A Mobile Trusted Path System Based on Social Network Data

被引:2
|
作者
Mata, Felix [1 ]
Claramunt, Christophe [2 ]
机构
[1] Natl Polytech Inst UPIITA, Mobile Comp Lab, Mexico City, DF, Mexico
[2] Naval Acad Res Inst, F-29240 Brest, France
关键词
Trusted paths; Recommender systems; Outdoor navigation;
D O I
10.1145/2820783.2820799
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Social networks provide rich data sources for analyzing people journeys in urban environments. This paper introduces a trusted path system that helps users to find their routes based in two criteria: low crime rate and no theft report. These data are obtained from two complementary sources: geo-tagged tweets from the social network Twitter, and an official database given by the Police of Mexico City. Recommended paths are computed automatically from these data sources by a complementary application of social mining techniques, Bayes algorithm and an adaptation of the Dijkstra algorithm. This system can be also used to identify the probability that an event occurs in specific locations and times. A proof of concept of the system is illustrated through two example scenarios.
引用
收藏
页数:4
相关论文
共 50 条
  • [41] Build a trusted storage system on a mobile phone
    Zhang, Qiang
    Qiao, JianZhong
    Meng, QingYang
    IET INFORMATION SECURITY, 2019, 13 (02) : 157 - 166
  • [42] A Blockchain-Based Mobile IOT Network Interconnection Security Trusted Protocol Model
    Zhang, Baochang
    Li, Juan
    Zheng, Xi
    Ge, Jingjun
    Sun, Juan
    CYBERSPACE SAFETY AND SECURITY, PT II, 2019, 11983 : 372 - 381
  • [43] Research on Privacy Protection Technology of Mobile Social Network Based on Data Mining under Big Data
    Du, Jiawen
    Pi, Yong
    SECURITY AND COMMUNICATION NETWORKS, 2022, 2022
  • [44] A Secure Autonomic Mobile Ad-hoc Network based Trusted Routing Proposal
    Dhanya, K.
    Jeyalakshmi, C.
    Balakumar, A.
    2019 INTERNATIONAL CONFERENCE ON COMPUTER COMMUNICATION AND INFORMATICS (ICCCI - 2019), 2019,
  • [45] A Cooperative rintrusion detection algorithm based on trusted voting for mobile ad hoc network
    Malek, Seyyedeh Fatemeh
    Khorsandi, Siyavash
    2013 21ST IRANIAN CONFERENCE ON ELECTRICAL ENGINEERING (ICEE), 2013,
  • [46] Towards efficient sharing of encrypted data in cloud-based mobile social network
    Sun, Xin
    Yao, Yiyang
    Xia, Yingjie
    Liu, Xuejiao
    Chen, Jian
    Wang, Zhiqiang
    KSII TRANSACTIONS ON INTERNET AND INFORMATION SYSTEMS, 2016, 10 (04): : 1892 - 1903
  • [47] Network Effect-Based Sequential Dynamic Pricing for Mobile Social Data Market
    Xiong, Zehui
    Feng, Shaohan
    Niyato, Dusit
    Wang, Ping
    Han, Zhu
    GLOBECOM 2017 - 2017 IEEE GLOBAL COMMUNICATIONS CONFERENCE, 2017,
  • [48] A spontaneous social network based on mobile devices
    da Costa, Cristiano Andre
    Zaupa, Dante
    Victoria Barbosa, Jorge Luis
    Righi, Rodrigo da Rosa
    de Camargo, Joao
    Daroit, Nikolas
    Yamin, Adenauer Correa
    SOCIAL NETWORK ANALYSIS AND MINING, 2014, 4 (01) : 1 - 13
  • [49] A trust evaluation system based on reputation data in Mobile edge computing network
    Deng, Xiaoheng
    Liu, Jin
    Wang, Leilei
    Zhao, Zhihui
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1744 - 1755
  • [50] An Agent-based Mobile Social Network
    Fortino, Giancarlo
    Palau, Carlos E.
    2012 INTERNATIONAL CONFERENCE ON MULTIMEDIA COMPUTING AND SYSTEMS (ICMCS), 2012, : 960 - 966