban Area Plan for Pabna Municipality
 
Design For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the startDesign For Accessibility: Getting it right from the start
Design For Accessibility: Getting it right from the start
 
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
Navigating Complexity: The Role of Trusted Partners and VIAS3D in Dassault Sy...
 
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
Call Girls in South Ex (delhi) call me [🔝9953056974🔝] escort service 24X7
 
Computer Networks Basics of Network Devices
Computer Networks  Basics of Network DevicesComputer Networks  Basics of Network Devices
Computer Networks Basics of Network Devices
 

enabling trustworthy service evaluation in service-oriented mobile social networks

  • 1. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Enabling Trustworthy Service Evaluation in Service- Oriented Mobile Social Networks In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores users’ reviews about its services without requiring any third trusted authority. The service reviews can then be made available to interested users in making wise service selection decisions. We identify three unique service review attacks, i.e., linkability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basic TSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, we extend the bTSE to a Sybil- resisted TSE (SrTSE) to enable the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Through security analysis and numerical results, we show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the sybil attacks in an efficient manner. Through performance evaluation, we show that the bTSE achieves better performance in terms of submission rate and delay than a service review system that does not adopt user cooperation. EXISTING SYSTEM: Service-oriented mobile social networks (S-MSNs) are emerging social networking platforms over which one or more individuals are able to communicate with local service providers using handheld wireless communication devices such as smartphones. In the S-MSNs, service providers (restaurants and grocery stores) offer location-based services to local users and aim to attract the users by employing various advertising approaches, for example, sending e-flyers to Contact: 9703109334, 9533694296 ABSTRACT: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 2. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks the nearby passengers via wireless connections. Unlike the global counterparts, the interests of the local service providers are in serving the users in close geographic vicinity because most users choose services based on the comparison of the service quality and the distance advantage. In the S-MSNs, to establish the trust relations between the service providers and the users is particularly important. With a higher reputation, a service provider is more likely to be chosen by the users. However, the S-MSNs are autonomous and distributed networks DISADVANTAGES OF EXISTING SYSTEM:  Vendors may reject or delete negative reviews and insert forged positive ones  The malicious users can leave false negative reviews or drop the reviews from others to decrease the reputation of some particular vendors.  In this paper, we move the TSE into the S-MSN settings. We require service providers to maintain the TSE by themselves. In the meantime, we consider the users participate in the TSE in a cooperative manner.  We will study possible malicious behaviors conducted by the service providers and the users. For ease of presentation, we refer to service providers as vendors in the sequel. We consider an S-MSN composed of static vendors and mobile users that interconnect opportunistically.  Each vendor is equipped with a wireless communication device that has a large storage space. In the TSE, the vendor stores and disseminates service information to the users. Note that the adoption of the TSE is subject to vendors’ own decisions. However, the users expect to read comprehensive and authentic reviews of services, and this expectation makes vendors who support the TSE appear more attractive than the others. ADVANTAGES OF PROPOSED SYSTEM:  On the one hand, users are able to frequently change their pseudonyms to prevent the linkage of their behaviors at different time/location. Contact: 9703109334, 9533694296 PROPOSED SYSTEM: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 3. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks  Their behavior cannot be tracked and their personal information cannot be disclosed.  A user generates and submits a non forgeable review to the vendor. SYSTEM ARCHITECTURE: SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS:  System : Pentium IV 2.4 GHz.  Hard Disk : 40 GB.  Floppy Drive : 1.44 Mb.  Monitor : 15 VGA Colour.  Mouse : Logitech.  Ram : 512 Mb. SOFTWARE REQUIREMENTS:  Operating system : Windows XP/7. Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 4. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks  Coding Language : JAVA/J2EE  IDE : Netbeans 7.4  Database : MYSQL Contact: 9703109334, 9533694296 Email id: academicliveprojects@gmail.com, www.logicsystems.org.in
  • 5. Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks Xiaohui Liang, Student Member, IEEE, Xiaodong Lin, Member, IEEE, and Xuemin (Sherman) Shen, Fellow, IEEE “Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks” IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, VOL. 25, NO. 2, FEBRUARY 2014. Contact: 9703109334, 9533694296 REFERENCE: Email id: academicliveprojects@gmail.com, www.logicsystems.org.in