Open Access Open Access  Restricted Access Subscription or Fee Access

Reducing Of Misinformation InflunceIn Online Social Network Using Heuristic Greedy Algorithm

K Sangamma, K Nagaraju, L Venu Madhav

Abstract


Now a day we use social media to communicate and share the information throughout the world. Many of us depend on this social media now a days everything is available here, once we access the media, we lots of information about our search, there is chances of have misinformation also. The authenticity of information content is weakened, and all kinds of misinformation depend on social media to spread rapidly. Network space governance and providing a trusted network platform are of critical significance. In this paper, we analyze a problem called Reducing of Misinformation Influence (RMI) problem that stops a node set from the network. That is to say, the RMI problem is to selects the nodes from social network and blocks the nodes, so that the TAMIN is the smallest. We prove that the objective function is neither sub modular nor super modular and propose a heuristic greedy algorithm (HGA) to select top K nodes for removal

Keywords


HGA, Database, IDFusion, (RMI), Social Network, (IM)

Full Text:

PDF

References


G. Wettstein, J. Grosen, and E. Rodriguez, “IDFusion: An open architecture for Kerberos based authorization,” Proc. AFS and Kerberos BestPractices Workshop, June 2006.

A. Kehne, J. Schonwalder, and H. Langendorfer, “A nonce-based protocol for multiple authentications,” ACM SIGOPS Operating SystemReview, vol. 26, no. 4, pp. 84–89, 1992.

B. Neuman and S. Stubblebine, “A note on the use of timestamps as nonces,” Oper. Syst. Rev., vol. 27, no. 2, pp. 10–14, 1993.

J. Astorga, E. Jacob, M. Huarte, and M. Higuero, “Ladon :endto-end authorisation support for resource-deprived environments,” IETInfomration Security, vol. 6, no. 2, pp. 93–101, 2012.

S. Zhu, S. Setia, and S. Jajodia, “LEAP: efficient security mechanisms for large-scale distributed sensor networks,” Washington D.C., USA, October 2003, pp. 62–72.

A. Perrig, R. Szewczyk, D. Tygar, V. Wen, and D. Culler, “SPINS: security protocols for sensor networks,” ACM Wireless Networking, vol. 8, no. 5, pp. 521–534, 2002.

P. Kaijser, T. Parker, and D. Pinkas, “SESAME: The solution to security41 for open distributed systems,” Computer Communications, vol. 17, no. 7, pp. 501–518, 1994.

G. Wettstein, J. Grosen, and E. Rodriguez, “IDFusion: An open architecture for Kerberos based authorization,” Proc. AFS and Kerberos Best Practices Workshop, June 2006.

M. Park, H. Kim, and S. Lee, “Privacy Preserving Biometric-Based User Authentication Protocol Using Smart Cards,” in 17th International Conference on Computational Science and Engineering, Chengdu, China, 2014, pp. 1541–1544.

P. K. Dhillon and S. Kalra, “A lightweight biometrics based remote user authentication scheme for IoT services,” Journal of Information Security and Applications, vol. 34, pp. 255 – 270, 2017

L. Fan, Z. Lu, W. Wu, B. Thuraisingham, H. Ma, and Y. Bi, “Least cost rumor blocking in social networks,” presented at the IEEE 33rd Int. Conf. Distrib. Comput. Syst., Jul. 2013

L. Wu, F. Morstatter, X. Hu, and H. Liu, Big Data in Complex and Social Networks. Boca Raton, FL, USA: CRC Press, 2016, pp. 125–152.


Refbacks

  • There are currently no refbacks.


Copyright (c) 2022 Journal of Telecommunication, Switching Systems and Networks