Abstract
Social networks have been witnessed tremendous success and become an indispensable part of people’s daily life. Thus, many other applications are integrated into social networks to achieve better popularity and efficiency. Unfortunately, novel security problems are emerging as the mutual cooperation and dependence contribute to forming the interdependent networks which are vulnerable for cascading failures. However, when it is come to the social networks involved interdependent networks, one of the most critical security threats is rumor propagation which caused harmful impact such as slander, fraud and panic. In this paper, we examined the security environment for interdependent social networks. The spreader-ignorant-doubter-stifler (SIDR) model is proposed to study the rumor spreading in the interdependent social networks. After theoretical and numerical analysis, the targeted security arrangements are proposed to enhance the security.







Similar content being viewed by others
References
Leo Y, Karsai M, Sarraute C, Fleury E (2016) Correlations of consumption patterns in social-economic networks. In: Proceedings IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Niamut O, Mu M, Denazis S, Race N (2016) Social telemedia: The relationship between social information and networked media. Computer 49(5):92–97
Vegni A, Loscr V (2015) A survey on vehicular social networks. IEEE Commun Surv Tutorials 17 (4):2397–2419
Wang H, Wang F, Liu J, lin C, Xu K, Wang C (2013) Accelerating peer-to-peer file sharing with social relations. IEEE J Sel Area Comm 31(9):66–74
Zhao WX, Li S, He Y, Chang EY, Wen J, Li X (2016) Connecting social media to E-commerce: cold-start product recommendation using microblogging information. IEEE Trans Knowl Data Eng 28(5):1147–1159
Buldyrev S, Parshani R, Paul G, Stanley H, Havlin S (2010) Catastrophic cascade of failures in interdependent networks. Nature 464:1025–1028
Schneider C, Yazdani N, Arajo N, Havlin S, Herrmann H (1969) Towards designing robust coupled networks. Sci Rep 3:1–7
Fu G, Dawson R, Khoury M, Bullock S (2014) Interdependent networks: Vulnerability analysis and strategies to limit cascading failure. Eur Phys J B 87(7):1–10
Jamilah, Handayani PW (2016) Analysis on effects of brand community on brand loyalty in the social media: A case study of an online transportation (UBER). In: Proceedings IEEE International Conference on Advanced Computer Science and Information Systems (ICACSIS)
Hu Y, Wang D, Zhong H, Wu F (2014) Socialtrust: Enabling long-term social cooperation in peer-to-peer services. Peer-to-Peer Netw Appl 7(4):525–538
Li M, Alessio B, Zhou W (2010) OST: A transaction based online social trust model for social network and file sharing security. In: Proceedings IEEE/IFIP International Conference on Embedded and Ubiquitous Computing (EUC)
Yi C, Bao Y, Jiang J, Xue Y (2014) Mitigation strategy against cascading failures on social networks. China Commun 11(8):37–46
Fire M, Goldschmidt R, Elovici Y (2014) Online social networks: Threats and solutions. IEEE Commun Surv Tut 16(4):2019–2036
Han Q, Wen H, Feng G, Wang L, Pan F (2015) Secure interdependent networks for peer-to-peer and online social network. In: Proceedings IEEE Global Communications Conference (GLOBECOM)
Daley DJ, Gani J (2000) Epidemic modelling. Cambridge University Press, Cambridge
Nekovee M, Moreno Y, Bianconi G, Marsili M (2007) Theory of rumour spreading in complex social networks. Phys A 374:457–470
Wang J, Zhao L, Huang R (2014) SIRAru rumor spreading model in complex networks. Phys A 398:43–55
Zan Y, Wu J, Li P, Yu Q (2014) SICR rumor spreading model in complex networks: Counterattack and self-resistance. Phys A 405:159–170
Wang J, Wang W, Wang C (2016) How the anti-rumor kills the rumor: Conflicting information propagation in networks. In: Proceedings IEEE International Conference on Communications (ICC)
Dang A, Smit M, Moh’d A, Minghim R, Milios E (2016) Toward understanding how users respond to rumours in social media. In: Proceedings IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM)
Wang L, Wu H, Stber GL (2017) Cooperative jamming aided secrecy enhancement in P2P communications with social interaction constraints. IEEE Trans Veh Technol 66(2):1144–1158
Parshani R, Buldyrev S, Havlin S (2010) Interdependent networks: Reducing the coupling strength leads to a change from a first to second order percolation transition. Phys Rev Lett 105:n1–n4
Khamfroush H, Bartolini N, La Porta TF, Swami A, Dillman J (2016) On propagation of phenomena in interdependent networks. IEEE Trans Netw Sci Eng 3(4)
Wattsand D, Strogatz SH (1998) Collective dynamics of small-world networks. Nature 393(6684):440–442
Barabsi AL, Albert R (1999) Emergence of scaling in random networks. Science 286(5439):509–512
Viswanath B, Mislove A, Cha M, Gummadi KP (2009) On the evolution of user interaction in facebook. In: Proceedings 2nd ACM SIGCOMM Workshop on Social Networks (WOSN’09)
He Z, Cai Z, Yu J, Wang X, Sun Y, Li Y (2017) Cost-efficient Strategies for Restraining Rumor Spreading in Mobile Social Networks, IEEE Transactions on Vehicular Technolog, early access
Han Q, Wen H, Wu J, Ren M (2015) Rumor spreading and security monitoring in complex networks. In: Proceedings LNCS International Conference on Computational Social Networks (CSoNet)
Acknowledgements
This work is supported by NSFC (Grant No. 61572114, 61379027, 61701048), RFDP (Grant No. 2016YFB0800605) and YFCU (Grant No. 2017XJZ31).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Han, Q., Wen, H. & Miao, F. Rumor spreading in interdependent social networks. Peer-to-Peer Netw. Appl. 11, 955–965 (2018). https://doi.org/10.1007/s12083-017-0616-y
Received:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s12083-017-0616-y