Abstract
Pervasive social networking (PSN) supports online and instant social activities and communications in a universal and pervasive manner on the basis of heterogeneous networks. However, at the same time, when mobile users expect useful and valuable contents via PSN, they may also receive unwanted, unexpected, or even malicious contents. These contents may intrude user devices, occupy device memories, and irritate mobile users. Unwanted content control in PSN has become a crucial issue that impacts the success of PSN usage. Nowadays, the literature still lacks a robust and generic unwanted content control system that can be practically applied. In this article, we present the design and implementation of PSNController, an unwanted content control system in PSN based on trust management. We evaluate the system performance under a variety of intrusions and attacks. The result shows the system is effective with regard to accuracy, efficiency, and robustness. It can control unwanted contents in PSN according to trust evaluation. We further study user acceptance on PSNController prototype system based on a small-scale user study. We receive sound user feedback on PSNController with regard to perceived ease of use, perceived usefulness, interface design, playfulness, and acceptance attitude.
- Jun Bi, Jianping Wu, and Wenmao Zhang. 2008. A trust and reputation based anti-spim method. In Proceedings of INFOCOM, (AZ), 2485--2493. DOI: 10.1109/INFOCOM.2008.319Google Scholar
Cross Ref
- Liang Chen, Zheng Yan, Weidong Zhang, and Raimo Kantola. 2014. TruSMS: A trustworthy SMS spam control system based on trust management. Future Gener. Comput. Syst. DOI: 10.1016/j.future.2014.06.010Google Scholar
Digital Library
- Fred D. Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology, Manage. MIS Quart. 13, 3, 319--340. Google Scholar
Digital Library
- Weiwei Deng and Hong Peng. 2006. Research on a naive Bayesian based short message filtering system. In Proceedings of the 5th IEEE International Conference on Machine Learning and Cybernetics, 1233--1237. DOI: 10.1109/ICMLC.2006.258644Google Scholar
Cross Ref
- EZSetup. Retrieved December 30, 2014 from http://research.microsoft.com/en-us/groups/wn/mssn.aspx.Google Scholar
- Familiar Stranger. Retrieved December 30, 2014 from http://www.paulos.net/research/intel/familiarstranger/index.htm.Google Scholar
- Kannan Govindan and Prasant Mohapatra. 2012. Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Commun. Surv. Tutor. 14, 2, 279--298. DOI: 10.1109/SURV.2011.042711.00083Google Scholar
Cross Ref
- Tyrone Grandison and Morris Sloman. 2000. A survey of trust in Internet applications. IEEE Commun. Surv. 4th Quart. 3, 4, 2--16. DOI: 10.1109/COMST.2000.5340804 Google Scholar
Digital Library
- Zoltán Gyöngyi, Hector Garcia-Molina, and Jan Pedersen. 2004. Combating web spam with trustRank. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB). Vol. 30, 576--587. Google Scholar
Digital Library
- A. Janecek, W. N. Gansterer, and K. A. Kumar. 2008. Multi-level reputation-based greylisting. In Proceedings of the Conference on Availability, Reliability and Security (ARES'08). 10--17. DOI: 10.1109/ARES.2008.187 Google Scholar
Digital Library
- Prakash Kolan and Ram Dantu. 2007. Socio-technical defense against voice spamming. ACM Trans. Autonom. Adapt. Syst. 2, 1, Article 2 (2007). DOI:10.1145/1216895.1216897 Google Scholar
Digital Library
- Wayne Liu, Sudhir Aggarwal, and Zhenhai Duan. 2009. Incorporating accountability into internet email. In Proceedings of the 2009 ACM Symposium on Applied Computing (SAC'09). ACM, New York, NY, 975--882. DOI:10.1145/1529282.1529470 Google Scholar
Digital Library
- Yuting Liu, Bin Gao, Tie-Yan Liu, Ying Zhang, Zhiming Ma, Shuyuan He, and Hang Li. 2008. BrowseRank: Letting web users vote for page importance. In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'08). ACM, New York, 451--458. DOI: 10.1145/1390334.1390412 Google Scholar
Digital Library
- Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang. 2004. URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12, 6, 1049--1063. DOI: 10.1109/TNET.2004.838598 Google Scholar
Digital Library
- J. McGibney and D. Botvich. 2007. A trust overlay architecture and protocol for enhanced protection against spam. In Proceedings of the Conference on Availability, Reliability and Security (ARES'07) (Vienna, Austria). 749--756. DOI: 10.1109/ARES.2007.28 Google Scholar
Digital Library
- MobileSocial. Retrieved December 30, 2014 from http://mobisocial.stanford.edu.Google Scholar
- Nokia-instant-community. Retrieved December 30, 2014 from http://conversations.nokia.com/2010/05/25/nokia-instant-community-gets-you-social/.Google Scholar
- Jörg Ott, Esa Hyytiä, Pasi Lassila, Jussi Kangasharju, and Sougata Santra. 2011. Floating content for probabilistic information sharing. Pervas. Mobile Comput. 7, 6, 671--689. Google Scholar
Digital Library
- Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1998. The pagerank citation ranking: Bringing order to the web. Tech. Rep., Stanford Univ., Palo Alto, CA.Google Scholar
- Emre Sarigöl, Oriana Riva, Patrick Stuedi, and Gustavo Alonso. 2009. Enabling social networking in ad hoc networks of mobile phones. Proc. VLDB Endow. 2, 2 (2009), 1634--1637. DOI: 10.14778/1687553.1687611 Google Scholar
Digital Library
- Yue Shen, Zheng Yan, and Raimo Kantola. 2014. Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Computers & Security. DOI: 10.1016/j.cose.2014.03.010Google Scholar
Digital Library
- Gaowa Shi. 2014. Performance evlaution of PSN unwanted content control system via trust management. Master's thesis, Xidian university, Xi'an, China.Google Scholar
- Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yang, and D. Alperovitch. 2008. Support vector machines and random forests modeling for spam senders behavior analysis. In Proceedings of IEEE GLOBECOM. 1--5. DOI: 10.1109/GLOCOM.2008.ECP.419Google Scholar
- Muhammad Taufiq, N. Mohd. Fikri Azli bin Abdullah, Kyunguk Kang, and Deokjai Choi. 2010. A survey of preventing, blocking and filtering Short Message Services (SMS) spam. In Proceedings of the International Conference on Computer and Electrical Engineering, 1, 462--466.Google Scholar
- UCI dataset. Retrieved December 30, 2014 from http://archive.ics.uci.edu/ml/datasets/SMS+Spam+Collection.Google Scholar
- Viswanath Venkatesh and Hillol Bala. 2008. Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39, 2, 273--315. DOI: 10.1016/j.jbi.2009.06.001Google Scholar
Cross Ref
- Baoning Wu, Vinay Goel, and Brian D. Davison. 2006. Topical TrustRank: Using topicality to combat web spam. In Proceedings of the 15th International Conference on the World Wide Web (WWW'06). ACM, New York, 63--72. DOI: 10.1145/1135777.1135792 Google Scholar
Digital Library
- Zheng Yan, Yu Chen, and Yue Shen. 2014a. PerContRep: A practical reputation system for pervasive content services. Supercomputing 70, 3, 1051--1074. DOI: 10.1007/s11227-014-1116-y Google Scholar
Digital Library
- Zheng Yan, Yu Chen, and Yue Shen. 2013a. A practical reputation system for pervasive social chatting. Elsevier's J. Comput. Syst. Sci. 79, 5, 556--572. DOI: 10.1016/j.jcss.2012.11.003 Google Scholar
Digital Library
- Zheng Yan, Raimo Kantola, Gaowa Shi, and Peng Zhang. 2013b. Unwanted content control via trust management in pervasive social networking. In Proceedings of the IEEE Conference on TrustCom/ISPA/IUCC. 202--209. DOI: 10.1109/TrustCom.2013.29 Google Scholar
Digital Library
- Zheng Yan, Raimo Kantola, and Yue Shen. 2011. Unwanted traffic control via global trust management. In Proceedings of the IEEE Conference on TrustCom. 647--654. DOI: 10.1109/TrustCom.2011.83 Google Scholar
Digital Library
- Zheng Yan, Raimo Kantola, and Yue Shen. 2012. Unwanted traffic control via hybrid trust management. In Proceedings of the IEEE Conference on TrustCom. 666--673. DOI: 10.1109/TrustCom.2012.291 Zheng Yan, Raimo Kantola and Yue Shen. 2014b. A generic solution for unwanted traffic control through trust management. New Rev. Hypermed. Multimed. 20, 1, 25--51. DOI: 10.1080/13614568.2013.832807 Google Scholar
Digital Library
- Zheng Yan and Christian Prehofer. 2011. Autonomic trust management for a component based software system. IEEE Trans. Depend. Secure Comput. 8, 6, 810--823. DOI: 10.1109/TDSC.2010.47 Google Scholar
Digital Library
- Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang. 2004. Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun. 11, 1, 38--47. DOI: 10.1109/MWC.2004.1269716 Google Scholar
Digital Library
- Hong Zhang, Haixin Duan, Wu Liu, and Jianping Wu. 2009a. IPGroupRep: A novel reputation based system for anti-spam. In Proceedings of the Conference on Ubiquitous, Autonomic and Trusted Computing. 513--518. DOI: 10.1109/UIC-ATC.2009.15 Google Scholar
Digital Library
- Jianzhong Zhang, Wei Xu, Yudi Peng, and Jingdong Xu. 2010. MailTrust: A mail reputation mechanism based on improved TrustGuard. In Proceedings of the International Conference on Communications and Mobile Computing (CMC'10). 218--220. DOI: 10.1109/CMC.2010.133 Google Scholar
Digital Library
- Xianchao Zhang, Bo Han, and Wenxin Liang. 2009b. Automatic seed set expansion for trust propagation based anti-spamming algorithms. In Proceedings of the 11th ACM International Workshop on Web Information and Data Management (WIDM'09), 31--38. DOI:http://trove.nla.gov.au/version/192964497 Google Scholar
Digital Library
- Elena Zheleva, Aleksander Kolcz, and Lise Getoor. 2008. Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Trans. Inf. Syst. 27, 1, Article 3. DOI: 10.1145/1416950.1416953 Google Scholar
Digital Library
Index Terms
PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management
Recommendations
Implementation of an SMS Spam Control System Based on Trust Management
GREENCOM-ITHINGS-CPSCOM '13: Proceedings of the 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social ComputingCommunication networks (e.g., the Internet and cellular networks) play an important role in our modern life for information dissemination and communications. However, at the same time when people gather and exchange useful information through networks, ...
The Impact of Territorial and Relational Belonging on Member Retention in Social Networking Sites
With the growth in social networking and the highly competitive nature of the social networking market, it is important to understand the factors that influence social network site SNS member retention. In order to better understand continuation ...






Comments