Leveraging Crowd Sourcing for Proficient Malevolent Users Revealing In Social Networks

  IJCTT-book-cover
 
International Journal of Computer Trends and Technology (IJCTT)          
 
© 2018 by IJCTT Journal
Volume-60 Number-2
Year of Publication : 2018
Authors : R.Madhubala,A.Prema
  10.14445/22312803/IJCTT-V60P111

MLA

R.Madhubala,A.Prema "Leveraging Crowd Sourcing for Proficient Malevolent Users Revealing In Social Networks". International Journal of Computer Trends and Technology (IJCTT) V60(2):71-76 June 2018. ISSN:2231-2803. www.ijcttjournal.org. Published by Seventh Sense Research Group.

Abstract
The past few years have been witnessing the theatrical popularity of large-scale social networks, where malicious nodes contact is one of the essential troubles. Most existing works focus on actively detecting malicious nodes by verifying signal relationship or actions consistency. It may not work well in large-scale social networks since the number of users is enormously large and the variation between normal users and malevolent users is unremarkable. In this paper, we recommend a novel approach that leverages the ability of users to present the discovery task. We intend motivation mechanism to persuade the contribution of users under two scenarios: Full Information and Partial Information. In full information scenario, we design a specific encouragement scheme for users according to their preferences, which can provide the desirable detection result and minimize overall cost. In partial information scenario, assuming that we only have statistical information about users, we first transform the incentive mechanism design to an optimization problem, and then design the optimal incentive scheme under different system parameters by solving the optimization problem. We perform extensive simulations to validate the analysis and demonstrate the impact of system factors on the overall cost.

Reference
[1] Auto-Id Labs, < http://www.autoidlabs.org/>.
[2] J.Chen, Q.Yu, B.Chai, Y.Sun, Y.Fan, and X.Shen,”Dynamic channel Assignment for wireless sensor networks: a regret matching based Approach,”IEEE Transactions on Parallel and Distributed System, vol.26, no.1, pp.95-106, 2015
[3] J.Chen, J. Li, S. He, T. He, Y. GU, and Y.Sun,”On energy-efficient trap coverage in wireless sensor networks,” CAN Trans.Sen.Netw, vol.10,no.1, pp. 2:1-2:29, 2013.
[4] Chris Eaton, Dirk Deroos, Tom Deutsch, George Lapis, and Paul Zikopoulos, Understanding Big Data: McGraw-Hill Companies, April 2012,http://public.dhe.ibm.com/common/ssi/ecm/en/im114296usen/ IML1429 6USEN.pdf [Accessed on: 2012-06-08].
[5] M. Dong, X. Liu, Z. Qian, A. Liu, and T. Wang, “Qoe-ensured price Competition model for emerging mobile networks,” IEEE Wireless Communications, vol. 22, no. 4, pp. 50–57, 2015
[6] Faraz Farooq, Zohaib Jan, “The Impact of Social Networking to Influence Marketing through Product Reviews, “International Journal of Information And Communication Technology Research, vol .2 No.8,Aug 2012,ISSN2223-4985.
[7] Hadoop.http://hadoop.apache.org/.
[8] C. Huang, R. Zhang, and S. Cui, “Throughput maximization for on thegaussian relay channel with energy harvesting constraints,” IEE Journal Selected Areas in Communications, vol. 31, no. 8, pp. 1469– 1479,2013.
[9] C. Huang, R. Zhang, and S. Cui, “Optimal power allocation for outage Probability minimization in fading channels with energy harvesting constraints,” IEEE Transactions on Wireless Communications, vol. 13,no. 2, pp. 1074–1087, 2014.
[10] G.Han, C.Zhang, L. Shu, and J.J. Rodrigues, “Impact of deployment Strategies on localization performance in under water acoustic sensornetwoks,”IEEE Transactions on Industrial Electronics, vol.62, no.3, pp.1733-1733, 2015.
[11] L. Kong, L. He, X.-Y. Liu, Y. Gu, M.-Y. Wu, and X. Liu, “Privacy Preserving compressive sensing for crowd sensing based trajectory Recovery, in Proceedings of IEEE International Conference on Systems Distributed Computing (ICDCS), pp. 31–40, and 2015.
[12] J. Liu, X. Jiang, H. Nishiyama, and N. Kato, “Performance modelling For Relay cooperation in delay tolerant networks,” Springer Mobile Networks And Applications, vol. 18, no. 2, pp. 186–194, 2013.
[13] J. Liu, N. Kato, J. Ma, and N. Kadowaki, “Device-to-device Communication in lte-advanced networks: a survey,” IEEE Communications Surveys& Tutorials, vol. 17, no. 4, pp. 1923–1940,2015.
[14] S. Liu, H. Zhu, R. Du, C. Chen, and X. Guan, “Location privacy Preserving dynamic spectrum auction in cognitive radio network,” in Proceedings of IEEE 33rd International Conference on Distributed Computing Systems (ICDCS), pp. 256–265, 2013.
[15] F.Michel,”How Many Photos are uploaded to Flickr Every Day and Month?”http://www.flickr.com/photos/franckmichel/6855169886/,2012.
[16] Paul Whitla,”Crowdsourcing and Its Application in Marketing Activities,Contemporary Management Research pages 15-28, Vol.5, No.1, and March 2009.
[17] K.Tanuja, CH.Praneeth Dr D.Haritha,”Dissecting Malicious Word, PDF Documents, “International Journal of Engineering and Advance Technology, I JSEAT, Vol 3, Issue 3, March-2015, ISSN 2321-6905.
[18] K. Wei, M. Dong, K. Ota, and K. Xu, “CAMF: Context-aware message Forwarding in mobile social networks,” IEEE Transactions on Parallel And Distributed Systems, vol. 26, no. 8, pp. 2178–2187, 2015.
[19] Xindong Wu, Fellow, IEEE, Xingquan Zhu, Gong-Qing Wu, and Wei Ding” Big Data with data mining”IEEE Transactions On Knowledgeanddataengineering, Vol.26, No.1, JANUARY 2014.
[20] Y.Zhang, S. He, and J.Chen, “Data gathering optimization by dynamic sensing and routing in rechargeable sensor networks,”IEEE/ACM T ransaction on New working 2015.DOI:10.1109/TNET.2015.2425146,toapper,
[21] K. Zheng, Z. Yang, K. Zhang, P. Chatzimisios, K. Yang, and W. Xiang,“Big data-driven optimization for mobile networks toward 5g,” IEEENetwork, vol. 30, no. 1, pp. 44–51, 2016.
[22] C.Zhou, Z. Shi, Y.Gu, and N. A. Goodman, “DOA estimation by Covariance matrix sparse reconstruction of coprime array, “in Proceedings of IEEE International Conference on Acoustics, Speech, and Processing (ICASSP),PP.2369-2373,2015

Keywords
Crowd sourcing, Social Networks, Malevolent Users Revealing, Big Data.