Abstract
An unprecedented information wealth produced by online social networks, further augmented by location/collocation data, is currently fragmented across different proprietary services. Combined, it can accurately represent the social world and enable novel socially aware applications. We present Prometheus, a socially aware peer-to-peer service that collects social information from multiple sources into a multigraph managed in a decentralized fashion on user-contributed nodes, and exposes it through an interface implementing nontrivial social inferences while complying with user-defined access policies. Simulations and experiments on PlanetLab with emulated application workloads show the system exhibits good end-to-end response time, low communication overhead, and resilience to malicious attacks.
- Aiello, L. M. and Ruffo, G. 2012. LotusNet: Tunable privacy for distributed online social network services. Comput. Comm. 35, 1, 75--88. Google Scholar
Digital Library
- Anderson, P. 2010. GeoS: A service for the management of geo-social information in a distributed system. Master’s thesis, University of South Florida. http://scholarcommons.usf.edu/cgi/viewcontent.cgi?article=2560&context=etd.Google Scholar
- Anderson, P., Kourtellis, N., Finnis, J., and Iamnitchi, A. 2010. On managing social data for enabling socially-aware applications and services. In Proceedings of the 3rd ACM Workshop on Social Network Systems (SNS’10). Google Scholar
Digital Library
- Benevenuto, F., Rodrigues, T., Cha, M., and Almeida, V. 2009. Characterizing user behavior in online social networks. In Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference (IMC’09). 49--62. Google Scholar
Digital Library
- Blackburn, J., Kourtellis, N., and Iamnitchi, A. 2011. Vulnerability in socially-informed peer-to-peer systems. In Proceedings of the 4th ACM Workshop on Social Network Systems (SNS’11). Google Scholar
Digital Library
- Blondel, V. D., Guillaume, J.-L., Lambiotte, R., and Lefebvre, E. 2008. Fast unfolding of communities in large networks. J. Statist. Mech. Theory Exper. 10.Google Scholar
Cross Ref
- Boshmaf, Y., Muslukhov, I., Beznosov, K., and Ripeanu, M. 2011. The Socialbot network: When bots socialize for fame and money. In Proceedings of the 27th Annual Computer Security Applications Conference (ACSAC’11). 93--102. Google Scholar
Digital Library
- Buchegger, S., Schioberg, D., Vu, L. H., and Datta, A. 2009. PeerSoN: P2P social networking: Early experiences and insights. In Proceedings of the 2nd ACM Workshop on Social Network Systems (SNS’09). 46--52. Google Scholar
Digital Library
- Castro, M., Druschel, P., Kermarrec, A. M., and Rowstron, A. 2002. Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE J. Select. Areas Comm. 20, 8, 1489--1499. Google Scholar
Digital Library
- Cutillo, L. A., Molva, R., and Strufe, T. 2010. On the security and feasibility of Safebook: A distributed privacy-preserving online social network. Privacy Ident. Manag. Life 320, 86--101.Google Scholar
Cross Ref
- Eagle, N. and Pentland, A. S. 2006. Reality mining: Sensing complex social systems. Person. Ubiq. Comput. 10, 4, 255--268. Google Scholar
Digital Library
- Friedkin, N. E. 1983. Horizons of observability and limits of informal control in organizations. Social Forces 62, 1, 57--77.Google Scholar
Cross Ref
- Garriss, S., Kaminsky, M., Freedman, M. J., Karp, B., Mazieres, D., and Yu, H. 2006. RE: Reliable email. In Proceedings of the 3rd USENIX Symposium on Networked Systems Design and Implementation (NSDI’06). 297--310. Google Scholar
Digital Library
- Gellman, B. and Poitras, L. 2013. U.S., British intelligence mining data from nine U.S. Internet companies in broad secret program. http://www.washingtonpost.com/investigations/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program/2013/06/06/3a0c0da8-cebf-11e2-8845-d970ccb04497story.html.Google Scholar
- Girvan, M. and Newman, M. E. J. 2002. Community structure in social and biological networks. Nat. Acad. Sci. USA 99, 12, 7821--7826.Google Scholar
Cross Ref
- Golbeck, J. 2007. The dynamics of web-based social networks: Membership, relationships, and change. First Monday 12, 11.Google Scholar
Cross Ref
- Golder, S. A., Wilkinson, D., and Huberman, B. A. 2007. Rhythms of social interaction: Messaging within a massive online network. In Proceedings of the 3rd International Conference on Communities and Technologies (CandT’07).Google Scholar
- Gomez, V., Kaltenbrunner, A., and Lopez, V. 2008. Statistical analysis of the social network and discussion threads in Slashdot. In Proceedings of the 17th ACM International Conference on World Wide Web (WWW’08). 645--654. Google Scholar
Digital Library
- Graffi, K., Gross, C., Stingl, D., Hartung, D., Kovacevic, A., and Steinmetz, R. 2011. LifeSocial.KOM: A secure and P2P-based solution for online social networks. In Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC’11). 554--558.Google Scholar
- Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., and Zhang, X. 2005. Measurements, analysis, and modeling of BitTorrent-like systems. In Proceedings of the 5th ACM Internet Measurement Conference (IMC’05). 35--48. Google Scholar
Digital Library
- Iamnitchi, A., Blackburn, J., and Kourtellis, N. 2012. The social hourglass: An infrastructure for socially-aware applications and services. IEEE Internet Comput. Netw. Infrastruct. 16, 3, 13--23. Google Scholar
Digital Library
- Jiang, J., Wilson, C., Wang, X., Huang, P., Sha, W., Dai, Y., and Zhao, B. Y. 2010. Understanding latent interactions in online social networks. In Proceedings of the 10th ACM SIGCOMM Internet Measurement Conference (IMC’10). 369-382. Google Scholar
Digital Library
- King, Z., Blackburn, J., and Iamnitchi, A. 2009. BatTorrent: A battery-aware BitTorrent for mobile devices. In Proceedings of the 11th International Conference on Ubiquitous Computing (Ubicomp’09).Google Scholar
- Kong, J. S., Rezaei, B. A., Sarshar, N., Roychowdhury, V. P., and Boykin, P. O. 2006. Collaborative spam filtering using e-mail networks. Comput. 39, 8, 67--73. Google Scholar
Digital Library
- Kourtellis, N. 2012. On the design of socially-aware distributed systems. Ph.D. dissertation, University of South Florida. http://scholarcommons.usf.edu/etd/4107/. Google Scholar
Digital Library
- Kourtellis, N., Finnis, J., Anderson, P., Blackburn, J., and Iamnitchi, A. 2010a. Prometheus: Distributed management of geo-social data. In Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI’10).Google Scholar
- Kourtellis, N., Finnis, J., Anderson, P., Blackburn, J., Borcea, C., and Iamnitchi, A. 2010b. Prometheus: User-controlled P2P social data management for socially-aware applications. In Proceedings of the 11th ACM/IFIP/USENIX International Middleware Conference (Middleware’10). Google Scholar
Digital Library
- Kourtellis, N. and Iamnitchi, A. 2011. Inferring peer centrality in socially-informed peer-to-peer systems. In Proceedings of the 11th IEEE International Conference on Peer-to-Peer Computing (P2P’11). 318--327.Google Scholar
- Kourtellis, N. and Iamnitchi, A. 2013. Leveraging peer centrality in the design of socially-informed P2P systems. IEEE Trans. Parallel Distrib. Syst. 25, 9.Google Scholar
- Krishnamurthy, B., Gill, P., and Arlitt, M. 2008. A few chirps about Twitter. In Proceedings of the 1st Workshop on Online Social Networks (WOSN’08). 19--24. Google Scholar
Digital Library
- Leskovec, J., Lang, K. J., Dasgupta, A., and Mahoney, M. W. 2009. Community structure in large networks: Natural cluster sizes and the absence of large well-defined clusters. Internet Math. 6, 1, 29--123.Google Scholar
- Lewis, K., Kaufman, J., Gonzalez, M., Wimmer, A., and Christakis, N. 2008. Tastes, ties, and time: A new social network dataset using Facebook.com. Soc. Netw. 30, 4, 330--342.Google Scholar
Cross Ref
- Li, J. and Dabek, F. 2006. F2F: Reliable storage in open networks. In Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS’06).Google Scholar
- Matsuo, Y., Mori, J., Hamasaki, M., Ishida, K., Nishimura, T., Takeda, H., Hasida, K., and Ishizuka, M. 2006. POLYPHONET: An advanced social network extraction system from the Web. In Proceedings of the 15th ACM International Conference on World Wide Web (WWW’06). 397--406. Google Scholar
Digital Library
- Mokhtar, S. B., McNamara, L., and Capra, L. 2009. A middleware service for pervasive social networking. In Proceedings of the 1st International Workshop on Middleware for Pervasive Mobile and Embedded Computing (M-PAC’09). Google Scholar
Digital Library
- Nguyen, T. D., Chiang, F., and Li, J. 2008. Friendstore: cooperative online backup using trusted nodes. In 1st International Workshop on Social Network Systems. Glasgow, Scotland, 37--42. Google Scholar
Digital Library
- Pietilainen, A.-K., Oliver, E., Lebrun, J., Varghese, G., and Diot, C. 2009. MobiClique: Middleware for mobile social networking. In 2nd Workshop on Online Social Networks. Barcelona, Spain, 49--54. Google Scholar
Digital Library
- Ripeanu, M., Iamnitchi, A., and Foster, I. 2002. Mapping the Gnutella network. IEEE Internet Comput. 6, 1, 50--57. Google Scholar
Digital Library
- Roberts, S. G. B. and Dunbar, R. I. M. 2010. The costs of family and friends: An 18-month longitudinal study of relationship maintenance and decay. Evolut. Human Behav. 32, 3, 186--197.Google Scholar
Cross Ref
- Rowstron, A. and Druschel, P. 2001a. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proceedings of the 1st ACM/IFIP/USENIX International Middleware Conference (Middleware’01). 329--350. Google Scholar
Digital Library
- Rowstron, A. and Druschel, P. 2001b. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP’11). 188--201. Google Scholar
Digital Library
- Sala, A., Cao, L., Wilson, C., Zablit, R., Zheng, H., and Zhao, B. Y. 2010.Measurement-calibrated graph models for social network experiments. In Proceedings of the 19th ACM International Conference on World Wide Web (WWW’10). 861--870. Google Scholar
Digital Library
- Sarigol, E., Riva, O., and Alonso, G. 2010. A tuple space for social networking on mobile phones. In Proceedings of the 26th International Conference on Data Engineering (ICDE’10). 988--991.Google Scholar
- Shakimov, A., Varshavsky, A., Cox, L. P., and Caceres, R. 2009. Privacy, cost, and availability tradeoffs in decentralized OSNs. In Proceedings of the 2nd ACM Workshop on Online Social Networks (WOSN’09). 13--18. Google Scholar
Digital Library
- Shi, X., Bonner, M., Adamic, L., and Gilbert, A. C. 2008. The very small world of the well-connected. In Proceedings of the 19th ACM Conference on Hypertext and Hypermedia (HT’08). 61--70. Google Scholar
Digital Library
- Stein, T., Chen, E., and Mangla, K. 2011. Facebook immune system. In Proceedings of the 4th ACM Workshop on Social Network Systems (SNS’11). Google Scholar
Digital Library
- The Guardian. 2014. The NSA files. (2014). http://www.theguardian.com/us-news/the-nsa-files.Google Scholar
- Toninelli, A., Pathak, A., and Issarny, V. 2011. Yarta: A middleware for managing mobile social ecosystems. In 6th Conference on Advances in Grid and Pervasive Computing (May). Finland, 209--220. Google Scholar
Digital Library
- Urdaneta, G., Pierre, G., and Van Steen, M. 2011. A survey of DHT security techniques. Comput. Surv. 43, 2. Google Scholar
Digital Library
- Wellman, B. 1988. Structural analysis: From method and metaphor to theory and substance. In Social Structures: A Network Approach. Cambridge University Press, 19--61.Google Scholar
- Wilson, C., Boe, B., Sala, A., Puttaswamy, K. P. N., and Zhao, B. Y. 2009. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems (EuroSys’09). 205--218. Google Scholar
Digital Library
- Xiang, R., Neville, J., and Rogati, M. 2010. Modeling relationship strength in online social networks. In Proceedings of the 19th ACM International Conference on World Wide Web (WWW’10). 981--990. Google Scholar
Digital Library
- Yu, H., Gibbons, P. B., Kaminsky, M., and Xiao, F. 2008. SybilLimit: A near-optimal social network defense against Sybil attacks. In Proceedings of the IEEE Symposium on Security and Privacy (SP’08). 3--17. Google Scholar
Digital Library
Index Terms
Special Issue on Foundations of Social Computing: Enabling Social Applications via Decentralized Social Data Management
Recommendations
The Social Hourglass: An Infrastructure for Socially Aware Applications and Services
As the Internet's hourglass architecture connects various resources to various applications, an infrastructure that collects information from various social signals can support an ever-evolving set of socially aware applications and services. Among the ...
Leveraging social networks for increased bittorrent robustness
CCNC'10: Proceedings of the 7th IEEE conference on Consumer communications and networking conferenceIn peer-to-peer content delivery systems, such as BitTorrent, there may exist nodes that are non-cooperative and do not contribute their upload bandwidth to the system while still downloading content from others. The current widely used countermeasures ...
Leveraging social network concepts for efficient peer-to-peer live streaming systems
MM '12: Proceedings of the 20th ACM international conference on MultimediaIn current peer-to-peer (P2P) live streaming systems, nodes in a channel form a P2P overlay for video sharing. To watch a new channel, a node depends on the centralized server to join in the overlay of the channel. The increase in the number of channels ...






Comments