skip to main content
research-article

Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking

Published:05 January 2021Publication History
Skip Abstract Section

Abstract

Pervasive Social Networking (PSN) supports online and instant social activities with the support of heterogeneous networks. Since reciprocal activities among both familiar/unfamiliar strangers and acquaintances are quite common in PSN, it is essential to offer trust information to PSN users. Past work normally evaluates trust based on a centralized party, which is not feasible due to the dynamic changes of PSN topology and its specific characteristics. The literature still lacks a decentralized trust evaluation scheme in PSN. In this article, we propose a novel blockchain-based decentralized system for trust evaluation in PSN, called Social-Chain. Considering mobile devices normally lack computing resources to process cryptographic puzzle calculation, we design a lightweight consensus mechanism based on Proof-of-Trust (PoT), which remarkably improves system effectivity compared with other blockchain systems. Serious security analysis and experimental results further illustrate the security and efficiency of Social-Chain for being feasibly applied into PSN.

References

  1. Ian Grigg. [n.d.]. EOS-An Introduction. Retrieved on Dec. 18, 2020 from https://www.iang.org/papers/EOS_An_Introduction-BLACK-EDITION.pdf.Google ScholarGoogle Scholar
  2. 2017. Qtum whitepaper. Retrieved from https://whitepaperdatabase.com/qtum-whitepaper/.Google ScholarGoogle Scholar
  3. 2016. Waves whitepaper. Retrieved from https://blog.wavesplatform.com/waves-whitepaper-164dd6ca6a23.Google ScholarGoogle Scholar
  4. Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. 2018. Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 913--930.Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Mohamed Baza, Mahmoud Nabil, Mohamed Mohamed Elsalih Abdelsalam Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, and Mohamed Abdallah. 2019. Detecting Sybil attacks using proofs of work and location in vanets. IEEE Trans. Depend. Sec. Comput. arXiv:1904.05845v1.Google ScholarGoogle Scholar
  6. Iddo Bentov, Ariel Gabizon, and Alex Mizrahi. 2016. Cryptocurrencies without proof of work. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 142--157.Google ScholarGoogle ScholarCross RefCross Ref
  7. Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 (2017).Google ScholarGoogle Scholar
  8. Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI ’99), Vol. 99. 173--186.Google ScholarGoogle Scholar
  9. Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, et al. 2016. On scaling decentralized blockchains. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 106--125.Google ScholarGoogle ScholarCross RefCross Ref
  10. Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE P2P Conference. IEEE, 1--10.Google ScholarGoogle ScholarCross RefCross Ref
  11. Chrysanthos Dellarocas. 2000. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of the International Conference on Information Systems (ICIS’00). 52.Google ScholarGoogle Scholar
  12. Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation. 45--59.Google ScholarGoogle Scholar
  13. Ittay Eyal and Emin Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Kai Fan, Yanhui Ren, Zheng Yan, Shangyang Wang, Hui Li, and Yintang Yang. 2018. Secure Time synchronization scheme in IoT based on blockchain. IEEE Blockchain (2018).Google ScholarGoogle ScholarCross RefCross Ref
  15. Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, and Yintang Yang. 2018. Blockchain-based secure time protection scheme in IoT. IEEE Internet Things J. (2018).Google ScholarGoogle Scholar
  16. Dongqi Fu and Liri Fang. 2016. Blockchain-based trusted computing in social network. In Proceedings of the 2nd IEEE International Conference on Computer and Communications (ICCC’16). IEEE, 19--22.Google ScholarGoogle Scholar
  17. Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert Van Renesse, and Emin Gün Sirer. 2018. Decentralization in Bitcoin and Ethereum networks. arXiv preprint arXiv:1801.03998 (2018).Google ScholarGoogle Scholar
  18. Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 51--68.Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Linke Guo, Chi Zhang, and Yuguang Fang. 2015. A trust-based privacy-preserving friend recommendation scheme for online social networks. IEEE Trans. Depend. Sec. Comput. 12, 4 (2015), 413--427.Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Timo Hanke, Mahnush Movahedi, and Dominic Williams. 2018. Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 (2018).Google ScholarGoogle Scholar
  21. Fei Hao, Geyong Min, Man Lin, Changqing Luo, and Laurence T. Yang. 2014. MobiFuzzyTrust: An efficient fuzzy trust inference mechanism in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 25, 11 (2014), 2944--2955.Google ScholarGoogle ScholarCross RefCross Ref
  22. Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, and Huanyang Zheng. 2016. Trust evaluation in online social networks using generalized network flow. IEEE Trans. Comput. 65, 3 (2016), 952--963.Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web. ACM, 640--651.Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Sunny King and Scott Nadal. 2012. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published Paper, August 19 (2012). Retrieved on December 18. 2020 from https://decred.org/research/king2012.pdf.Google ScholarGoogle Scholar
  25. Marek Klonowski and Micha B. Koza. 2013. Countermeasures against Sybil attacks in WSN based on proofs-of-work. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 179--184.Google ScholarGoogle Scholar
  26. Daniel Larimer. 2014. Delegated proof-of-stake (DPOS). Bitshare Whitepaper (2014). Retrieved on December 2020 from https://bitcointalk.org/index.php?topic=558316.msg6082114#msg6082114.Google ScholarGoogle Scholar
  27. Guanfeng Liu, Yan Wang, Mehmet A. Orgun, and Ee-Peng Lim. 2013. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans. Serv. Comput. 6, 2 (2013), 152--167.Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 17--30.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Dianhui Mao, Fan Wang, Zhihao Hao, and Haisheng Li. 2018. Credit evaluation system based on blockchain for multiple stakeholders in the food supply chain. Int. J. Environ. Res. Pub. Health 15, 8 (2018), 1627.Google ScholarGoogle ScholarCross RefCross Ref
  30. Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 31--42.Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). Retrieved on December 18, 2020 from https://bitcoin.org/bitcoin.pdf.Google ScholarGoogle Scholar
  32. James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. 2004. The Sybil attack in sensor networks: Analysis 8 defenses. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. IEEE, 259--268.Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Daejun Park, Yi Zhang, Manasvi Saxena, Philip Daian, and Grigore Roşu. 2018. A formal verification tool for Ethereum VM Bytecode. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM, 912--915.Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, and J.-P. Hubaux. 2008. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE 27th Conference on Computer Communications. IEEE, 1238--1246.Google ScholarGoogle ScholarCross RefCross Ref
  35. Paul Resnick and Richard Zeckhauser. 2002. Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. In The Economics of the Internet and E-commerce. Emerald Group Publishing Limited, 127--157. Retrieved on December 18, 2020 from http://presnick.people.si.umich.edu/papers/ebayNBER/RZNBERBodegaBay.pdf.Google ScholarGoogle Scholar
  36. Emre Sarigöl, Oriana Riva, Patrick Stuedi, and Gustavo Alonso. 2009. Enabling social networking in ad hoc networks of mobile phones. Proc. VLDB Endow. 2, 2 (2009), 1634--1637.Google ScholarGoogle ScholarDigital LibraryDigital Library
  37. Jian Shen, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, and Xiong Li. 2017. Hierarchical trust level evaluation for pervasive social networking. IEEE Access 5 (2017), 1178--1187.Google ScholarGoogle ScholarCross RefCross Ref
  38. Melanie Swan. 2015. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc.Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. Wenbo Wang, Dinh Thai Hoang, Zehui Xiong, Dusit Niyato, Ping Wang, Peizhao Hu, and Yonggang Wen. 2018. A survey on consensus mechanisms and mining management in blockchain networks. arXiv preprint arXiv:1805.02707 (2018).Google ScholarGoogle Scholar
  40. Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yell. Pap. 151 (2014), 1--32.Google ScholarGoogle Scholar
  41. Ronghua Xu, Xuheng Lin, Qi Dong, and Yu Chen. 2018. Constructing trustworthy and safe communities on a blockchain-enabled social credits system. In Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 449--453.Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Zheng Yan, Yu Chen, and Yue Shen. 2013. A practical reputation system for pervasive social chatting. J. Comput. Syst. Sci. 79, 5 (2013), 556--572.Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Zheng Yan, Yu Chen, and Yue Shen. 2014. PerContRep: A practical reputation system for pervasive content services. J. Supercomput. 70, 3 (2014), 1051--1074.Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Zheng Yan, Wei Feng, and Pu Wang. 2015. Anonymous authentication for trustworthy pervasive social networking. IEEE Trans. Comput. Soc. Syst. 2, 3 (2015), 88--98.Google ScholarGoogle ScholarCross RefCross Ref
  45. Zheng Yan, Xueyun Li, and Raimo Kantola. 2015. Controlling cloud data access based on reputation. Mob. Netw. Applic. 20, 6 (2015), 828--839.Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. Zheng Yan, Xueyun Li, Mingjun Wang, and Athanasios V. Vasilakos. 2015. Flexible data access control based on trust and reputation in cloud computing. IEEE Trans. Cloud Comput. 5, 3 (2015), 485--498.Google ScholarGoogle ScholarCross RefCross Ref
  47. Zheng Yan and Wangyang Shi. 2017. CloudFile: A cloud data access control system based on mobile social trust. J. Netw. Comput. Applic. 86 (2017), 46--58.Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Zheng Yan, Honggang Wang, Laurence T. Yang, and Valtteri Niemi. 2018. Special section editorial: Trust management in pervasive social networking (TruPSN). IEEE Access 6 (2018), 16851--16854.Google ScholarGoogle ScholarCross RefCross Ref
  49. Zheng Yan and Mingjun Wang. 2017. Protect pervasive social networking based on two-dimensional trust levels. IEEE Syst. J. 11, 1 (2017), 207--218.Google ScholarGoogle ScholarCross RefCross Ref
  50. Zheng Yan, Pu Wang, and Wei Feng. 2018. A novel scheme of anonymous authentication on trust in pervasive social networking. Inf. Sci. 445 (2018), 79--96.Google ScholarGoogle ScholarCross RefCross Ref
  51. Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C. M. Leung. 2019. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6, 2 (2019), 1495--1505.Google ScholarGoogle ScholarCross RefCross Ref
  52. Zhe Yang, Kan Zheng, Kan Yang, and Victor C. M. Leung. 2017. A blockchain-based reputation system for data credibility assessment in vehicular networks. In Proceedings of the IEEE 28th International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’17). IEEE, 1--5.Google ScholarGoogle Scholar
  53. Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. RapidChain: Scaling blockchain via full sharding. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 931--948.Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. Bo Zhang, Ruihan Yong, Meizi Li, Jianguo Pan, and Jifeng Huang. 2017. A hybrid trust evaluation framework for e-commerce in online social network: A factor enrichment perspective. IEEE Access 5 (2017), 7080--7096.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Transactions on Internet Technology
            ACM Transactions on Internet Technology  Volume 21, Issue 1
            Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
            February 2021
            534 pages
            ISSN:1533-5399
            EISSN:1557-6051
            DOI:10.1145/3441681
            • Editor:
            • Ling Liu
            Issue’s Table of Contents

            Copyright © 2021 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 5 January 2021
            • Accepted: 1 August 2020
            • Revised: 1 July 2020
            • Received: 1 April 2020
            Published in toit Volume 21, Issue 1

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article
            • Research
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          HTML Format

          View this article in HTML Format .

          View HTML Format