skip to main content
research-article

PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management

Published:21 October 2015Publication History
Skip Abstract Section

Abstract

Pervasive social networking (PSN) supports online and instant social activities and communications in a universal and pervasive manner on the basis of heterogeneous networks. However, at the same time, when mobile users expect useful and valuable contents via PSN, they may also receive unwanted, unexpected, or even malicious contents. These contents may intrude user devices, occupy device memories, and irritate mobile users. Unwanted content control in PSN has become a crucial issue that impacts the success of PSN usage. Nowadays, the literature still lacks a robust and generic unwanted content control system that can be practically applied. In this article, we present the design and implementation of PSNController, an unwanted content control system in PSN based on trust management. We evaluate the system performance under a variety of intrusions and attacks. The result shows the system is effective with regard to accuracy, efficiency, and robustness. It can control unwanted contents in PSN according to trust evaluation. We further study user acceptance on PSNController prototype system based on a small-scale user study. We receive sound user feedback on PSNController with regard to perceived ease of use, perceived usefulness, interface design, playfulness, and acceptance attitude.

References

  1. Jun Bi, Jianping Wu, and Wenmao Zhang. 2008. A trust and reputation based anti-spim method. In Proceedings of INFOCOM, (AZ), 2485--2493. DOI: 10.1109/INFOCOM.2008.319Google ScholarGoogle ScholarCross RefCross Ref
  2. Liang Chen, Zheng Yan, Weidong Zhang, and Raimo Kantola. 2014. TruSMS: A trustworthy SMS spam control system based on trust management. Future Gener. Comput. Syst. DOI: 10.1016/j.future.2014.06.010Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Fred D. Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology, Manage. MIS Quart. 13, 3, 319--340. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Weiwei Deng and Hong Peng. 2006. Research on a naive Bayesian based short message filtering system. In Proceedings of the 5th IEEE International Conference on Machine Learning and Cybernetics, 1233--1237. DOI: 10.1109/ICMLC.2006.258644Google ScholarGoogle ScholarCross RefCross Ref
  5. EZSetup. Retrieved December 30, 2014 from http://research.microsoft.com/en-us/groups/wn/mssn.aspx.Google ScholarGoogle Scholar
  6. Familiar Stranger. Retrieved December 30, 2014 from http://www.paulos.net/research/intel/familiarstranger/index.htm.Google ScholarGoogle Scholar
  7. Kannan Govindan and Prasant Mohapatra. 2012. Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Commun. Surv. Tutor. 14, 2, 279--298. DOI: 10.1109/SURV.2011.042711.00083Google ScholarGoogle ScholarCross RefCross Ref
  8. Tyrone Grandison and Morris Sloman. 2000. A survey of trust in Internet applications. IEEE Commun. Surv. 4th Quart. 3, 4, 2--16. DOI: 10.1109/COMST.2000.5340804 Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Zoltán Gyöngyi, Hector Garcia-Molina, and Jan Pedersen. 2004. Combating web spam with trustRank. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB). Vol. 30, 576--587. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. A. Janecek, W. N. Gansterer, and K. A. Kumar. 2008. Multi-level reputation-based greylisting. In Proceedings of the Conference on Availability, Reliability and Security (ARES'08). 10--17. DOI: 10.1109/ARES.2008.187 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Prakash Kolan and Ram Dantu. 2007. Socio-technical defense against voice spamming. ACM Trans. Autonom. Adapt. Syst. 2, 1, Article 2 (2007). DOI:10.1145/1216895.1216897 Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Wayne Liu, Sudhir Aggarwal, and Zhenhai Duan. 2009. Incorporating accountability into internet email. In Proceedings of the 2009 ACM Symposium on Applied Computing (SAC'09). ACM, New York, NY, 975--882. DOI:10.1145/1529282.1529470 Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Yuting Liu, Bin Gao, Tie-Yan Liu, Ying Zhang, Zhiming Ma, Shuyuan He, and Hang Li. 2008. BrowseRank: Letting web users vote for page importance. In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'08). ACM, New York, 451--458. DOI: 10.1145/1390334.1390412 Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang. 2004. URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12, 6, 1049--1063. DOI: 10.1109/TNET.2004.838598 Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. J. McGibney and D. Botvich. 2007. A trust overlay architecture and protocol for enhanced protection against spam. In Proceedings of the Conference on Availability, Reliability and Security (ARES'07) (Vienna, Austria). 749--756. DOI: 10.1109/ARES.2007.28 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. MobileSocial. Retrieved December 30, 2014 from http://mobisocial.stanford.edu.Google ScholarGoogle Scholar
  17. Nokia-instant-community. Retrieved December 30, 2014 from http://conversations.nokia.com/2010/05/25/nokia-instant-community-gets-you-social/.Google ScholarGoogle Scholar
  18. Jörg Ott, Esa Hyytiä, Pasi Lassila, Jussi Kangasharju, and Sougata Santra. 2011. Floating content for probabilistic information sharing. Pervas. Mobile Comput. 7, 6, 671--689. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1998. The pagerank citation ranking: Bringing order to the web. Tech. Rep., Stanford Univ., Palo Alto, CA.Google ScholarGoogle Scholar
  20. Emre Sarigöl, Oriana Riva, Patrick Stuedi, and Gustavo Alonso. 2009. Enabling social networking in ad hoc networks of mobile phones. Proc. VLDB Endow. 2, 2 (2009), 1634--1637. DOI: 10.14778/1687553.1687611 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Yue Shen, Zheng Yan, and Raimo Kantola. 2014. Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Computers & Security. DOI: 10.1016/j.cose.2014.03.010Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Gaowa Shi. 2014. Performance evlaution of PSN unwanted content control system via trust management. Master's thesis, Xidian university, Xi'an, China.Google ScholarGoogle Scholar
  23. Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yang, and D. Alperovitch. 2008. Support vector machines and random forests modeling for spam senders behavior analysis. In Proceedings of IEEE GLOBECOM. 1--5. DOI: 10.1109/GLOCOM.2008.ECP.419Google ScholarGoogle Scholar
  24. Muhammad Taufiq, N. Mohd. Fikri Azli bin Abdullah, Kyunguk Kang, and Deokjai Choi. 2010. A survey of preventing, blocking and filtering Short Message Services (SMS) spam. In Proceedings of the International Conference on Computer and Electrical Engineering, 1, 462--466.Google ScholarGoogle Scholar
  25. UCI dataset. Retrieved December 30, 2014 from http://archive.ics.uci.edu/ml/datasets/SMS+Spam+Collection.Google ScholarGoogle Scholar
  26. Viswanath Venkatesh and Hillol Bala. 2008. Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39, 2, 273--315. DOI: 10.1016/j.jbi.2009.06.001Google ScholarGoogle ScholarCross RefCross Ref
  27. Baoning Wu, Vinay Goel, and Brian D. Davison. 2006. Topical TrustRank: Using topicality to combat web spam. In Proceedings of the 15th International Conference on the World Wide Web (WWW'06). ACM, New York, 63--72. DOI: 10.1145/1135777.1135792 Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Zheng Yan, Yu Chen, and Yue Shen. 2014a. PerContRep: A practical reputation system for pervasive content services. Supercomputing 70, 3, 1051--1074. DOI: 10.1007/s11227-014-1116-y Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Zheng Yan, Yu Chen, and Yue Shen. 2013a. A practical reputation system for pervasive social chatting. Elsevier's J. Comput. Syst. Sci. 79, 5, 556--572. DOI: 10.1016/j.jcss.2012.11.003 Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Zheng Yan, Raimo Kantola, Gaowa Shi, and Peng Zhang. 2013b. Unwanted content control via trust management in pervasive social networking. In Proceedings of the IEEE Conference on TrustCom/ISPA/IUCC. 202--209. DOI: 10.1109/TrustCom.2013.29 Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Zheng Yan, Raimo Kantola, and Yue Shen. 2011. Unwanted traffic control via global trust management. In Proceedings of the IEEE Conference on TrustCom. 647--654. DOI: 10.1109/TrustCom.2011.83 Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Zheng Yan, Raimo Kantola, and Yue Shen. 2012. Unwanted traffic control via hybrid trust management. In Proceedings of the IEEE Conference on TrustCom. 666--673. DOI: 10.1109/TrustCom.2012.291 Zheng Yan, Raimo Kantola and Yue Shen. 2014b. A generic solution for unwanted traffic control through trust management. New Rev. Hypermed. Multimed. 20, 1, 25--51. DOI: 10.1080/13614568.2013.832807 Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Zheng Yan and Christian Prehofer. 2011. Autonomic trust management for a component based software system. IEEE Trans. Depend. Secure Comput. 8, 6, 810--823. DOI: 10.1109/TDSC.2010.47 Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang. 2004. Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun. 11, 1, 38--47. DOI: 10.1109/MWC.2004.1269716 Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. Hong Zhang, Haixin Duan, Wu Liu, and Jianping Wu. 2009a. IPGroupRep: A novel reputation based system for anti-spam. In Proceedings of the Conference on Ubiquitous, Autonomic and Trusted Computing. 513--518. DOI: 10.1109/UIC-ATC.2009.15 Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Jianzhong Zhang, Wei Xu, Yudi Peng, and Jingdong Xu. 2010. MailTrust: A mail reputation mechanism based on improved TrustGuard. In Proceedings of the International Conference on Communications and Mobile Computing (CMC'10). 218--220. DOI: 10.1109/CMC.2010.133 Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Xianchao Zhang, Bo Han, and Wenxin Liang. 2009b. Automatic seed set expansion for trust propagation based anti-spamming algorithms. In Proceedings of the 11th ACM International Workshop on Web Information and Data Management (WIDM'09), 31--38. DOI:http://trove.nla.gov.au/version/192964497 Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. Elena Zheleva, Aleksander Kolcz, and Lise Getoor. 2008. Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Trans. Inf. Syst. 27, 1, Article 3. DOI: 10.1145/1416950.1416953 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on Multimedia Computing, Communications, and Applications
        ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 12, Issue 1s
        Special Issue on Smartphone-Based Interactive Technologies, Systems, and Applications and Special Issue on Extended Best Papers from ACM Multimedia 2014
        October 2015
        317 pages
        ISSN:1551-6857
        EISSN:1551-6865
        DOI:10.1145/2837676
        Issue’s Table of Contents

        Copyright © 2015 ACM

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 21 October 2015
        • Accepted: 1 June 2015
        • Revised: 1 April 2015
        • Received: 1 December 2014
        Published in tomm Volume 12, Issue 1s

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader
      About Cookies On This Site

      We use cookies to ensure that we give you the best experience on our website.

      Learn more

      Got it!