Sei sulla pagina 1di 42

Contents

1.Introduction
2.Existing System
3.Proposed System
4.Requirements
5.Modules description along with diagrams
6.System Architecture
7.Coding
8.Screenshots
9.Conclusion
1.Introduction
Service Oriented mobile social networks (S-MSNs) are
emerging social networking platforms over which one or more
individuals are able to communicate with local service
providers.
In the S MSNs, service providers (restaurants and grocery
stores) offer location-based services to local users and aim to
attract the users by employing various advertising approaches.
Unlike the global counterparts, the interests of the local
service providers are in serving the users in close geographic
vicinity.
In the S-MSNs, to establish the trust relations between the
service providers and the users is particularly important.
Therefore, for the users in the S-MSNs,how to enable the trust
We propose a Trustworthy Service Evaluation (TSE) system to
enable users to share service reviews in service-oriented
mobile social networks (S-MSNs).
Each service provider independently maintains a TSE for
itself, which collects and stores users reviews about its
services without requiring any third trusted authority.
The service reviews can then be made available to interested
users in making wise service selection decisions.
We identify three unique service review attacks, i.e.,
linkability, rejection, and modification attacks, and develop
sophisticated security mechanisms for the TSE to deal with
these attacks.
Specifically, the basic TSE (bTSE) enables users to distributedly and
cooperatively submit their reviews .
It restricts the service providers to reject, modify, or delete the
reviews. Thus, the integrity and authenticity of reviews are improved.
Further, we extend the bTSE to a Sybil-resisted TSE (SrTSE) to
enable the detection of two typical sybil attacks.
In the SrTSE, if a user generates multiple reviews toward a vendor in a
predefined time slot with different pseudonyms, the real identity of
that user will be revealed.
we show that the bTSE and the SrTSE effectively resist the service
review attacks and the SrTSE additionally detects the sybil attacks in
an efficient manner.
2.Existing System

Service-oriented mobile social networks (S-MSNs) are


emerging social networking platforms over which one or more
individuals are able to communicate with local service
providers.
In the S-MSNs, service providers (restaurants and grocery
stores) offer location-based services to local users and aim to
attract the users by employing various advertising approaches.
Unlike the global counterparts, the interests of the local
service providers are in serving the users in close geographic
vicinity because most users choose services based on the
comparison of the service quality and the distance advantage.
In the S-MSNs, to establish the trust relations between the
service providers and the users is particularly important.
With a higher reputation, a service provider is more likely to
be chosen by the users.
The disadvantges of Existing System are:
Vendors may reject or delete negative reviews and insert
forged positive ones
The malicious users can leave false negative reviews or drop
the reviews from others to decrease the reputation of some
particular vendors.
3.Proposed System
We extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable
the detection of two typical Sybil attacks.
In the SrTSE, if a user generates multiple reviews toward a
vendor in a predefined time slot with different pseudonyms,
the real identity of that user will be revealed.
We show that the bTSE and the SrTSE effectively resist the
service review attacks and the SrTSE additionally detects the
sybil attacks in an efficient manner.
This transformation involves distributed user cooperation ,
which improves review integrity and significantly reduces
vendors modification capability.
It presented three review attacks and shown that the bTSE can
effectively resist the review attacks without relying on a third
trusted authority.
We have also considered the notorious sybil attacks and
demonstrated that such attacks cause huge damage to the
bTSE.
The advantges of Proposed System are:
If multiple reviews with different pseudonyms from one user
are generated,the real identity will be disclosed to the public.
A user generates and submits a non forgeable review to the
vendor.
Vendors cannot reject or delete negative reviews and insert
forged positive ones
4.Requirements
Hardware Requirements:
Processor Type : Pentium IV
Speed : 2.4 GHZ
RAM : 256 MB
Hard disk : 20 GB
Keyboard : 101/102 Standard Keys
Mouse : Scroll Mouse
Software Requirements:
Operating System : Windows 7
Programming Package : Eclipse
Coding Language : Java
5.Modules description along with diagrams

Modules:
1. S-MSN Formation
2. Providing Services
3. Review Generation and Submission
4. Sybil attack Detection
1. S-MSN Formation:

. Service-oriented mobile social networks (S-MSNs) are


emerging social networking platforms over which one or more
individuals are able to communicate with local service
providers.
. In the S-MSNs, to establish the trust relations between the
service providers and the users is particularly important.
. With a higher reputation, a service provider is more likely to
be chosen by the users
2.Providing Services:
S-MSN composed of static vendors and mobile users that
interconnect opportunistically.
Each vendor is equipped with a wireless communication
device that has a large storage space.
In the TSE, the vendor stores and disseminates service
information to the users.
3.Review Generation and Submission:

Review generation rely on tokens, which gives users flexibility


to generate review.
Consider a user uj who just received a token tok from a vendor.
It checks if the received tok is valid.
This validation step has perspective that to ensure that tok is
indeed originated from the vendor and has been properly
forwarded in the past;
4.Sybil attack Detection:
The Sybil attack is launched by a group of registered users.
They aim at telling other users the bad service from a
vendor while the service of the vendor is good.
With the valid registration, these malicious users are able to
leave false reviews toward a specific vendor.
Even realizing the reviews are not in accord with the service,
the vendor cannot simply delete or reject the reviews.
If the vendor does, users will detect such behavior and
regard the vendor as a dishonest service provider.
Data Flow Diagram:
UML DIAGRAMS
Use Case Diagram:

Generate Token Msg


Vendor

Forward Token Msg


User

If token is valid attach his own review

Forward Review to Vendor

TP List Updated

Forward Token to next User

Sybil Attack Detection in SrTSE


Class Diagram:

Vendor
User
+int sid,port,count
+String service,nei +int sid,port,count

+void imageSet() +void run()


+void run() +void imageSet()
Activity Diagram:

Token Generation in vendor

User receive this token and verify

If Token is valid, attach his own review and forward to vendor

TP List Updated

Forward Token to next user

Sybil Attack Detection


Sequence Diagram:
Vendor User

1 : Generate Token Msg()

2 : Forward Token Msg()

3 : If token is valid attach his own review()

4 : Forward Review()

5 : TP List updated()

6 : Sybil Attack Detection in SrTSE()


7 : Sybil Attack Detection in SrTSE()
6.System Architecture
7.Coding
package s.msn.networks;

/**
*
* @author Seabirds
*/
public class Main {

public static void main(String[] args) {

SMSNFrame sf=new SMSNFrame();

sf.setVisible(true);

sf.setTitle("Service Oriented Mobile Social Network");


sf.setResizable(false);

SMSNReceiver sr=new SMSNReceiver(sf);

sr.start();
}
}
* To change this template, choose Tools | Templates
* and open the template in the editor.
*/
package s.msn.networks;
import java.net.DatagramPacket;
import java.net.DatagramSocket;
import java.net.InetAddress;
import java.util.Vector;
import javax.swing.table.DefaultTableModel;
/*** * @author Seabirds*/
public class SMSNReceiver extends Thread{
SMSNFrame sf;
SMSNReceiver(SMSNFrame f)
{
sf=f;
}
public void run()
{
try
{
DatagramSocket ds=new DatagramSocket(5000);
System.out.println("Port is "+5000);
while(true)
{
byte data[]=new byte[1000];
DatagramPacket dp=new DatagramPacket(data,0,data.length);
ds.receive(dp);
String str=new String(dp.getData()).trim();
System.out.println("Str is "+str);
String req[]=str.split("#");
if(req[0].equals("UserConnect"))
{
DefaultTableModel dm=(DefaultTableModel)sf.jTable1.getModel();
Vector v=new Vector();
v.add(req[1]);
dm.addRow(v);
/*for select neighbour user in userFrame*/
String user="";
for(int i=0;i<sf.jTable1.getRowCount();i++)
{
String s=sf.jTable1.getValueAt(i,0).toString();
user=user+s+"@";
}
String user1=user.substring(0,user.lastIndexOf('@')); //user Details
for(int i=0;i<sf.jTable1.getRowCount();i++)
{
String s=sf.jTable1.getValueAt(i,0).toString();
int d=Integer.parseInt(s)+7000; //for all users
String ms="ForNei#"+user1;
System.out.println("Ms is "+ms);
try
{
byte data1[]=ms.getBytes();
DatagramSocket ds1=new DatagramSocket();

DatagramPacketdp1=newDatagramPacket(data1,0,data1.length,InetAddress.getBy
Name("127.0.0.1"),d);
ds1.send(dp1);
System.out.println("send Port is "+d);
}
catch(Exception e)
{
e.printStackTrace();
}
if(req[0].equals("Group"))
{
String s[]=req[1].split("-");
DefaultTableModel
dm=(DefaultTableModel)sf.jTable3.getModel();
Vector v=new Vector();
v.add(req[2]);
v.add(s[0]);
v.add(s[1]);
dm.addRow(v);
}
}
8.Screenshots
This screen shows about the details of users and groups,which
are registered.
This Screen shows about the entering into the registration of
the service providers and users.
This Screen shows about the registration of users
and groups
This Screen shows about sevice provider and the creation of
groups with the registered users at the server side.
These screens show about the service providing at
side of server and generation acknowledgement for
all the registered users.
These screen show about view services at the vendor and
the user side.
This screen shows about the giving review of the
service and the review will be stored at local
repository.
This screen shows about the srTSE detection.
9.Conclusion

In this project, we have proposed a TSE system for S-MSNs.


This System involves distributed user cooperation, which
improves review integrity and significantly reduces vendors
modification capability.
We have presented three review attacks and shown that the
bTSE can effectively resist the review attacks.
We have also considered the notorious sybil attacks and
demonstrated that such attacks cause huge damage to the
bTSE.
The SrTSE allows users to leave only one review toward a
vendor in a predefined time slot. If multiple reviews with
different pseudonyms from one user are generated, the real
identity will be disclosed to the public.

Potrebbero piacerti anche