Skip to main content
Top
Published in: Wireless Personal Communications 2/2018

26-12-2017

TBFN: Trust Based Friend Network Design by Analyzing User’s Voice Call and SMS Pattern

Authors: Debashis De, Biplab Chandra Dey

Published in: Wireless Personal Communications | Issue 2/2018

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

Due to rapid development of Web 2.0 Technology social networking have gained explosive growth. This paper proposes a comparatively new approach to build a trust based social network named Trust Based Friend Net (TBFN) for smartphone users. In TBFN, call log and sms log extracted from user’s smartphone are outsourced into the corresponding social network cloud. Analyzing those real datasets the cloud service provider determines trust values of different direct and indirect friends of smartphone users. Global analysis of everyone’s data results in forming a trusted global social network that is free from fake profiles and that minimizes unscrupulous activities.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference De, D. (2016). Mobile cloud computing: Architectures, algorithms and applications (pp. 1–357). Boca Raton: CRC Press.CrossRef De, D. (2016). Mobile cloud computing: Architectures, algorithms and applications (pp. 1–357). Boca Raton: CRC Press.CrossRef
2.
go back to reference Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.CrossRef Dinh, H. T., Lee, C., Niyato, D., & Wang, P. (2013). A survey of mobile cloud computing: Architecture, applications, and approaches. Wireless Communications and Mobile Computing, 13(18), 1587–1611.CrossRef
3.
go back to reference Qureshi, S. S., Ahmad, T., Rafique, K., Islam, S. U. (2011). Mobile cloud computing as future for mobile applications—Implementation methods and challenging issues. In IEEE CCIS (pp. 467–471). Qureshi, S. S., Ahmad, T., Rafique, K., Islam, S. U. (2011). Mobile cloud computing as future for mobile applications—Implementation methods and challenging issues. In IEEE CCIS (pp. 467–471).
4.
go back to reference Mukherjee, A., Gupta, P., De, D. (2014). Mobile cloud computing based energy efficient offloading strategies for femtocell network. In Applications and innovations in mobile computing, IEEE (pp. 28–35). Mukherjee, A., Gupta, P., De, D. (2014). Mobile cloud computing based energy efficient offloading strategies for femtocell network. In Applications and innovations in mobile computing, IEEE (pp. 28–35).
7.
go back to reference Kim, M., & Park, S. O. (2013). Trust management on user behavioral patterns for a mobile cloud computing. Cluster Computing, 16(4), 725–731.CrossRef Kim, M., & Park, S. O. (2013). Trust management on user behavioral patterns for a mobile cloud computing. Cluster Computing, 16(4), 725–731.CrossRef
8.
go back to reference Liu, G., Wang, Y., & Orgun, M. (2009). Trust inference in complex trust-oriented social networks. In CSE’09 international conference on computational science and engineering, IEEE (Vol. 4). Liu, G., Wang, Y., & Orgun, M. (2009). Trust inference in complex trust-oriented social networks. In CSE’09 international conference on computational science and engineering, IEEE (Vol. 4).
9.
go back to reference Kim, S., Han, S. (2009). The method of inferring trust in web-based social network using fuzzy logic. In International workshop on machine intelligence research (pp. 140–144). Kim, S., Han, S. (2009). The method of inferring trust in web-based social network using fuzzy logic. In International workshop on machine intelligence research (pp. 140–144).
10.
go back to reference Oh, H. J., Ozkaya, E., & LaRose, R. (2014). How does online social networking enhance life satisfaction? The relationships among online supportive interaction, affect, perceived social support, sense of community, and life satisfaction. Computers in Human Behavior, 30, 69–78.CrossRef Oh, H. J., Ozkaya, E., & LaRose, R. (2014). How does online social networking enhance life satisfaction? The relationships among online supportive interaction, affect, perceived social support, sense of community, and life satisfaction. Computers in Human Behavior, 30, 69–78.CrossRef
12.
go back to reference De, D., Mukherjee, A. (2014). Femtocell based economic health monitoring scheme using mobile cloud computing. In International advance computing conference, IEEE (pp. 385–390). De, D., Mukherjee, A. (2014). Femtocell based economic health monitoring scheme using mobile cloud computing. In International advance computing conference, IEEE (pp. 385–390).
14.
go back to reference Perez, C., Birregah, B., & Lemercier, M. (2013). A smartphone-based online social network trust evaluation system. Social Network Analysis and Mining, 3(4), 1293–1310.CrossRef Perez, C., Birregah, B., & Lemercier, M. (2013). A smartphone-based online social network trust evaluation system. Social Network Analysis and Mining, 3(4), 1293–1310.CrossRef
15.
go back to reference Chen, S., Wang, G., & Jia, W. (2013). A trust model using implicit call behavioral graph for mobile cloud computing (Vol. 8300, pp. 387–402). Cham: Springer International Publishing. Chen, S., Wang, G., & Jia, W. (2013). A trust model using implicit call behavioral graph for mobile cloud computing (Vol. 8300, pp. 387–402). Cham: Springer International Publishing.
16.
go back to reference Xin, L., Leyi, S., Yao, W., Zhaojun, X., Wenjing, F. (2013). A dynamic trust conference algorithm for social network. In IEEE international conference on P2P, parallel, grid, cloud and internet computing (pp. 340–346). Xin, L., Leyi, S., Yao, W., Zhaojun, X., Wenjing, F. (2013). A dynamic trust conference algorithm for social network. In IEEE international conference on P2P, parallel, grid, cloud and internet computing (pp. 340–346).
17.
go back to reference Adali, S., Escriva, R., Goldberg, M. K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B. K., Wallace, W. A., Williams, G. (2010). Measuring behavioral trust in social networks. In Intelligence and security informatics (ISI), IEEE (pp. 150–152). Adali, S., Escriva, R., Goldberg, M. K., Hayvanovych, M., Magdon-Ismail, M., Szymanski, B. K., Wallace, W. A., Williams, G. (2010). Measuring behavioral trust in social networks. In Intelligence and security informatics (ISI), IEEE (pp. 150–152).
18.
go back to reference Matsuo, Y., Tomobe, H., Hasida, K., & Ishizuka, M. (2004). Finding social network for trust calculation. ECAI, 16, 510. Matsuo, Y., Tomobe, H., Hasida, K., & Ishizuka, M. (2004). Finding social network for trust calculation. ECAI, 16, 510.
19.
go back to reference Jiang, W., Wang, G., & Wu, J. (2014). Generating trusted graphs for trust evaluation in online social networks. Future Generation Computer Systems, 31, 48–58.CrossRef Jiang, W., Wang, G., & Wu, J. (2014). Generating trusted graphs for trust evaluation in online social networks. Future Generation Computer Systems, 31, 48–58.CrossRef
20.
go back to reference Mukherjee, A., Bhattacherjee, S., Pal, S., & De, D. (2013). Femtocell based green power consumption methods for mobile network. Computer Networks, 57(1), 162–178.CrossRef Mukherjee, A., Bhattacherjee, S., Pal, S., & De, D. (2013). Femtocell based green power consumption methods for mobile network. Computer Networks, 57(1), 162–178.CrossRef
24.
go back to reference Hussain, M., & Abdulsalam, H. M. (2012). Software quality in the clouds: a cloud-based solution. Cluster Computing, 17(2), 389–402.CrossRef Hussain, M., & Abdulsalam, H. M. (2012). Software quality in the clouds: a cloud-based solution. Cluster Computing, 17(2), 389–402.CrossRef
Metadata
Title
TBFN: Trust Based Friend Network Design by Analyzing User’s Voice Call and SMS Pattern
Authors
Debashis De
Biplab Chandra Dey
Publication date
26-12-2017
Publisher
Springer US
Published in
Wireless Personal Communications / Issue 2/2018
Print ISSN: 0929-6212
Electronic ISSN: 1572-834X
DOI
https://doi.org/10.1007/s11277-017-5150-y

Other articles of this Issue 2/2018

Wireless Personal Communications 2/2018 Go to the issue