Abstract
Self-organized networks based on mobile devices, e.g., mobile ad hoc networks (MANET), are becoming a practical platform for mobile social networking. People, either familiar or strangers, communicate with each other via such a network for instant social activities. How to help mobile users to build up trust in mobile social networking is becoming an important and interesting issue. Trust concerns not only security, but also privacy, as well as quality of social networking experiences. It relates to many properties that are essential for establishing a trust relationship in ephemeral and dynamically changed mobile social environments. This book chapter reviews the literature with regard to how to build up trust in mobile social networking. We explore whether mobile social networking is demanded, considering many existing popular Internet social networking services. Based on a need assessment survey, we propose a trust management framework that supports context-aware trust/reputation generation, trustworthy content recommendations, secure communications, unwanted traffic control, user privacy recommendation and preservation, and other trust and privacy enhancement technologies. Simulations, prototype implementation, and trial experiments further prove the effectiveness of proposed solutions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Aad, I., & Niemi, V. (2010). NRC data collection and privacy by design principles. In Proceedings of PhoneSense (pp. 41–45). Zurich, Switzerland.
Adler, BT., & Alfaro, L. (2007). A content-driven reputation system for the Wikipedia. In WWW (pp. 261–270). Banff, Alberta, Canada.
Ahn, J., & Amatriain, X. (2010). Towards fully distributed and privacy-preserving recommendations via expert collaborative filtering and RESTful linked data. In WI-IAT’10 (pp. 66–73). Toronto, Canada.
Ahtiainen, A., et al. (2009). Awareness networking in wireless environments: Means of exchanging information. IEEE Vehicular Technology Magazine, 4(3), 48–54.
Bansal, S., & Baker, M. (2003). Observation-based cooperation enforcement in ad hoc networks (Technical Report No. NI/0307012). Stanford University, CA, USA.
Basin, D., Klaedtke, F., Muller, S., Pfitzmann, B. (2008). Runtime monitoring of metric first-order temporal properties. In Proceedings of FSTTCS (pp. 49–60), Bangalore: India.
Beach, A., Gartrell, M., Han, R. (2009). Solutions to security and privacy issues in mobile social networking. In International conference on computational science and engineering, 2009, CSE ’09 (Vol. 4, pp. 1036–1042). Vancouver.
Becchetti, L., Castillo, C., Donato, D. et al. (2006). Using rank propagation and probabilistic counting for link-based spam detection. In Proceedings of WebKDD. Philadelphia, August 20, 2006.
Berkovsky, S. (2010). Putting things in context: Challenge on context-aware movie recommendation. In Proceedings of the workshop on context-aware movie recommendation (pp 2–6). Barcelona.
Bethencourt, J., Sahai, A., Waters, B. (2007). Ciphertext-policy attribute-based encryption. In Proceedings of the 2007 IEEE symposium on security and privacy (pp. 321–334). Oakland.
Bi, J., Wu, J., Zhang, W. (2008). A trust and reputation based anti-spam method. IEEE INFOCOM, 2485–2493.
Bilge, A., & Polat, H. (2010). Improving privacy-preserving NBC-based recommendations by preprocessing. WI-IAT (pp. 143–147). Toronto.
Bilogrevic, I., Jadliwala, M., Lam, I., et al. (2012). Big Brother knows your friends: On privacy of social communities in pervasive networks. In Proceedings of the 10th International Conference on Pervasive Computing. Newcastle, UK
Bindschaedler, L., Jadliwala, M., Bilogrevic, I., Aad, I., Ginzboorg, P., Niemi, V., Hubaux, J.P. (2012). Track me if you can: On the effectiveness of context-based identifier changes in deployed mobile networks. In Proceedings of the 19th Annual Network & Distributed System Security Symposium (NDSS). Hilton San Diego Resort & Spa, US.
Biswas, D., Nefedov, N., Niemi, V. (2011). Distributed usage control the 8th International Conference on Mobile Web Information Systems (MobiWIS 2011). In Proceedings. of MobiWIS. Procedia Computer Science 5, 562–569. Niagara Falls, Ontario, Canada
Blaze, M., Feigenbaum, J., Lacy, J. (1996). Decentralized trust management. In Proceedings. of the IEEE Conference on Security and Privacy. (pp. 164–173). Oakland, CA
Buchegger, S., & Boudec, J.L. (2002). Performance analysis of the CONFIDANT protocol. In Proceedings of the ACM International Symposium on Mobile Ad Hoc Networking and Computing (MobiHoc) Lausanne, Switzerland. (pp. 226–236).
Buchegger, S., & Boudec, J.Y.L. (2003). The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In Proceedings of WiOpt Modeling and Optimization in Mobile, Ad Hoc and Wireless Networks. Sophia-Antipolis, France.
Chen, Y. (2010). A privacy-enhanced reputation system for mobile ad hoc services. Master thesis, Aalto University, Espoo, Finland.
Chen, G., & Rahman, F. (2008). Analyzing privacy designs of mobile social networking applications. In IEEE/IFIP International Conference on Embedded and Ubiquitous Computing, EUC’08: Shanghai, China. Vol. 2. (pp. 83–88).
Chen, Y., Yan, Z., Niemi, V. (2011). Implementation of a reputation system for pervasive social networking. In IEEE TrustID 2011 (pp. 857–862). Changsha, China.
Chuong, C., Torabi, T., Loke, S.W. (2009). Towards context-aware task recommendation. In JCPC’09 (pp. 289–292). Taiwan.
Corritore, C. L., Kracher, B., & Wiedenbeck, S. (2003). On-line trust: Concepts, evolving themes, a model. International Journal of Human–Computer Studies, Trust and Technology, 58(6), 737–758.
Davis, F. D. (1989). Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Quarterly, 13(3), 319–340.
Douceur, J.R. (2002). The Sybil attack. In IPTPS, LNCS 2429 (pp. 251–260). Cambridge, MA, USA.
EZSetup. (2012). http://research.microsoft.com/en-us/groups/wn/mssn.aspx. Accessed 20 June 2012.
Goyal, V., Pandey, O., Sahai, A., et al. (2006). Attribute-based encryption for fine-grained access control of encrypted data. In Proceedings of the 13th ACM Conference on Computer and Communications Security (pp. 89–98). Alexandria, VA, USA.
Gupta, M., Judge, P., Ammar, M. (2003). A reputation system for peer-to-peer networks. In Proceedings of the 13th international workshop on network and operating systems support for digital audio and video (NOSSDAV ’03), Monterey (pp. 144–152). New York: ACM.
Gupta, A., Miettinen, M., Asokan, N. (2011). Using context-profiling to aid access control decisions in mobile devices. In Proceedings of PerCom Workshops (pp. 310–312). Seattle, WA, USA.
Hancock, J.T., Toma, C., Ellison, N. (2007). The truth about lying in online dating profiles. Proceedings of the ACM CHI 2007 (pp. 449–452). San Jose, California, USA.
Hu, J., & Burmester, M. (2006). LARS: A locally aware reputation system for mobile ad hoc networks. In Proceedings of the 44th ACM Annual Southeast Regional Conference (pp. 119–123). Melbourne, FL, USA.
Hyytia, E., Virtamo, J., Lassila, P., Kangasharju, J., Ott, J. (2011). When does content float? Characterizing availability of anchored information in opportunistic content sharing. In Proceedings of IEEE INFOCOM (pp. 3137–3145). Shanghai, China.
Jadliwala, M., Freudiger, J., Aad, I., Hubaux, J.P., Niemi, V. (2011). Privacy-triggered communications in pervasive social networks. In Proceedings of IEEE WoWMoM Workshop on Autonomic and Opportunistic Communications (pp. 1–6). Lucca, Italy.
Jøsang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2), 618–644. Elsevier.
Junction. (2012). Harvard MobiSocial Group. http://openjunction.org/. Accessed 20 June 2012.
Katzenbeisser, S., & Petkovic, M. (2008). Privacy-preserving recommendation systems for consumer healthcare services. In ARES’08 (pp. 889–895). Barcelona , Spain.
Kikuchi, H. (2009). Privacy-preserving collaborative filtering schemes. In ARES’09 (pp. 911–916). Fukuoka, Japan.
Kiukkonen, N., Blom, J., Dousse, O., Gatica-Perez, D., Laurila, J. (2010). Towards rich mobile phone datasets: Lausanne data collection campaign. In Proceedings of ICPS. Berlin, Germany.
Kolan, P., & Dantu, R. (2007). Socio-technical defense against voice spamming. ACM Transactions on Autonomous and Adaptive Systems, 2(1), Article 2(44).
Krishna, P., Puttaswamy, N., Zhao, B. (2010). Preserving privacy in location-based mobile social applications. In Proceedings of the Eleventh Workshop on Mobile Computing Systems & Applications (HotMobile '10) Annapolis, Maryland, US (pp. 1–6). New York: ACM.
Kujimura, K., & Nishihara, T. (2003). Reputation rating system based on past behavior of evaluators. In Proceedings of the 4th ACM Conference on Electronic Commerce (pp. 246–247). San Diego, CA, USA.
Li, J., Li, R., Kato, J., et al. (2008). Future trust management framework for mobile ad hoc networks. IEEE Communications Magazine, 46(4), 108–115.
Li, T., Gao, C., Du, J. (2009). A NMF-based privacy-preserving recommendation algorithm. In ICISE’09 (pp. 754–757). Nanjing, China.
Liiv, I., Tammet, T., Ruotsalo, T. et al. (2009). A: Personalized context-aware recommendations in SMARTMUSEUM: Combining semantics with statistics. In SEMAPRO ’09 (pp. 50–55). Sliema, Malta.
Liu, Z., Yau, S.S., Peng, D. et al. (2008a). A flexible trust model for distributed service infrastructures. In Proceedings of 11th IEEE Symposium on Object Oriented Real-Time Distributed Computing (pp. 108–115). Orlando, Florida, USA.
Liu, D., Meng, X., Chen, J. (2008b). A framework for context-aware service recommendation. In ICACT 2008 (pp. 2131–2134). Gangwon-Do, Korea (South).
Luo, Y., Le, J., Chen, H. (2009). A privacy-preserving book recommendation model based on multi-agent. WCSE ’09 (pp. 323–327). Xiamen, China.
Michiardi, P., & Molva, R. (2002). Core: A COllaborative REputation mechanism to enforce node cooperation in mobile ad hoc networks. In Advanced Communications and Multimedia Security, LNCS 2828 (pp. 107–121). Portorož, Slovenia.
MicroBlog. (2012). SyNRG, Duke University. http://synrg.ee.duke.edu/microblog.html. Accessed 20 June 2012.
Miluzzo, E., Lane, N., Fodor, K. et al. (2008). Sensing meets mobile social networks: The design, implementation and evaluation of the CenceMe application. In Proceedings of the 6th ACM Conference on Embedded Network Sensor Systems (SenSys ‘08) (pp. 337–350). Raleigh, NC, USA.
Muller, S., Katzenbeisser, S., Eckert, C. (2008). Distributed attribute-based encryption. In Proceedings of the 11th Annual International Conference on Information Security and Cryptology (pp. 20–36). Seoul, Korea.
Nokia Instant Community. (2010a). https://lausanne.nokiaresearch.com/nic/. Accessed 20 June 2012.
Nokia Instant Community. (2010b). http://conversations.nokia.com/2010/05/25/nokia-instant-community-gets-you-social/. Accessed 20 June 2012.
Nokia. (2012). Mobile Data Challenge. Workshop in Pervasive 2012. Newcastle, UK. http://pervasiveconference.org. Accessed August 31, 2013.
O’Donovan, J., & Smyth, B. (2006). Trust in recommender systems. In IUI’05 (pp. 167–174).
Ott, J., Hyytiä, E., Lassila, P. E., Kangasharju, J., & Santra, S. (2011). Floating content for probabilistic information sharing. Pervasive and Mobile Computing, 7(6), 671–689.
Polat, H., & Du. W.L. (2005). Privacy-preserving top-n recommendation on horizontally partitioned data. In The 2005 IEEE/WIC/ACM International Conference on Web Intelligence Compiegne University of Technology, France. (pp. 725–731).
Paulos, E. and Goodman, G. (2002). http://www.paulos.net/research/intel/familiarstranger/index.htm. Accessed 20 June 2012.
Raya, M., Papadimitratos, P., Gligory, VD. et al. (2008). On data-centric trust establishment in ephemeral ad hoc networks. In IEEE INFOCOM, Phoenix, AZ, US. 1912–1920.
Resnick, P., & Varian, H. R. (1997). Recommender systems. Communications of the ACM, 40(3), 56–58.
Resnick, P., & Zeckhauser, R. (2002). Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. In M. Baye (Ed.), The economics of the Internet and e-commerce (Advances in applied microeconomics, Vol. 11, pp. 127–157). Amsterdam: Elsevier.
Resnick, P., Kuwabara, K., Zeckhauser, R., et al. (2000). Reputation systems. Communications of the ACM, 43(12), 45–48.
Sadeh, N., Hong, J., Cranor, L., et al. (2009). Understanding and capturing people’s privacy policies in a mobile social networking application. Personal and Ubiquitous Computing, 13(6), 401–412.
Sahai, A., & Waters, B. (2005). Fuzzy identity-based encryption. In Proceedings of 24th International Conference on the Theory and Application of Cryptographic Techniques (pp. 457–473). Aarhus, Denmark.
Seetharam, A., & Ramakrishnan, R. (2008). A context-sensitive, yet private experience towards a contextually apt recommendation of service. In IMSAA 2008 (pp. 1–6). Bangalore.
Song, S., Hwang, K., Zhou, R., et al. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.
Stuedi, P., et al. (2008). Demo abstract ad hoc social networking using MAND. http://www.iks.inf.ethz.ch/publications/files/mobicom08_demo.pdf, Accessed 25 June 2010
Su, X., & Khoshgoftaar, T.M. (2009). A survey of collaborative filtering techniques. Advances in Artificial Intelligence 19p. doi:10.1155/2009/421425.
Sun, Y., Yu, W., Han, Z., et al. (2006a). Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Area in Communications, 24(2), 305–317.
Sun, Y., Han, Y.Z., Yu, W. et al. (2006b). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. IEEE INFOCOM (pp. 1–13). Barcelona, Spain.
Sun, Y., Han, Z., & Liu, K. J. (2008). Defense of trust management vulnerabilities in distributed networks. IEEE Communications Magazine, 46(2), 112–119.
Tada, M., Kikuchi, H., Puntheeranurak, S. (2010). Privacy-preserving collaborative filtering protocol based on similarity between items. AINA’10 (pp. 573–578). Perth, Australia.
Tang, Y., Krasser, S., He, Y. et al. (2008). Support vector machines and random forests modeling for spam senders behavior analysis. In IEEE GLOBECOM (pp. 1–5). New Orleans, LA, US.
Theodorakopoulos, G., & Baras, J. S. (2006). On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications, 24(2), 318–332.
Trifunovic, S., Legendre, F., Anastasiades, C. (2010). Social trust in opportunistic networks. IEEE INFOCOM Workshops, 1–6. San Diego, CA, US.
Venkatesh, V., & Bala, H. (2008). Technology acceptance model 3 and a research agenda on interventions. Decision Sciences, 39(2), 273–315.
Walsh, K., & Sirer, E.G. (2005) Fighting peer-to-peer SPAM and decoys with object reputation. In Proceedings of P2PECON (pp. 138–143). Philadelphia, Pennsylvania, USA.
Wang, J. (2010). Mining context-related sequential patterns for recommendation systems. In CAMP’10 (pp. 270–275). Shah Alam, Malaysia.
Wang, G., Liu, Q., Wu, J. (2010). Hierarchical attribute-based encryption for fine-grained access control in cloud storage services. In Proceedings of the 17th ACM Conference on Computer and Communications Security (Poster) (pp. 735–737). Hyatt Regency Chicago, Chicago, IL, USA.
Wu, B. et al. (2006). Topical TrustRank: Using topicality to combat web spam. In WWW ‘06: Proceedings of the 15th international conference on World Wide Web (pp. 63–72). Edinburgh, Scortland.
Xiao, H. (2010). An approach for context-aware service discovery and recommendation. In IEEE ICWS’10 (pp. 163–170). Miami, Florida, USA.
Xiong, L., & Liu, L. (2004). PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843–857.
Yan, Z. (Ed.). (2010). Trust modeling and management in digital environments: From social concept to system development. Hershey: IGI Global.
Yan, Z., & Chen, Y. (2010). AdContRep: A privacy-enhanced reputation system for MANET content services. In UIC 2010, LNCS 6406, (pp. 414–429). Xi’an, China.
Yan, Z., & Chen, Y. (2011). AdChatRep: A reputation system for MANET chatting. In SCI2011 in UbiComp2011 (pp. 43–48). Beijing, China.
Yan, Z., & Holtmanns, S. (2008). Trust modeling and management: From social trust to digital trust. In R. Subramanian (Ed.), Computer security, privacy and politics: Current issues, challenges, and solutions (pp. 290–323). Hershey: Idea Group.
Yan, Z., & Niemi, V. (2009). A methodology towards usable trust management. In Proceedings of ATC’09, LNCS 5586 (pp. 179–193). Brisbane, Australia.
Yan, Z., & Zhang, P. (2011). AdPriRec: A context-aware recommender system for user privacy in MANET services. In UIC2011, LNCS 6905 (pp. 295–309). Banff, Canada.
Yan, Z., Liu, C., Niemi, V., Yu, G. (2009). Trust information indication: Effects of displaying trust information on mobile application usage (Technical Report No. NRC-TR-2009-004). Nokia Research Center. http://research.nokia.com/files/NRCTR2009004.pdf.
Yan, Z., Zhang, P., & Deng, R. H. (2012a). TruBeRepec: A trust-behavior-based reputation and recommender system for mobile applications. Journal of Personal and Ubiquitous Computing, 16(5), 485–506. Springer.
Yan, Z., Kantola, R., Shen, Y. (2012b). Unwanted traffic control via hybrid trust management. In IEEE TrustCom 2012. Liverpool, UK.
Yang, Y., Sun, Y., Kay, S. et al. (2002). Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In SAC’09, 2009 (pp. 1308–1315). Hawaii, USA.
Yap, G. (2007). Discovering and exploiting causal dependencies for robust mobile context-aware recommenders. IEEE Transactions on Knowledge and Data Engineering, 19(7), 977–992.
Yu, Z., Zhou, X., Zhang, D., et al. (2006). Supporting context-aware media recommendations for smart phones. IEEE Pervasive Computing, 5(3), 68–75.
Zhang, J. (2010). MailTrust: A mail reputation mechanism based on improved TrustGuard. In International Conference on Communications and Mobile Computing (CMC) (pp. 218–222). Shenzhen, China.
Zhang, D., & Yu, Z. (2007). Spontaneous and context-aware media recommendation in heterogeneous spaces. In IEEE VTC’07 (pp. 267–271). Baltimore, MD, USA.
Zhang, H., Duan, H., Liu, W. et al. (2009a). IPGroupRep: A novel reputation-based system for anti-spam. In Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing (pp. 513–518). Brisbane, QLD.
Zhang, X., Han, B., Liang, W. (2009b). Automatic seed set expansion for trust propagation based on anti-spamming algorithms. In WIDM’09, Proceeding of the Eleventh International Workshop on Web Information and Data Management (pp. 31–38). HongKong, China.
Zouridaki, C., Mark, B.L., Hejmo, M. et al. (2006). Robust cooperative trust establishment for MANETs. In SASN ’06: Proceedings of the fourth ACM Workshop on Security of Ad Hoc and Sensor Networks (pp. 23–24). Alexandria, VA, USA.
Acknowledgments
This work is sponsored by the Fundamental Research Funds for the Central Universities with the grant number K5051201032 and the initial grant of Chinese Educational Ministry for researchers returned from abroad. The authors would like to thank Nokia Research Center. Part of the work for this chapter was conducted and sponsored by Nokia Research Center, Helsinki and Nokia Research Center, Lausanne.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer Science+Business Media New York
About this chapter
Cite this chapter
Yan, Z., Niemi, V., Chen, Y., Zhang, P., Kantola, R. (2014). Towards Trustworthy Mobile Social Networking. In: Chin, A., Zhang, D. (eds) Mobile Social Networking. Computational Social Sciences. Springer, New York, NY. https://doi.org/10.1007/978-1-4614-8579-7_9
Download citation
DOI: https://doi.org/10.1007/978-1-4614-8579-7_9
Published:
Publisher Name: Springer, New York, NY
Print ISBN: 978-1-4614-8578-0
Online ISBN: 978-1-4614-8579-7
eBook Packages: Physics and AstronomyPhysics and Astronomy (R0)