Abstract
Pervasive Social Networking (PSN) supports online and instant social activities with the support of heterogeneous networks. Since reciprocal activities among both familiar/unfamiliar strangers and acquaintances are quite common in PSN, it is essential to offer trust information to PSN users. Past work normally evaluates trust based on a centralized party, which is not feasible due to the dynamic changes of PSN topology and its specific characteristics. The literature still lacks a decentralized trust evaluation scheme in PSN. In this article, we propose a novel blockchain-based decentralized system for trust evaluation in PSN, called Social-Chain. Considering mobile devices normally lack computing resources to process cryptographic puzzle calculation, we design a lightweight consensus mechanism based on Proof-of-Trust (PoT), which remarkably improves system effectivity compared with other blockchain systems. Serious security analysis and experimental results further illustrate the security and efficiency of Social-Chain for being feasibly applied into PSN.
- Ian Grigg. [n.d.]. EOS-An Introduction. Retrieved on Dec. 18, 2020 from https://www.iang.org/papers/EOS_An_Introduction-BLACK-EDITION.pdf.Google Scholar
- 2017. Qtum whitepaper. Retrieved from https://whitepaperdatabase.com/qtum-whitepaper/.Google Scholar
- 2016. Waves whitepaper. Retrieved from https://blog.wavesplatform.com/waves-whitepaper-164dd6ca6a23.Google Scholar
- Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. 2018. Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 913--930.Google ScholarDigital Library
- Mohamed Baza, Mahmoud Nabil, Mohamed Mohamed Elsalih Abdelsalam Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, and Mohamed Abdallah. 2019. Detecting Sybil attacks using proofs of work and location in vanets. IEEE Trans. Depend. Sec. Comput. arXiv:1904.05845v1.Google Scholar
- Iddo Bentov, Ariel Gabizon, and Alex Mizrahi. 2016. Cryptocurrencies without proof of work. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 142--157.Google ScholarCross Ref
- Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 (2017).Google Scholar
- Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI ’99), Vol. 99. 173--186.Google Scholar
- Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, et al. 2016. On scaling decentralized blockchains. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 106--125.Google ScholarCross Ref
- Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE P2P Conference. IEEE, 1--10.Google ScholarCross Ref
- Chrysanthos Dellarocas. 2000. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of the International Conference on Information Systems (ICIS’00). 52.Google Scholar
- Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation. 45--59.Google Scholar
- Ittay Eyal and Emin Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.Google ScholarDigital Library
- Kai Fan, Yanhui Ren, Zheng Yan, Shangyang Wang, Hui Li, and Yintang Yang. 2018. Secure Time synchronization scheme in IoT based on blockchain. IEEE Blockchain (2018).Google ScholarCross Ref
- Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, and Yintang Yang. 2018. Blockchain-based secure time protection scheme in IoT. IEEE Internet Things J. (2018).Google Scholar
- Dongqi Fu and Liri Fang. 2016. Blockchain-based trusted computing in social network. In Proceedings of the 2nd IEEE International Conference on Computer and Communications (ICCC’16). IEEE, 19--22.Google Scholar
- Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert Van Renesse, and Emin Gün Sirer. 2018. Decentralization in Bitcoin and Ethereum networks. arXiv preprint arXiv:1801.03998 (2018).Google Scholar
- Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 51--68.Google ScholarDigital Library
- Linke Guo, Chi Zhang, and Yuguang Fang. 2015. A trust-based privacy-preserving friend recommendation scheme for online social networks. IEEE Trans. Depend. Sec. Comput. 12, 4 (2015), 413--427.Google ScholarDigital Library
- Timo Hanke, Mahnush Movahedi, and Dominic Williams. 2018. Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 (2018).Google Scholar
- Fei Hao, Geyong Min, Man Lin, Changqing Luo, and Laurence T. Yang. 2014. MobiFuzzyTrust: An efficient fuzzy trust inference mechanism in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 25, 11 (2014), 2944--2955.Google ScholarCross Ref
- Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, and Huanyang Zheng. 2016. Trust evaluation in online social networks using generalized network flow. IEEE Trans. Comput. 65, 3 (2016), 952--963.Google ScholarDigital Library
- Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web. ACM, 640--651.Google ScholarDigital Library
- Sunny King and Scott Nadal. 2012. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published Paper, August 19 (2012). Retrieved on December 18. 2020 from https://decred.org/research/king2012.pdf.Google Scholar
- Marek Klonowski and Micha B. Koza. 2013. Countermeasures against Sybil attacks in WSN based on proofs-of-work. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 179--184.Google Scholar
- Daniel Larimer. 2014. Delegated proof-of-stake (DPOS). Bitshare Whitepaper (2014). Retrieved on December 2020 from https://bitcointalk.org/index.php?topic=558316.msg6082114#msg6082114.Google Scholar
- Guanfeng Liu, Yan Wang, Mehmet A. Orgun, and Ee-Peng Lim. 2013. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans. Serv. Comput. 6, 2 (2013), 152--167.Google ScholarDigital Library
- Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 17--30.Google ScholarDigital Library
- Dianhui Mao, Fan Wang, Zhihao Hao, and Haisheng Li. 2018. Credit evaluation system based on blockchain for multiple stakeholders in the food supply chain. Int. J. Environ. Res. Pub. Health 15, 8 (2018), 1627.Google ScholarCross Ref
- Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 31--42.Google ScholarDigital Library
- Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). Retrieved on December 18, 2020 from https://bitcoin.org/bitcoin.pdf.Google Scholar
- James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. 2004. The Sybil attack in sensor networks: Analysis 8 defenses. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. IEEE, 259--268.Google ScholarDigital Library
- Daejun Park, Yi Zhang, Manasvi Saxena, Philip Daian, and Grigore Roşu. 2018. A formal verification tool for Ethereum VM Bytecode. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM, 912--915.Google ScholarDigital Library
- Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, and J.-P. Hubaux. 2008. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE 27th Conference on Computer Communications. IEEE, 1238--1246.Google ScholarCross Ref
- Paul Resnick and Richard Zeckhauser. 2002. Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. In The Economics of the Internet and E-commerce. Emerald Group Publishing Limited, 127--157. Retrieved on December 18, 2020 from http://presnick.people.si.umich.edu/papers/ebayNBER/RZNBERBodegaBay.pdf.Google Scholar
- Emre Sarigöl, Oriana Riva, Patrick Stuedi, and Gustavo Alonso. 2009. Enabling social networking in ad hoc networks of mobile phones. Proc. VLDB Endow. 2, 2 (2009), 1634--1637.Google ScholarDigital Library
- Jian Shen, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, and Xiong Li. 2017. Hierarchical trust level evaluation for pervasive social networking. IEEE Access 5 (2017), 1178--1187.Google ScholarCross Ref
- Melanie Swan. 2015. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc.Google ScholarDigital Library
- Wenbo Wang, Dinh Thai Hoang, Zehui Xiong, Dusit Niyato, Ping Wang, Peizhao Hu, and Yonggang Wen. 2018. A survey on consensus mechanisms and mining management in blockchain networks. arXiv preprint arXiv:1805.02707 (2018).Google Scholar
- Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yell. Pap. 151 (2014), 1--32.Google Scholar
- Ronghua Xu, Xuheng Lin, Qi Dong, and Yu Chen. 2018. Constructing trustworthy and safe communities on a blockchain-enabled social credits system. In Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 449--453.Google ScholarDigital Library
- Zheng Yan, Yu Chen, and Yue Shen. 2013. A practical reputation system for pervasive social chatting. J. Comput. Syst. Sci. 79, 5 (2013), 556--572.Google ScholarDigital Library
- Zheng Yan, Yu Chen, and Yue Shen. 2014. PerContRep: A practical reputation system for pervasive content services. J. Supercomput. 70, 3 (2014), 1051--1074.Google ScholarDigital Library
- Zheng Yan, Wei Feng, and Pu Wang. 2015. Anonymous authentication for trustworthy pervasive social networking. IEEE Trans. Comput. Soc. Syst. 2, 3 (2015), 88--98.Google ScholarCross Ref
- Zheng Yan, Xueyun Li, and Raimo Kantola. 2015. Controlling cloud data access based on reputation. Mob. Netw. Applic. 20, 6 (2015), 828--839.Google ScholarDigital Library
- Zheng Yan, Xueyun Li, Mingjun Wang, and Athanasios V. Vasilakos. 2015. Flexible data access control based on trust and reputation in cloud computing. IEEE Trans. Cloud Comput. 5, 3 (2015), 485--498.Google ScholarCross Ref
- Zheng Yan and Wangyang Shi. 2017. CloudFile: A cloud data access control system based on mobile social trust. J. Netw. Comput. Applic. 86 (2017), 46--58.Google ScholarDigital Library
- Zheng Yan, Honggang Wang, Laurence T. Yang, and Valtteri Niemi. 2018. Special section editorial: Trust management in pervasive social networking (TruPSN). IEEE Access 6 (2018), 16851--16854.Google ScholarCross Ref
- Zheng Yan and Mingjun Wang. 2017. Protect pervasive social networking based on two-dimensional trust levels. IEEE Syst. J. 11, 1 (2017), 207--218.Google ScholarCross Ref
- Zheng Yan, Pu Wang, and Wei Feng. 2018. A novel scheme of anonymous authentication on trust in pervasive social networking. Inf. Sci. 445 (2018), 79--96.Google ScholarCross Ref
- Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C. M. Leung. 2019. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6, 2 (2019), 1495--1505.Google ScholarCross Ref
- Zhe Yang, Kan Zheng, Kan Yang, and Victor C. M. Leung. 2017. A blockchain-based reputation system for data credibility assessment in vehicular networks. In Proceedings of the IEEE 28th International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’17). IEEE, 1--5.Google Scholar
- Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. RapidChain: Scaling blockchain via full sharding. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 931--948.Google ScholarDigital Library
- Bo Zhang, Ruihan Yong, Meizi Li, Jianguo Pan, and Jifeng Huang. 2017. A hybrid trust evaluation framework for e-commerce in online social network: A factor enrichment perspective. IEEE Access 5 (2017), 7080--7096.Google ScholarCross Ref
Index Terms
- Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking
Recommendations
RTChain: A Reputation System with Transaction and Consensus Incentives for E-commerce Blockchain
Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of ThingsBlockchain technology, whose most successful application is Bitcoin, enables non-repudiation and non-tamperable online transactions without the participation of a trusted central party. As a global ledger, the blockchain achieves the consistency of ...
Trust Evaluation in Social Networking: A Review
MobiMedia '16: Proceedings of the 9th EAI International Conference on Mobile Multimedia CommunicationsSocial networking has become very popular in recent years by serving as a medium for disseminating information and connecting like-minded people. It influences today's social culture and changes the way of modern life. The success of social networking ...
Implementation of a Reputation System for Pervasive Social Networking
TRUSTCOM '11: Proceedings of the 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and CommunicationsA Mobile Ad Hoc Network (MANET) is becoming a practical platform for pervasive social networking. People chat with each other via MANET for instant social activities. How to help mobile users to build up trust in such an environment is becoming an ...
Comments