{"id":5548,"date":"2023-08-25T18:36:10","date_gmt":"2023-08-25T18:36:10","guid":{"rendered":"https:\/\/getmyprojects.in\/projects\/?post_type=product&#038;p=5548"},"modified":"2023-10-26T10:44:45","modified_gmt":"2023-10-26T05:14:45","slug":"enabling-trustworthy-service-evaluation-in-service-oriented-mobile-social-networks","status":"publish","type":"product","link":"https:\/\/getmyprojects.in\/projects\/product\/enabling-trustworthy-service-evaluation-in-service-oriented-mobile-social-networks\/","title":{"rendered":"Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks"},"content":{"rendered":"<p style=\"text-align: justify;\"><span style=\"color: #000000;\">It propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores users\u2019 reviews about its services without requiring any third trusted authority. The service reviews can then be made available to interested users in making wise service selection decisions. It identify three unique service review attacks, i.e., linkability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basic TSE (bTSE) enables user<\/span><\/p>\n<p style=\"text-align: justify;\"><span style=\"color: #000000;\">s to distributedly and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, It extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Through security analysis and numerical results, It show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the Sybil attacks in an efficient manner. Through performance evaluation, It show that the bTSE achieves better performance in terms of submission rate and delay than a service review system that does not adopt user cooperation.<\/span><\/p>\n<ul>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">In this paper extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable the detection of two typical Sybil attacks.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">Through security analysis and numerical results, it show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the sybil attacks in an efficient manner.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">The system engages hierarchical signature and aggregate signature techniques to transform independent reviews into structured review chains . This transformation involves distributed user cooperation , which improves review integrity and significantly reduces vendors\u2019 modification capability.<\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">It presented three review attacks and shown that the bTSE can effectively resist the review attacks without relying on a third trusted authority. We have also considered the notorious sybil attacks and demonstrated that such attacks cause huge damage to the bTSE. We have subsequently modified the construction of pseudonyms and the corresponding secret keys in the bTSE, and obtained a SrTSE system.<\/span><\/li>\n<li style=\"text-align: justify;\"><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\"><strong>Advantages: <\/strong><\/span><\/li>\n<li style=\"text-align: justify;\"><span style=\"color: #000000;\">If multiple reviews with different pseudonyms from one user are generated, the real identity will be disclosed to the public. Security analysis and numerical results show the effectiveness of the SrTSE to resist the Sybil attacks.<\/span><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<table>\n<tbody>\n<tr>\n<th><strong>Project Name<\/strong><\/th>\n<td>Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks<\/td>\n<\/tr>\n<tr class=\"alt\">\n<th><strong>Front End\u00a0<\/strong><\/th>\n<td><\/td>\n<\/tr>\n<tr>\n<th><strong>Back End<\/strong><\/th>\n<td><\/td>\n<\/tr>\n<tr class=\"alt\">\n<th><strong>Software<\/strong><\/th>\n<\/tr>\n<\/tbody>\n<\/table>\n","protected":false},"featured_media":5925,"comment_status":"open","ping_status":"closed","template":"","meta":{"inline_featured_image":false},"product_cat":[29,28],"product_tag":[412,413,414,415,416,417,418,419,33,420,421,422,423,424,45,425,426,427,428,318,429,430,431,432,433,434,435,436,437,438,439,440,441,357,442,443],"_links":{"self":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5548"}],"collection":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product"}],"about":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/types\/product"}],"replies":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/comments?post=5548"}],"version-history":[{"count":2,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5548\/revisions"}],"predecessor-version":[{"id":6377,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product\/5548\/revisions\/6377"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media\/5925"}],"wp:attachment":[{"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/media?parent=5548"}],"wp:term":[{"taxonomy":"product_cat","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_cat?post=5548"},{"taxonomy":"product_tag","embeddable":true,"href":"https:\/\/getmyprojects.in\/projects\/wp-json\/wp\/v2\/product_tag?post=5548"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}