SlideShare uma empresa Scribd logo
1 de 6
Baixar para ler offline
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
Trust Based Video Management Framework For Social Multimedia
Networks
Abstract:
Social Multimedia Networks (SMNs) have attracted much attention from both academia and
industry due to their impact on our daily lives. The requirements of SMN users are increasing
along with time, which make the satisfaction of those requirements a very challenging process.
One important challenge facing SMNs consists of their internal users that can upload and
manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and
verifying content delivered to end-users is becoming a highly challenging process. So far, many
researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein,
the aim of this paper is to propose a framework that allows collaboration between humans and
machines to ensure secure delivery of trusted videos content over SMNs while ensuring an
optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the
proposed framework consist in i) assigning to each user a level of trust based on his/her history,
ii) creating an intelligent agent that decides which content can be automatically published on the
network and which content should be reviewed or rejected, and iii) checking the videos’ integrity
and delivery during the streaming process. Accordingly, we ensure that the trust level of the
SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational
Expenditures (OPEX) can be achieved.
Index Terms—Social multimedia network, video streaming, trust model, and trust management.
Existing System:
users can easily discuss their ideas and opinions remotely, publish new articles, and meet new
persons. Moreover, they have allowed business and organizations to advertise for their products
over the world and to directly contact their customers. In addition to these social networks, other
web applications, such as Youtube, Dailymotion, and Vimeo, have enabled the exchange of
different contents, including text, images, and videos among different entities connected to their
services. The evolution of the Internet and distributed systems has led researchers to implement
applications that serve video on demand (VOD) on top of the peer-to-peer (P2P) networks.
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
VOD and videos live streaming systems are gaining momentum in SMN. They have enabled the
appearance of many multimedia-centric services such as video conferencing applications, online
meeting applications, massive open online courses (MOOC) as well as other use cases in e-
health and e-teaching. Such services attract and connect millions of users worldwide. The
providers of these services have enabled countless features that allow users to interact among
themselves by creating and sharing different contents (e.g, videos, text, and images). However,
by allowing this, the nodes composing the social networks, users and machines, generate a huge
amount of data, which can be uncontrolled, unsecured and untrusted . Such amount of generated
data are causing a congestion to the networks and posing a new security challenge to the service
providers: it becomes hard to handle and analyze all content traversing their networks. To tackle
this problem, many research efforts have been conducted so far for mitigating the upload of
malicious data to SMNs.
Proposed system:
Diverse data analytics applications have been proposed and developed with the goal to create a
trustworthy SMN. The researchers’ vision of trustworthy SMNs lies in achieving certainty,
authenticity, and security of data exchanged throughout social network nodes. In this vein, many
trust models and reputation systems have emerged with the goal to limit the spread of unsecured
data. Generally, trust models and reputation systems are designed to assign a score to each entity
in the network and establish trust among them. This score may help users to make a proper
decision on buying an item from an online store, selecting a service provider or recommending a
service to other users. Additionally, the trust score provides decisional systems with the needed
information to execute adequate actions, such as the implementation of certain policies that
restraint an entity from using some resources or accessing some services.
The main features that should be taken into consideration while defining a trust model are as
follows:
User history: The only way to predict user behavior is to study and analyze all generated
content by different users during their interactions in the network . The user history records may
contain relations and links between data, these links are valuable for the data analytics
applications in order to offer a good user experience.
Trust calculation: A user’s level of trust is one of the important metrics that should be taken into
consideration when analyzing users’ data. The computation of this value includes the selection of
various parameters that characterize the manipulated data. For this reason, there is a need to
suggest a realistic model that can capture the characteristics of uploaded data based on the
historical behavior of users.
Users collaboration: Based on the observation that human intelligence is one of the main keys to
effectively detect and remove untrusted data, many algorithms and applications have been
recently devised for detecting and measuring users’ collaborations rate. These algorithms and
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
applications allow users to rate different social multimedia items. Then, the system is able to
collect these feedbacks, applies some filtering methods and executes different needed actions.
Secure content delivery: In a trustworthy social network, every bit of data should be under
control. In other words, starting from any node in the network (e.g, user, mobile, or server), the
path that the data take to arrive at another node should be secured.
MODULES:
1. SOCIAL NETWORK MODULE
2. SECURE VIDEOS MODULE
3. VIDEO INTEGRITY CHECKER MODULE
4. INCENTIVE MODULE
5. TRUST CALCULATION MODULE
6. VOTING SYSTEM MODULE
1. SOCIAL NETWORK MODULE(SNM)
This module is the first component that interacts with the users. It permits them to do all kind of
social interactions, such as the upload of videos, the post of comments, and the sharing of
different videos. This module is composed of many microservices that communicate with each
other in order to offer a user-friendly application that fulfills the end-users needs. The main
micro-services are i) the web server that responds to the users’ requests, ii) a database that stores
all information of users and their generated content, iii) a caching microservice for reducing the
response time and allowing the users to have good experiences while interacting with the system,
iv) a message broker that allows the communication between the different components, and v) a
central authentication service that authenticates the users and gives them the right to request
other services.
2. SECURE VIDEOS MODULE(SVM)
This module allows authorized users to upload their media files to the secure storage, as well as
it allows the social network users to watch the videos streamed on demand from the secure
streaming. The SVM consists of three components:
Secure storage: this component mainly works as follows: first of all, an authorized user sends an
upload request to the SNM. Then, the social network module (SNM), more precisely the central
authentication micro-service, generates and stores a unique token in the database, and then sends
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
it to the user as a response. The user starts sending the video chunks to the storage server while
including that token within the messages sent. The storage server (SS) checks the received token
and then decides either to accept or reject the upload. This component adopts the HTTP live
stream (HLS) for serving diverse users with different resolutions adapted to their network
bandwidth and devices. Also, this component uses the Rivest Cipher 4 (RC4) algorithm in order
to encrypt the video chunks sent to the end users.
Secure transcoder: this component allows the transcoding of the uploaded videos to different
resolutions using softwares such as FFMPEG. Each resolution is subdivided into small chunks of
fixed time duration [35]. After the transcoding operation ends, the secure transcoder creates a
hash for each chunk and sends that hash to the video integrity checker module (VICM). The
VICM saves that hash in a public or private BLOCKCHAIN service as a transaction. The hashed
values will be used by the user video player to verify that the chunks received were approved by
the system and the chunks were not modified from the time that a user uploaded the video to the
secure storage.
3. Video integrity checker module(VICM)
The main feature of this module is to allow the timestamping of the chunks generated from an
uploaded video. This helps in checking the integrity of these chunks in the future. Formally, the
VICM module saves the video content, its signature and its date-time of creation in a trusted and
a shared database. Also, this module checks that the file has not been altered or modified thanks
to Blockchain technologies. Moreover, the service will be also used from a client (e.g, browser,
tablet, smartphone, etc) to verify that the video chunks received were not altered during the
streaming process.
4. Incentive module (IM)
In order to motivate users to review some uploaded videos and decide to publish them or not, an
incentive component was created to reward the users for their contributions. This component is
responsible for remunerating the reviewers when they make a true vote. A vote is considered true
when the decision made at the proposed framework is to publish the uploaded video.
5. Trust calculation module
This sub-module has the responsibility to compute the trustworthiness of different users. For this
reason, it keeps monitoring the behavior of each user by taking into consideration his/her social
interactions with other users. These social interactions include, but not limited to, the following
parameters: i) the number of followers (NOF); ii) the number of true votes (NOTV) received
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
from trusted users through the voting service sub-module; iii) the percentage of true reports
(PTR) received from different users of the social network; iv) the percentage of likes (POL)
received from the user network mainly his friends; and v) the average trust of published videos
(ATPV).
For the sake of simplicity, the trust value of each user is computed using a weighted sum
function of the different parameters. However, any more sophisticated method can be also used
with slight modification. For instance, the entropy of Shanon can be also applied to these
parameters for computing the trust degree of each user. In what follows, we will show how the
trust values of users and videos are computed.
6.Voting system module
The voting service is one of the main components of the system. It allows users to review and
vote certain videos in order to be published or not. It also permits users to reestablish their trust
level. The set of reviewers is selected according to a method that ensures that there is always a
sufficient number of reviewers. The method also allows a subset of users with low values of trust
to re-establish their reputations and gradually increase their factor of trust. Moreover, the voting
service collects votes and sends the gathered data to the decision making algorithm. The decision
algorithm explores the received feedbacks to take decisions on whether to publish or not a video.
System Architecture:
Venkat Java Projects
Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com
Email:venkatjavaprojects@gmail.com
SYSTEM REQUIREMENTS:
HARDWARE REQUIREMENTS:
• PROCESSOR : I3.
• Hard Disk : 40 GB.
• Ram : 2 GB.
SOFTWARE REQUIREMENTS:
• Operating system : Windows.
• Coding Language : JAVA/J2EE
• Data Base : MYSQL
• IDE :Netbeans8.1

Mais conteúdo relacionado

Mais procurados

Evaluating PR Campaigns - Napier PR
Evaluating PR Campaigns - Napier PREvaluating PR Campaigns - Napier PR
Evaluating PR Campaigns - Napier PRNapierPR
 
Advertisement & Consumer Behavior
Advertisement & Consumer Behavior Advertisement & Consumer Behavior
Advertisement & Consumer Behavior nishna sathyan
 
Media Planning
Media PlanningMedia Planning
Media Planningadarkdevil
 
4.6 customer lifetime value
4.6 customer lifetime value4.6 customer lifetime value
4.6 customer lifetime valueRick Rasmussen
 
Sentiment Analysis
Sentiment AnalysisSentiment Analysis
Sentiment AnalysisAnkur Tyagi
 
Customer relationship management systems
Customer relationship management systemsCustomer relationship management systems
Customer relationship management systemsPrakash Raval
 
Mobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerMobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerSonali Chauhan
 
Machine Learning Foundations Project Presentation
Machine Learning Foundations Project PresentationMachine Learning Foundations Project Presentation
Machine Learning Foundations Project PresentationAmit J Bhattacharyya
 
Evaluating and Measuring the Effects of Public Relations
Evaluating and Measuring the Effects of Public RelationsEvaluating and Measuring the Effects of Public Relations
Evaluating and Measuring the Effects of Public RelationsNosdaComunicacao
 
Advertising Research
Advertising ResearchAdvertising Research
Advertising ResearchAyeshaAdnan5
 
Digital Public Relations
Digital Public RelationsDigital Public Relations
Digital Public RelationsMWI Hong Kong
 

Mais procurados (20)

Bank market classification
Bank market classificationBank market classification
Bank market classification
 
Evaluating PR Campaigns - Napier PR
Evaluating PR Campaigns - Napier PREvaluating PR Campaigns - Napier PR
Evaluating PR Campaigns - Napier PR
 
Advertisement & Consumer Behavior
Advertisement & Consumer Behavior Advertisement & Consumer Behavior
Advertisement & Consumer Behavior
 
Smartphones usage in india
Smartphones usage in indiaSmartphones usage in india
Smartphones usage in india
 
Media Planning
Media PlanningMedia Planning
Media Planning
 
4.6 customer lifetime value
4.6 customer lifetime value4.6 customer lifetime value
4.6 customer lifetime value
 
Advertising Theories
Advertising TheoriesAdvertising Theories
Advertising Theories
 
Sentiment Analysis
Sentiment AnalysisSentiment Analysis
Sentiment Analysis
 
Customer lifetime value (1)
Customer lifetime value (1)Customer lifetime value (1)
Customer lifetime value (1)
 
Keller sbm3 05
Keller sbm3 05Keller sbm3 05
Keller sbm3 05
 
Customer relationship management systems
Customer relationship management systemsCustomer relationship management systems
Customer relationship management systems
 
Mobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen SchillerMobile Communication Broadcast System Jochen Schiller
Mobile Communication Broadcast System Jochen Schiller
 
Elaboration likelihood model
Elaboration likelihood modelElaboration likelihood model
Elaboration likelihood model
 
DSDV VS AODV
DSDV VS AODV DSDV VS AODV
DSDV VS AODV
 
Machine Learning Foundations Project Presentation
Machine Learning Foundations Project PresentationMachine Learning Foundations Project Presentation
Machine Learning Foundations Project Presentation
 
Media planning
Media planningMedia planning
Media planning
 
Keller sbm3 02
Keller sbm3 02Keller sbm3 02
Keller sbm3 02
 
Evaluating and Measuring the Effects of Public Relations
Evaluating and Measuring the Effects of Public RelationsEvaluating and Measuring the Effects of Public Relations
Evaluating and Measuring the Effects of Public Relations
 
Advertising Research
Advertising ResearchAdvertising Research
Advertising Research
 
Digital Public Relations
Digital Public RelationsDigital Public Relations
Digital Public Relations
 

Semelhante a trust based video management framework for social multimedia networks

Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksTrust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksVenkat Projects
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEEGLOBALSOFTSTUDENTPROJECTS
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mike Taylor
 
Ames cloud a framework of adaptive mobile video streaming and efficient socia...
Ames cloud a framework of adaptive mobile video streaming and efficient socia...Ames cloud a framework of adaptive mobile video streaming and efficient socia...
Ames cloud a framework of adaptive mobile video streaming and efficient socia...Nagendra Nayak Bharothu
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET Journal
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)IJNSA Journal
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Isuru Vincent
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computingijcsa
 
Blockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management SystemBlockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management SystemIRJET Journal
 
Examining the Nature and Development of Services for Cryptocurrency Wallet De...
Examining the Nature and Development of Services for Cryptocurrency Wallet De...Examining the Nature and Development of Services for Cryptocurrency Wallet De...
Examining the Nature and Development of Services for Cryptocurrency Wallet De...av0763436
 
Wireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationWireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationMike Taylor
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web ApplicationIRJET Journal
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSIJNSA Journal
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...iosrjce
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Yashwanth Reddy
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verificationijtsrd
 

Semelhante a trust based video management framework for social multimedia networks (20)

Trust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networksTrust based video management framework for social multimedia networks
Trust based video management framework for social multimedia networks
 
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
IEEE 2014 JAVA CLOUD COMPUTING PROJECTS Cloud based mobile multimedia recomme...
 
Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#Mobile content generation application | Wireless Community Network Enabler#
Mobile content generation application | Wireless Community Network Enabler#
 
Ames cloud a framework of adaptive mobile video streaming and efficient socia...
Ames cloud a framework of adaptive mobile video streaming and efficient socia...Ames cloud a framework of adaptive mobile video streaming and efficient socia...
Ames cloud a framework of adaptive mobile video streaming and efficient socia...
 
IRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate SystemIRJET- Survey on Blockchain based Digital Certificate System
IRJET- Survey on Blockchain based Digital Certificate System
 
Ijcatr04041017
Ijcatr04041017Ijcatr04041017
Ijcatr04041017
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
A BASTION MOBILEID-BASED AUTHENTICATION TECHNIQUE (BMBAT)
 
Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)Distributed Semantic Search System (DSSS)
Distributed Semantic Search System (DSSS)
 
Security issues in grid computing
Security issues in grid computingSecurity issues in grid computing
Security issues in grid computing
 
Blockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management SystemBlockchain based Asset Registration & Management System
Blockchain based Asset Registration & Management System
 
Examining the Nature and Development of Services for Cryptocurrency Wallet De...
Examining the Nature and Development of Services for Cryptocurrency Wallet De...Examining the Nature and Development of Services for Cryptocurrency Wallet De...
Examining the Nature and Development of Services for Cryptocurrency Wallet De...
 
Wireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integrationWireless mobile content genteration application with RSS feed integration
Wireless mobile content genteration application with RSS feed integration
 
MIS330FinalReport
MIS330FinalReportMIS330FinalReport
MIS330FinalReport
 
Vertex – The All in one Web Application
Vertex – The All in one Web ApplicationVertex – The All in one Web Application
Vertex – The All in one Web Application
 
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONSA CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
A CRYPTOGRAPHIC MUTUAL AUTHENTICATION SCHEME FOR WEB APPLICATIONS
 
J017325660
J017325660J017325660
J017325660
 
Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...Abstraction and Automation: A Software Design Approach for Developing Secure ...
Abstraction and Automation: A Software Design Approach for Developing Secure ...
 
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
Secure Data Sharing in Cloud Computing Using Revocable-Storage Identity-Based...
 
Video Liveness Verification
Video Liveness VerificationVideo Liveness Verification
Video Liveness Verification
 

Mais de Venkat Projects

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docxVenkat Projects
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...Venkat Projects
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docxVenkat Projects
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docxVenkat Projects
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...Venkat Projects
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxVenkat Projects
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...Venkat Projects
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...Venkat Projects
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Venkat Projects
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...Venkat Projects
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docxVenkat Projects
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docxVenkat Projects
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docxVenkat Projects
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docxVenkat Projects
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects listVenkat Projects
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learniVenkat Projects
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...Venkat Projects
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning techniqueVenkat Projects
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal clusterVenkat Projects
 

Mais de Venkat Projects (20)

1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
12.BLOCKCHAIN BASED MILK DELIVERY PLATFORM FOR STALLHOLDER DAIRY FARMERS IN K...
 
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
10.ATTENDANCE CAPTURE SYSTEM USING FACE RECOGNITION.docx
 
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
9.IMPLEMENTATION OF BLOCKCHAIN IN FINANCIAL SECTOR TO IMPROVE SCALABILITY.docx
 
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
8.Geo Tracking Of Waste And Triggering Alerts And Mapping Areas With High Was...
 
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docxImage Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
Image Forgery Detection Based on Fusion of Lightweight Deep Learning Models.docx
 
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
6.A FOREST FIRE IDENTIFICATION METHOD FOR UNMANNED AERIAL VEHICLE MONITORING ...
 
WATERMARKING IMAGES
WATERMARKING IMAGESWATERMARKING IMAGES
WATERMARKING IMAGES
 
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
4.LOCAL DYNAMIC NEIGHBORHOOD BASED OUTLIER DETECTION APPROACH AND ITS FRAMEWO...
 
Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...Application and evaluation of a K-Medoidsbased shape clustering method for an...
Application and evaluation of a K-Medoidsbased shape clustering method for an...
 
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
OPTIMISED STACKED ENSEMBLE TECHNIQUES IN THE PREDICTION OF CERVICAL CANCER US...
 
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
1.AUTOMATIC DETECTION OF DIABETIC RETINOPATHY USING CNN.docx
 
2022 PYTHON MAJOR PROJECTS LIST.docx
2022 PYTHON MAJOR  PROJECTS LIST.docx2022 PYTHON MAJOR  PROJECTS LIST.docx
2022 PYTHON MAJOR PROJECTS LIST.docx
 
2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx2022 PYTHON PROJECTS LIST.docx
2022 PYTHON PROJECTS LIST.docx
 
2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx2021 PYTHON PROJECTS LIST.docx
2021 PYTHON PROJECTS LIST.docx
 
2021 python projects list
2021 python projects list2021 python projects list
2021 python projects list
 
10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni10.sentiment analysis of customer product reviews using machine learni
10.sentiment analysis of customer product reviews using machine learni
 
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...9.data analysis for understanding the impact of covid–19 vaccinations on the ...
9.data analysis for understanding the impact of covid–19 vaccinations on the ...
 
6.iris recognition using machine learning technique
6.iris recognition using machine learning technique6.iris recognition using machine learning technique
6.iris recognition using machine learning technique
 
5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster5.local community detection algorithm based on minimal cluster
5.local community detection algorithm based on minimal cluster
 

Último

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptxmohitesoham12
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organizationchnrketan
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Romil Mishra
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfalene1
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...gerogepatton
 
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Amil baba
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosVictor Morales
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionSneha Padhiar
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labsamber724300
 
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...shreenathji26
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...arifengg7
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProRay Yuan Liu
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier Fernández Muñoz
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsResearcher Researcher
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...Erbil Polytechnic University
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHbirinder2
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Communityprachaibot
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxRomil Mishra
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewsandhya757531
 

Último (20)

Python Programming for basic beginners.pptx
Python Programming for basic beginners.pptxPython Programming for basic beginners.pptx
Python Programming for basic beginners.pptx
 
priority interrupt computer organization
priority interrupt computer organizationpriority interrupt computer organization
priority interrupt computer organization
 
Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________Gravity concentration_MI20612MI_________
Gravity concentration_MI20612MI_________
 
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdfComprehensive energy systems.pdf Comprehensive energy systems.pdf
Comprehensive energy systems.pdf Comprehensive energy systems.pdf
 
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
March 2024 - Top 10 Read Articles in Artificial Intelligence and Applications...
 
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
Uk-NO1 Black Magic Specialist In Lahore Black magic In Pakistan Kala Ilam Exp...
 
KCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitosKCD Costa Rica 2024 - Nephio para parvulitos
KCD Costa Rica 2024 - Nephio para parvulitos
 
Cost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based questionCost estimation approach: FP to COCOMO scenario based question
Cost estimation approach: FP to COCOMO scenario based question
 
Secure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech LabsSecure Key Crypto - Tech Paper JET Tech Labs
Secure Key Crypto - Tech Paper JET Tech Labs
 
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
Introduction to Artificial Intelligence: Intelligent Agents, State Space Sear...
 
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
Analysis and Evaluation of Dal Lake Biomass for Conversion to Fuel/Green fert...
 
A brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision ProA brief look at visionOS - How to develop app on Apple's Vision Pro
A brief look at visionOS - How to develop app on Apple's Vision Pro
 
Javier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptxJavier_Fernandez_CARS_workshop_presentation.pptx
Javier_Fernandez_CARS_workshop_presentation.pptx
 
Novel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending ActuatorsNovel 3D-Printed Soft Linear and Bending Actuators
Novel 3D-Printed Soft Linear and Bending Actuators
 
"Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ..."Exploring the Essential Functions and Design Considerations of Spillways in ...
"Exploring the Essential Functions and Design Considerations of Spillways in ...
 
Substation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRHSubstation Automation SCADA and Gateway Solutions by BRH
Substation Automation SCADA and Gateway Solutions by BRH
 
Prach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism CommunityPrach: A Feature-Rich Platform Empowering the Autism Community
Prach: A Feature-Rich Platform Empowering the Autism Community
 
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptxCurve setting (Basic Mine Surveying)_MI10412MI.pptx
Curve setting (Basic Mine Surveying)_MI10412MI.pptx
 
ASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductosASME-B31.4-2019-estandar para diseño de ductos
ASME-B31.4-2019-estandar para diseño de ductos
 
Artificial Intelligence in Power System overview
Artificial Intelligence in Power System overviewArtificial Intelligence in Power System overview
Artificial Intelligence in Power System overview
 

trust based video management framework for social multimedia networks

  • 1. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com Trust Based Video Management Framework For Social Multimedia Networks Abstract: Social Multimedia Networks (SMNs) have attracted much attention from both academia and industry due to their impact on our daily lives. The requirements of SMN users are increasing along with time, which make the satisfaction of those requirements a very challenging process. One important challenge facing SMNs consists of their internal users that can upload and manipulate insecure, untrusted and unauthorized contents. For this purpose, controlling and verifying content delivered to end-users is becoming a highly challenging process. So far, many researchers have investigated the possibilities of implementing a trustworthy SMN. In this vein, the aim of this paper is to propose a framework that allows collaboration between humans and machines to ensure secure delivery of trusted videos content over SMNs while ensuring an optimal deployment cost in the form of CPU, RAM, and storage. The key concepts beneath the proposed framework consist in i) assigning to each user a level of trust based on his/her history, ii) creating an intelligent agent that decides which content can be automatically published on the network and which content should be reviewed or rejected, and iii) checking the videos’ integrity and delivery during the streaming process. Accordingly, we ensure that the trust level of the SMNs increases. Simultaneously, efficient Capital Expenditure (CAPEX) and Operational Expenditures (OPEX) can be achieved. Index Terms—Social multimedia network, video streaming, trust model, and trust management. Existing System: users can easily discuss their ideas and opinions remotely, publish new articles, and meet new persons. Moreover, they have allowed business and organizations to advertise for their products over the world and to directly contact their customers. In addition to these social networks, other web applications, such as Youtube, Dailymotion, and Vimeo, have enabled the exchange of different contents, including text, images, and videos among different entities connected to their services. The evolution of the Internet and distributed systems has led researchers to implement applications that serve video on demand (VOD) on top of the peer-to-peer (P2P) networks.
  • 2. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com VOD and videos live streaming systems are gaining momentum in SMN. They have enabled the appearance of many multimedia-centric services such as video conferencing applications, online meeting applications, massive open online courses (MOOC) as well as other use cases in e- health and e-teaching. Such services attract and connect millions of users worldwide. The providers of these services have enabled countless features that allow users to interact among themselves by creating and sharing different contents (e.g, videos, text, and images). However, by allowing this, the nodes composing the social networks, users and machines, generate a huge amount of data, which can be uncontrolled, unsecured and untrusted . Such amount of generated data are causing a congestion to the networks and posing a new security challenge to the service providers: it becomes hard to handle and analyze all content traversing their networks. To tackle this problem, many research efforts have been conducted so far for mitigating the upload of malicious data to SMNs. Proposed system: Diverse data analytics applications have been proposed and developed with the goal to create a trustworthy SMN. The researchers’ vision of trustworthy SMNs lies in achieving certainty, authenticity, and security of data exchanged throughout social network nodes. In this vein, many trust models and reputation systems have emerged with the goal to limit the spread of unsecured data. Generally, trust models and reputation systems are designed to assign a score to each entity in the network and establish trust among them. This score may help users to make a proper decision on buying an item from an online store, selecting a service provider or recommending a service to other users. Additionally, the trust score provides decisional systems with the needed information to execute adequate actions, such as the implementation of certain policies that restraint an entity from using some resources or accessing some services. The main features that should be taken into consideration while defining a trust model are as follows: User history: The only way to predict user behavior is to study and analyze all generated content by different users during their interactions in the network . The user history records may contain relations and links between data, these links are valuable for the data analytics applications in order to offer a good user experience. Trust calculation: A user’s level of trust is one of the important metrics that should be taken into consideration when analyzing users’ data. The computation of this value includes the selection of various parameters that characterize the manipulated data. For this reason, there is a need to suggest a realistic model that can capture the characteristics of uploaded data based on the historical behavior of users. Users collaboration: Based on the observation that human intelligence is one of the main keys to effectively detect and remove untrusted data, many algorithms and applications have been recently devised for detecting and measuring users’ collaborations rate. These algorithms and
  • 3. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com applications allow users to rate different social multimedia items. Then, the system is able to collect these feedbacks, applies some filtering methods and executes different needed actions. Secure content delivery: In a trustworthy social network, every bit of data should be under control. In other words, starting from any node in the network (e.g, user, mobile, or server), the path that the data take to arrive at another node should be secured. MODULES: 1. SOCIAL NETWORK MODULE 2. SECURE VIDEOS MODULE 3. VIDEO INTEGRITY CHECKER MODULE 4. INCENTIVE MODULE 5. TRUST CALCULATION MODULE 6. VOTING SYSTEM MODULE 1. SOCIAL NETWORK MODULE(SNM) This module is the first component that interacts with the users. It permits them to do all kind of social interactions, such as the upload of videos, the post of comments, and the sharing of different videos. This module is composed of many microservices that communicate with each other in order to offer a user-friendly application that fulfills the end-users needs. The main micro-services are i) the web server that responds to the users’ requests, ii) a database that stores all information of users and their generated content, iii) a caching microservice for reducing the response time and allowing the users to have good experiences while interacting with the system, iv) a message broker that allows the communication between the different components, and v) a central authentication service that authenticates the users and gives them the right to request other services. 2. SECURE VIDEOS MODULE(SVM) This module allows authorized users to upload their media files to the secure storage, as well as it allows the social network users to watch the videos streamed on demand from the secure streaming. The SVM consists of three components: Secure storage: this component mainly works as follows: first of all, an authorized user sends an upload request to the SNM. Then, the social network module (SNM), more precisely the central authentication micro-service, generates and stores a unique token in the database, and then sends
  • 4. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com it to the user as a response. The user starts sending the video chunks to the storage server while including that token within the messages sent. The storage server (SS) checks the received token and then decides either to accept or reject the upload. This component adopts the HTTP live stream (HLS) for serving diverse users with different resolutions adapted to their network bandwidth and devices. Also, this component uses the Rivest Cipher 4 (RC4) algorithm in order to encrypt the video chunks sent to the end users. Secure transcoder: this component allows the transcoding of the uploaded videos to different resolutions using softwares such as FFMPEG. Each resolution is subdivided into small chunks of fixed time duration [35]. After the transcoding operation ends, the secure transcoder creates a hash for each chunk and sends that hash to the video integrity checker module (VICM). The VICM saves that hash in a public or private BLOCKCHAIN service as a transaction. The hashed values will be used by the user video player to verify that the chunks received were approved by the system and the chunks were not modified from the time that a user uploaded the video to the secure storage. 3. Video integrity checker module(VICM) The main feature of this module is to allow the timestamping of the chunks generated from an uploaded video. This helps in checking the integrity of these chunks in the future. Formally, the VICM module saves the video content, its signature and its date-time of creation in a trusted and a shared database. Also, this module checks that the file has not been altered or modified thanks to Blockchain technologies. Moreover, the service will be also used from a client (e.g, browser, tablet, smartphone, etc) to verify that the video chunks received were not altered during the streaming process. 4. Incentive module (IM) In order to motivate users to review some uploaded videos and decide to publish them or not, an incentive component was created to reward the users for their contributions. This component is responsible for remunerating the reviewers when they make a true vote. A vote is considered true when the decision made at the proposed framework is to publish the uploaded video. 5. Trust calculation module This sub-module has the responsibility to compute the trustworthiness of different users. For this reason, it keeps monitoring the behavior of each user by taking into consideration his/her social interactions with other users. These social interactions include, but not limited to, the following parameters: i) the number of followers (NOF); ii) the number of true votes (NOTV) received
  • 5. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com from trusted users through the voting service sub-module; iii) the percentage of true reports (PTR) received from different users of the social network; iv) the percentage of likes (POL) received from the user network mainly his friends; and v) the average trust of published videos (ATPV). For the sake of simplicity, the trust value of each user is computed using a weighted sum function of the different parameters. However, any more sophisticated method can be also used with slight modification. For instance, the entropy of Shanon can be also applied to these parameters for computing the trust degree of each user. In what follows, we will show how the trust values of users and videos are computed. 6.Voting system module The voting service is one of the main components of the system. It allows users to review and vote certain videos in order to be published or not. It also permits users to reestablish their trust level. The set of reviewers is selected according to a method that ensures that there is always a sufficient number of reviewers. The method also allows a subset of users with low values of trust to re-establish their reputations and gradually increase their factor of trust. Moreover, the voting service collects votes and sends the gathered data to the decision making algorithm. The decision algorithm explores the received feedbacks to take decisions on whether to publish or not a video. System Architecture:
  • 6. Venkat Java Projects Mobile:+91 9966499110 Visit:www.venkatjavaprojects.com Email:venkatjavaprojects@gmail.com SYSTEM REQUIREMENTS: HARDWARE REQUIREMENTS: • PROCESSOR : I3. • Hard Disk : 40 GB. • Ram : 2 GB. SOFTWARE REQUIREMENTS: • Operating system : Windows. • Coding Language : JAVA/J2EE • Data Base : MYSQL • IDE :Netbeans8.1