The ubiquity of the Internet, mobile devices and cloud computing environments can provide presence-enabled applications, social network applications/services, worldwide. Facebook, Twitter, Foursquare, Google Latitude, buddy cloud and Mobile Instant Messaging (MIM), are examples of presence-enabled applications that have grown rapidly in the last decade. Social network services are changing the ways in which participants engage […]
Tweets Monitored to detect a target event of social sensor in location estimation
Twitter, a popular microblogging service, has received much attention recently. This online social network is used by millions of people around the world to remain socially connected to their friends, family members, and coworkers through their computers and mobile phones. Twitter asks one question, “What’s happening?” Answers must be fewer than 140 characters. A status […]
Idealized security requirements: impersonation, collusion, and privacy breaching
The conventional model of social networks, users select their contacts from a set of off-line acquaintances. Despite their utility, these conventional networks support only a subset of social networking: two users will only be able to establish a relationship in the social network if they , or are introduced to each other. One more Encounter […]
Privacy Preservation in distributed social network using clustering technique
Networks are structures that describe a set of entities and the relations between them. A social network, for example, provides information on individuals in some population and the links between them, which may describe relations of friendship, collaboration, correspondence and so forth. An information network, as another example, may describe scientific publications and their citation […]
A Dynamic Load balancing distributed algorithm for a strategy in a real CDN Environment
A Content Delivery Network (CDN) represents a popular and useful solution to effectively support emerging Web applications by adopting a distributed overlay of servers. A CDN consists of an original server (called back-end server) containing new data to be diffused, together with one or more distribution servers, called surrogate servers. Periodically, the surrogate servers are […]
A Online Social network in Peer-to-peer assisted Video on Demand Network
Social networks (OSNs) (e.g., Facebook, Twitter) are now among the most popular sites on the Web. An OSN provides a powerful means of establishing social connections and sharing, organizing, and finding content. OSNs are organized around users. OSN users establish friendship relations with real world friends or virtual friends, and post their profiles and content […]
Packet driven timing scheme for dynamic routing in wireless sensor networks
WIRELESS sensor networks (WSNs) can be readily deployed in various environments to collect information in an autonomous manner, and thus can support abundant applications such as habitat monitoring, moving target tracking, and fire detection. WSNs are generally event-based systems, and consist of one or more sinks which is responsible for gathering specific data by sending […]
Network Instruction and detection of zombie exploration of security measurement, mitigation, countermeasures
RECENT studies have shown that users migrating to the cloud consider security as the most important factor. A recent Cloud Security Alliance (CSA) survey shows that among all security issues, abuse and nefarious use of cloud computing is considered as the top security threat, in which attackers can exploit vulnerabilities in clouds and utilize cloud […]
executing computations on untrusted machines in a trustworthy manner
We present sTile, a technique for building software systems that distribute large computations onto the cloud while providing guarantees that the cloud nodes cannot learn the computation’s private data. sTile is based on a nature-inspired, theoretical model of self-assembly. While sTile’s computational model is Turing universal, in this paper, we present a prototype implementation that […]
CLEAN-SLATE ROUTING IN SENSOR NETWORKS
Ad hoc low-power wireless networks are an exciting research direction in sensing and pervasive computing. Prior security work in this area has focused primarily on denial of communication at the routing or medium access control levels. This paper explores resource depletion attacks at the routing protocol layer, which permanently disable networks by quickly draining nodes’ […]