skip to main content
10.1145/3327960.3332381acmconferencesArticle/Chapter ViewAbstractPublication Pagesasia-ccsConference Proceedingsconference-collections
research-article

Distributed Community Detection over Blockchain Networks Based on Structural Entropy

Published:02 July 2019Publication History

ABSTRACT

Blockchain technology provides a groundbreaking computing paradigm that tackles problems in a completely decentralised manner. As the underlying infrastructure and protocol of blockchain, blockchain networks convey communications and coordination across all involving participants. In extensive application scenarios, conducting community detection over blockchain networks has potential effects on both discovering hidden information and enhancing communicating efficiency. However, the decentralised nature poses a restriction on community detection over blockchain networks. In coping with this restriction, we propose a distributed community detection method based on the Propose-Select-Adjust (PSA) framework that runs in an asynchronous way. We extend the PSA framework using the concept of structural entropy and aim to detect a community structure with low entropy. We test our entropy-based distributed community detection algorithm on both benchmark networks and bitcoin trust networks. Experimental results reveal that our algorithm successfully detects communities with low structural entropy.

References

  1. Ronald S Burt. 2004. Structural Holes and Good Ideas. Amer. J. Sociology, Vol. 110, 2 (2004), 349--399.Google ScholarGoogle ScholarCross RefCross Ref
  2. Kousik Das, Sovan Samanta, and Madhumangal Pal. 2018. Study on centrality measures in social networks: a survey. Social Network Analysis and Mining, Vol. 8, 1 (2018), 13.Google ScholarGoogle ScholarCross RefCross Ref
  3. Michael Fleder, Michael S Kester, and Sudeep Pillai. 2015. Bitcoin transaction graph analysis. arXiv preprint arXiv:1502.01657 (2015).Google ScholarGoogle Scholar
  4. Santo Fortunato. 2010. Community detection in graphs. Physics reports, Vol. 486, 3--5 (2010), 75--174.Google ScholarGoogle Scholar
  5. Michelle Girvan and Mark EJ Newman. 2002. Community structure in social and biological networks. Proceedings of the national academy of sciences, Vol. 99, 12 (2002), 7821--7826.Google ScholarGoogle ScholarCross RefCross Ref
  6. Bakhadyr Khoussainov, Jiamou Liu, and Imran Khaliq. 2009. A dynamic algorithm for reachability games played on trees. In International Symposium on Mathematical Foundations of Computer Science. Springer, 477--488. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Srijan Kumar, Bryan Hooi, Disha Makhija, Mohit Kumar, Christos Faloutsos, and VS Subrahmanian. 2018. Rev2: Fraudulent user prediction in rating platforms. In Proceedings of the Eleventh ACM International Conference on Web Search and Data Mining. ACM, 333--341. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Srijan Kumar, Francesca Spezzano, VS Subrahmanian, and Christos Faloutsos. 2016. Edge weight prediction in weighted signed networks. In Data Mining (ICDM), 2016 IEEE 16th International Conference on. IEEE, 221--230.Google ScholarGoogle ScholarCross RefCross Ref
  9. Angsheng Li and Yicheng Pan. 2016. Structural information and dynamical complexity of networks. IEEE Transactions on Information Theory, Vol. 62, 6 (2016), 3290--3339.Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Angsheng Li and Yicheng Pan. 2018. Structure Entropy and Resistor Graphs. arXiv preprint arXiv:1801.03404 (2018).Google ScholarGoogle Scholar
  11. Jiamou Liu and Ziheng Wei. 2014a. Community detection based on graph dynamical systems with asynchronous runs. In Computing and Networking (CANDAR), 2014 Second International Symposium on. IEEE, 463--469. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Jiamou Liu and Ziheng Wei. 2014b. From a local to a global perspective of community detection in networks. In Pacific Rim International Conference on Artificial Intelligence. Springer, 1036--1049.Google ScholarGoogle ScholarCross RefCross Ref
  13. David Lusseau and Mark EJ Newman. 2004. Identifying the role that animals play in their social networks. Proceedings of the Royal Society of London B: Biological Sciences, Vol. 271, Suppl 6 (2004), S477--S481.Google ScholarGoogle ScholarCross RefCross Ref
  14. Anastasia Moskvina and Jiamou Liu. 2016a. Integrating networks of equipotent nodes. In International Conference on Computational Social Networks. Springer, 39--50.Google ScholarGoogle ScholarCross RefCross Ref
  15. Anastasia Moskvina and Jiamou Liu. 2016b. Togetherness: an algorithmic approach to network integration. In 2016 IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining (ASONAM). IEEE, 223--230. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008).Google ScholarGoogle Scholar
  17. Mark EJ Newman. 2004. Fast algorithm for detecting community structure in networks. Physical review E, Vol. 69, 6 (2004), 066133.Google ScholarGoogle Scholar
  18. Mark EJ Newman and Michelle Girvan. 2004. Finding and evaluating community structure in networks. Physical review E, Vol. 69, 2 (2004), 026113.Google ScholarGoogle Scholar
  19. Gergely Palla, Albert-László Barabási, and Tamás Vicsek. 2007. Quantifying social group evolution. Nature, Vol. 446, 7136 (2007), 664.Google ScholarGoogle Scholar
  20. Gergely Palla, Imre Derényi, Illés Farkas, and Tamás Vicsek. 2005. Uncovering the overlapping community structure of complex networks in nature and society. Nature, Vol. 435, 7043 (2005), 814.Google ScholarGoogle ScholarCross RefCross Ref
  21. Thai Pham and Steven Lee. 2016. Anomaly detection in bitcoin network using unsupervised learning methods. arXiv preprint arXiv:1611.03941 (2016).Google ScholarGoogle Scholar
  22. Cazabet Remy, Baccour Rym, and Latapy Matthieu. 2017. Tracking bitcoin users activity using community detection on a network of weak signals. In International Workshop on Complex Networks and their Applications. Springer, 166--177.Google ScholarGoogle Scholar
  23. Gokhan Sagirlar, Barbara Carminati, and Elena Ferrari. 2018. AutoBotCatcher: Blockchain-based P2P Botnet Detection for the Internet of Things. In 2018 IEEE 4th International Conference on Collaboration and Internet Computing (CIC). IEEE, 1--8.Google ScholarGoogle ScholarCross RefCross Ref
  24. David Shrier, Weige Wu, and Alex Pentland. 2016. Blockchain & infrastructure (identity, data security). Massachusetts Institute of Technology-Connection Science, Vol. 1, 3 (2016).Google ScholarGoogle Scholar
  25. Melanie Swan. 2015. Blockchain: Blueprint for a new economy ." O'Reilly Media, Inc.". Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. Duncan J Watts. 2004. Small worlds: the dynamics of networks between order and randomness. Vol. 9. Princeton university press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Xiwei Xu, Cesare Pautasso, Liming Zhu, Vincent Gramoli, Alexander Ponomarev, An Binh Tran, and Shiping Chen. 2016. The blockchain as a software connector. In 2016 13th Working IEEE/IFIP Conference on Software Architecture (WICSA). IEEE, 182--191.Google ScholarGoogle ScholarCross RefCross Ref
  28. Bo Yan, Yang Chen, and Jiamou Liu. 2017. Dynamic relationship building: exploitation versus exploration on a social network. In International Conference on Web Information Systems Engineering. Springer, 75--90.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. Wayne W Zachary. 1977. An information flow model for conflict and fission in small groups. Journal of anthropological research, Vol. 33, 4 (1977), 452--473.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Distributed Community Detection over Blockchain Networks Based on Structural Entropy

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            BSCI '19: Proceedings of the 2019 ACM International Symposium on Blockchain and Secure Critical Infrastructure
            July 2019
            134 pages
            ISBN:9781450367868
            DOI:10.1145/3327960

            Copyright © 2019 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 2 July 2019

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            BSCI '19 Paper Acceptance Rate44of12submissions,367%Overall Acceptance Rate44of12submissions,367%

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader