skip to main content
research-article

PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management

Published: 21 October 2015 Publication History

Abstract

Pervasive social networking (PSN) supports online and instant social activities and communications in a universal and pervasive manner on the basis of heterogeneous networks. However, at the same time, when mobile users expect useful and valuable contents via PSN, they may also receive unwanted, unexpected, or even malicious contents. These contents may intrude user devices, occupy device memories, and irritate mobile users. Unwanted content control in PSN has become a crucial issue that impacts the success of PSN usage. Nowadays, the literature still lacks a robust and generic unwanted content control system that can be practically applied. In this article, we present the design and implementation of PSNController, an unwanted content control system in PSN based on trust management. We evaluate the system performance under a variety of intrusions and attacks. The result shows the system is effective with regard to accuracy, efficiency, and robustness. It can control unwanted contents in PSN according to trust evaluation. We further study user acceptance on PSNController prototype system based on a small-scale user study. We receive sound user feedback on PSNController with regard to perceived ease of use, perceived usefulness, interface design, playfulness, and acceptance attitude.

References

[1]
Jun Bi, Jianping Wu, and Wenmao Zhang. 2008. A trust and reputation based anti-spim method. In Proceedings of INFOCOM, (AZ), 2485--2493.
[2]
Liang Chen, Zheng Yan, Weidong Zhang, and Raimo Kantola. 2014. TruSMS: A trustworthy SMS spam control system based on trust management. Future Gener. Comput. Syst.
[3]
Fred D. Davis. 1989. Perceived usefulness, perceived ease of use, and user acceptance of information technology, Manage. MIS Quart. 13, 3, 319--340.
[4]
Weiwei Deng and Hong Peng. 2006. Research on a naive Bayesian based short message filtering system. In Proceedings of the 5th IEEE International Conference on Machine Learning and Cybernetics, 1233--1237.
[5]
EZSetup. Retrieved December 30, 2014 from http://research.microsoft.com/en-us/groups/wn/mssn.aspx.
[6]
Familiar Stranger. Retrieved December 30, 2014 from http://www.paulos.net/research/intel/familiarstranger/index.htm.
[7]
Kannan Govindan and Prasant Mohapatra. 2012. Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Commun. Surv. Tutor. 14, 2, 279--298.
[8]
Tyrone Grandison and Morris Sloman. 2000. A survey of trust in Internet applications. IEEE Commun. Surv. 4th Quart. 3, 4, 2--16.
[9]
Zoltán Gyöngyi, Hector Garcia-Molina, and Jan Pedersen. 2004. Combating web spam with trustRank. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB). Vol. 30, 576--587.
[10]
A. Janecek, W. N. Gansterer, and K. A. Kumar. 2008. Multi-level reputation-based greylisting. In Proceedings of the Conference on Availability, Reliability and Security (ARES'08). 10--17.
[11]
Prakash Kolan and Ram Dantu. 2007. Socio-technical defense against voice spamming. ACM Trans. Autonom. Adapt. Syst. 2, 1, Article 2 (2007).
[12]
Wayne Liu, Sudhir Aggarwal, and Zhenhai Duan. 2009. Incorporating accountability into internet email. In Proceedings of the 2009 ACM Symposium on Applied Computing (SAC'09). ACM, New York, NY, 975--882.
[13]
Yuting Liu, Bin Gao, Tie-Yan Liu, Ying Zhang, Zhiming Ma, Shuyuan He, and Hang Li. 2008. BrowseRank: Letting web users vote for page importance. In Proceedings of the 31st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR'08). ACM, New York, 451--458.
[14]
Haiyun Luo, Jiejun Kong, Petros Zerfos, Songwu Lu, and Lixia Zhang. 2004. URSA: Ubiquitous and robust access control for mobile ad hoc networks. IEEE/ACM Trans. Netw. 12, 6, 1049--1063.
[15]
J. McGibney and D. Botvich. 2007. A trust overlay architecture and protocol for enhanced protection against spam. In Proceedings of the Conference on Availability, Reliability and Security (ARES'07) (Vienna, Austria). 749--756.
[16]
MobileSocial. Retrieved December 30, 2014 from http://mobisocial.stanford.edu.
[17]
Nokia-instant-community. Retrieved December 30, 2014 from http://conversations.nokia.com/2010/05/25/nokia-instant-community-gets-you-social/.
[18]
Jörg Ott, Esa Hyytiä, Pasi Lassila, Jussi Kangasharju, and Sougata Santra. 2011. Floating content for probabilistic information sharing. Pervas. Mobile Comput. 7, 6, 671--689.
[19]
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1998. The pagerank citation ranking: Bringing order to the web. Tech. Rep., Stanford Univ., Palo Alto, CA.
[20]
Emre Sarigöl, Oriana Riva, Patrick Stuedi, and Gustavo Alonso. 2009. Enabling social networking in ad hoc networks of mobile phones. Proc. VLDB Endow. 2, 2 (2009), 1634--1637.
[21]
Yue Shen, Zheng Yan, and Raimo Kantola. 2014. Analysis on the acceptance of global trust management for unwanted traffic control based on game theory. Computers & Security.
[22]
Gaowa Shi. 2014. Performance evlaution of PSN unwanted content control system via trust management. Master's thesis, Xidian university, Xi'an, China.
[23]
Yuchun Tang, Sven Krasser, Yuanchen He, Weilai Yang, and D. Alperovitch. 2008. Support vector machines and random forests modeling for spam senders behavior analysis. In Proceedings of IEEE GLOBECOM. 1--5.
[24]
Muhammad Taufiq, N. Mohd. Fikri Azli bin Abdullah, Kyunguk Kang, and Deokjai Choi. 2010. A survey of preventing, blocking and filtering Short Message Services (SMS) spam. In Proceedings of the International Conference on Computer and Electrical Engineering, 1, 462--466.
[25]
UCI dataset. Retrieved December 30, 2014 from http://archive.ics.uci.edu/ml/datasets/SMS+Spam+Collection.
[26]
Viswanath Venkatesh and Hillol Bala. 2008. Technology acceptance model 3 and a research agenda on interventions. Decis. Sci. 39, 2, 273--315.
[27]
Baoning Wu, Vinay Goel, and Brian D. Davison. 2006. Topical TrustRank: Using topicality to combat web spam. In Proceedings of the 15th International Conference on the World Wide Web (WWW'06). ACM, New York, 63--72.
[28]
Zheng Yan, Yu Chen, and Yue Shen. 2014a. PerContRep: A practical reputation system for pervasive content services. Supercomputing 70, 3, 1051--1074.
[29]
Zheng Yan, Yu Chen, and Yue Shen. 2013a. A practical reputation system for pervasive social chatting. Elsevier's J. Comput. Syst. Sci. 79, 5, 556--572.
[30]
Zheng Yan, Raimo Kantola, Gaowa Shi, and Peng Zhang. 2013b. Unwanted content control via trust management in pervasive social networking. In Proceedings of the IEEE Conference on TrustCom/ISPA/IUCC. 202--209.
[31]
Zheng Yan, Raimo Kantola, and Yue Shen. 2011. Unwanted traffic control via global trust management. In Proceedings of the IEEE Conference on TrustCom. 647--654.
[32]
Zheng Yan, Raimo Kantola, and Yue Shen. 2012. Unwanted traffic control via hybrid trust management. In Proceedings of the IEEE Conference on TrustCom. 666--673. Zheng Yan, Raimo Kantola and Yue Shen. 2014b. A generic solution for unwanted traffic control through trust management. New Rev. Hypermed. Multimed. 20, 1, 25--51.
[33]
Zheng Yan and Christian Prehofer. 2011. Autonomic trust management for a component based software system. IEEE Trans. Depend. Secure Comput. 8, 6, 810--823.
[34]
Hao Yang, Haiyun Luo, Fan Ye, Songwu Lu, and Lixia Zhang. 2004. Security in mobile ad hoc networks: challenges and solutions. IEEE Wireless Commun. 11, 1, 38--47.
[35]
Hong Zhang, Haixin Duan, Wu Liu, and Jianping Wu. 2009a. IPGroupRep: A novel reputation based system for anti-spam. In Proceedings of the Conference on Ubiquitous, Autonomic and Trusted Computing. 513--518.
[36]
Jianzhong Zhang, Wei Xu, Yudi Peng, and Jingdong Xu. 2010. MailTrust: A mail reputation mechanism based on improved TrustGuard. In Proceedings of the International Conference on Communications and Mobile Computing (CMC'10). 218--220.
[37]
Xianchao Zhang, Bo Han, and Wenxin Liang. 2009b. Automatic seed set expansion for trust propagation based anti-spamming algorithms. In Proceedings of the 11th ACM International Workshop on Web Information and Data Management (WIDM'09), 31--38.
[38]
Elena Zheleva, Aleksander Kolcz, and Lise Getoor. 2008. Trusting spam reporters: A reporter-based reputation system for email filtering. ACM Trans. Inf. Syst. 27, 1, Article 3.

Cited By

View all
  • (2022)A Survey on Trust Models in Heterogeneous NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2022.319297824:4(2127-2162)Online publication date: Dec-2023
  • (2021)SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluationInformation Fusion10.1016/j.inffus.2021.01.00370(100-114)Online publication date: Jun-2021
  • (2019)Security Data Collection and Data Analytics in the Internet: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2018.286394221:1(586-618)Online publication date: Sep-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Multimedia Computing, Communications, and Applications
ACM Transactions on Multimedia Computing, Communications, and Applications  Volume 12, Issue 1s
Special Issue on Smartphone-Based Interactive Technologies, Systems, and Applications and Special Issue on Extended Best Papers from ACM Multimedia 2014
October 2015
317 pages
ISSN:1551-6857
EISSN:1551-6865
DOI:10.1145/2837676
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 21 October 2015
Accepted: 01 June 2015
Revised: 01 April 2015
Received: 01 December 2014
Published in TOMM Volume 12, Issue 1s

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Unwanted content control
  2. performance evaluation
  3. social networking
  4. trust management

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • PhD Grant of Chinese Educational Ministry
  • 111 project
  • the initial grant of Chinese Educational Ministry for researchers from abroad
  • the grant of Shaanxi Province for excellent researchers from abroad

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)1
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2022)A Survey on Trust Models in Heterogeneous NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2022.319297824:4(2127-2162)Online publication date: Dec-2023
  • (2021)SeDID: An SGX-enabled decentralized intrusion detection framework for network trust evaluationInformation Fusion10.1016/j.inffus.2021.01.00370(100-114)Online publication date: Jun-2021
  • (2019)Security Data Collection and Data Analytics in the Internet: A SurveyIEEE Communications Surveys & Tutorials10.1109/COMST.2018.286394221:1(586-618)Online publication date: Sep-2020
  • (2018)Detection of Human, Legitimate Bot, and Malicious Bot in Online Social Networks Based on WaveletsACM Transactions on Multimedia Computing, Communications, and Applications10.1145/318350614:1s(1-17)Online publication date: 26-Mar-2018
  • (2018)Social media security and trustworthiness: Overview and new directionFuture Generation Computer Systems10.1016/j.future.2016.10.00786(914-925)Online publication date: Sep-2018
  • (2018)A survey on dynamic mobile malware detectionSoftware Quality Journal10.1007/s11219-017-9368-426:3(891-919)Online publication date: 1-Sep-2018
  • (2017)Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic ComputingIEEE Access10.1109/ACCESS.2017.26831595(5084-5103)Online publication date: 2017
  • (2017)A Survey on Security in D2D CommunicationsMobile Networks and Applications10.1007/s11036-016-0741-522:2(195-208)Online publication date: 1-Apr-2017
  • (2016)A Similarity Scenario-Based Recommendation Model With Small Disturbances for Unknown Items in Social NetworksIEEE Access10.1109/ACCESS.2016.26472364(9251-9272)Online publication date: 2016

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media