Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,

Slides:



Advertisements
Similar presentations
Inferring Peer Centrality in Socially-Informed P2P Systems Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University.
Advertisements

Supporting Cooperative Caching in Disruption Tolerant Networks
Operating System Structures
Efficient Event-based Resource Discovery Wei Yan*, Songlin Hu*, Vinod Muthusamy +, Hans-Arno Jacobsen +, Li Zha* * Chinese Academy of Sciences, Beijing.
Alex Cheung and Hans-Arno Jacobsen August, 14 th 2009 MIDDLEWARE SYSTEMS RESEARCH GROUP.
P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
BatTorrent: A Battery-Aware BitTorrent for Mobile Devices Zach King, Jeremy Blackburn, Adriana Iamnitchi Computer Science and Engineering, University of.
Socially-Aware Distributed Systems or Why this Class Collaboration? Anda Iamnitchi
Efficient Private Techniques for Verifying Social Proximity Michael J. Freedman and Antonio Nicolosi Discussion by: A. Ziad Hatahet.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
The Power of Indirect Ties in Friend-to-Friend Storage Systems Xiang Zuo 1, Jeremy Blackburn 2, Nicolas Kourtellis 3, John Skvoretz 1 and Adriana Iamnitchi.
Forwarding Redundancy in Opportunistic Mobile Networks: Investigation and Elimination Wei Gao 1, Qinghua Li 2 and Guohong Cao 3 1 The University of Tennessee,
Juan (Susan) Pan, Daniel Boston, and Cristian Borcea Department of Computer Science New Jersey Institute of Technology.
Network Coding for Large Scale Content Distribution Christos Gkantsidis Georgia Institute of Technology Pablo Rodriguez Microsoft Research IEEE INFOCOM.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Design, Implementation, and Experimentation on Mobile Agent Security for Electronic Commerce Applications Anthony H. W. Chan, Caris K. M. Wong, T. Y. Wong,
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
Middleware for P2P architecture Jikai Yin, Shuai Zhang, Ziwen Zhang.
The Influence of Indirect Ties on Social Network Dynamics Xiang Zuo 1, Jeremy Blackburn 2, Nicolas Kourtellis 3, John Skvoretz 1 and Adriana Iamnitchi.
Understanding Android Security Yinshu Wu William Enck, Machigar Ongtang, and PatrickMcDaniel Pennsylvania State University.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Slicing the Onion: Anonymity Using Unreliable Overlays Sachin Katti Jeffrey Cohen & Dina Katabi.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
UNIVERSITY of NOTRE DAME COLLEGE of ENGINEERING Preserving Location Privacy on the Release of Large-scale Mobility Data Xueheng Hu, Aaron D. Striegel Department.
Aegis: A Semantic Implementation of Privacy as Contextual Integrity in Social Ecosystems Imrul Kayes, Adriana Iamnitchi.
GDC: Group Discovery using Co-location Traces Steve Mardenfeld Daniel Boston Susan Juan Pan Quentin Jones † Adriana Iamntichi ‡ Cristian Borcea Department.
The MobiSoC Middleware for Mobile Social Computing Cristian Borcea, Ankur Gupta, Achir Kalra, Quentin Jones, Liviu Iftode* Department of Computer Science.
Lyon, June 26th 2006 ICPS'06: IEEE International Conference on Pervasive Services 2006 Routing and Localization Services in Self-Organizing Wireless Ad-Hoc.
Gil EinzigerRoy Friedman Computer Science Department Technion.
Demo. Overview Overall the project has two main goals: 1) Develop a method to use sensor data to determine behavior probability. 2) Use the behavior probability.
© 2009 Research In Motion Limited Advanced Java Application Development for the BlackBerry Smartphone Trainer name Date.
The Social Hourglass: Enabling Socially-aware Applications and Services Adriana Iamnitchi University of South Florida
Enabling Socially-Aware Distributed Systems or Some Ongoing Research in the Distributed Systems Group Adriana Iamnitchi
PRIVACY PRESERVING SOCIAL NETWORKING THROUGH DECENTRALIZATION AUTHORS: L.A. CUTILLO, REFIK MOLVA, THORSTEN STRUFE INSTRUCTOR DR. MOHAMMAD ASHIQUR RAHMAN.
Distributed Session Announcement Agents for Real-time Streaming Applications Keio University, Graduate School of Media and Governance Kazuhiro Mishima.
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
Distributed Maintenance of Cache Freshness in Opportunistic Mobile Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania.
On Exploiting Transient Contact Patterns for Data Forwarding in Delay Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering.
Secure Sensor Data/Information Management and Mining Bhavani Thuraisingham The University of Texas at Dallas October 2005.
ADV. NETWORK SECURITY CODY WATSON What’s in Your Dongle and Bank Account? Mandatory and Discretionary Protections of External Resources.
Rushing Attacks and Defense in Wireless Ad Hoc Network Routing Protocols ► Acts as denial of service by disrupting the flow of data between a source and.
Presented by: Sanketh Beerabbi University of Central Florida.
Cachet: A Decentralized Architecture for Privacy Preserving Social Networking with Caching Shirin Nilizadeh, 1 Sonia Jahid, 2 Prateek Mittal, 3 Nikita.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
User-Centric Data Dissemination in Disruption Tolerant Networks Wei Gao and Guohong Cao Dept. of Computer Science and Engineering Pennsylvania State University.
Elmasri and Navathe, Fundamentals of Database Systems, Fourth Edition Copyright © 2004 Pearson Education, Inc. Slide 2-1 Data Models Data Model: A set.
1 Peer-to-Peer Technologies Seminar by: Kunal Goswami (05IT6006) School of Information Technology Guided by: Prof. C.R.Mandal, School of Information Technology.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
1 Privacy-Enhanced Collaborative Filtering Privacy-Enhanced Personalization workshop July 25, 2005, Edinburgh, Scotland Shlomo Berkovsky 1, Yaniv Eytani.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P System Aameek Singh, Ling Liu College of Computing, Georgia Tech International.
Social Networks and Peer to Peer As Presented by Jeremy Robinson 3/22/2007.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
Speaker : 童耀民 MA1G /3/21 1 Authors: Phone Lin and Pai-Chun Chung, National Taiwan University Yuguang Fang, University of Florida.
September 2003, 7 th EDG Conference, Heidelberg – Roberta Faggian, CERN/IT CERN – European Organization for Nuclear Research The GRACE Project GRid enabled.
Privacy in Mobile Systems Karthik Dantu and Steve Ko.
Understanding Android Security
Peer-to-peer networking
Collaborative Offloading for Distributed Mobile-Cloud Apps
Dieudo Mulamba November 2017
Sentio: Distributed Sensor Virtualization for Mobile Apps
Understanding Android Security
Peer-to-peer networking
Sisi Duan Assistant Professor Information Systems
Presentation transcript:

Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn, Cristian Borcea *, Adriana Iamnitchi Department of Computer Science and Engineering, USF * Department of Computer Science, NJIT ACM/IFIP/USENIX 11 th International Middleware Conference, 2010

2 Social and Socially-aware Applications Applications may contain user profiles, social networks, history of social interactions, location, collocation

3 Problems with Current Social Information Management  Application specific: Need to input data for each new application Cannot benefit from information aggregation across applications  Typically, data are owned by applications: users don't have control over their data  Hidden incentives to have many "friends": social information not accurate

4 Our Solution: Prometheus  P2P social data management service: Receives data from social sensors that collect application-specific social information Represents social data as decentralized social graph Exposes API to share social information with applications according to user access control policies

5 Outline  Motivation  Social Graph Management  API and Access Control  Prototype Implementation  Evaluation over PlanetLab  Summary  Future Work

6 How is the Social Graph Populated?  Social sensors report edge information to Prometheus: Applications installed by user on personal devices Aggregate & analyze history of user's interactions with other users  Two types of social ties: Object-centric: use of similar resources  Examples: tagging communities on Delicious, repeatedly being parts of the same BitTorrent swarms People-centric: pair-wise or group relationships  Examples: friends on Facebook, same company name on LinkedIn, collocation from mobile phones

7 Social Graph Representation  Multi-edged, directed, weighted, labeled graph Each edge → a reported social activity Weight → interaction intensity Directionality reflects reality  Allows for fine-grain privacy  Prevents social data manipulation

8 Decentralized Graph Storage  Each user has a set of trusted peers in the P2P network Peers it owns & peers owned by trusted users  Each user’s sub-graph stored on all its trusted peers Improved availability in face of P2P churn P2P multicast used to synchronize information among trusted peers User ID Owns Peer Trust Peer A---1,2 B1 C21,2,3 D32,3,4,5 E43,4 F53,5

9 Encrypted P2P Storage  Sensor data stored encrypted in P2P network Improves availability and protects privacy Sensors encrypt data with trusted group public key & sign with user private key  Trusted peers retrieve user data, decrypt it, & create social graph Group Public Key Private Key User Public Key Private Key

10 Outline  Motivation  Social Graph Management  API and Access Control  Prototype Implementation  Evaluation over PlanetLab  Summary  Future Work

11 Prometheus Application Interface  Five social inference functions: Boolean relation_test (ego, alter, ɑ, w) User-List top_relations (ego, ɑ, k) User-List neighborhood (ego, ɑ, w, radius) User-List proximity (ego, ɑ, w, radius, distance) Double social_strength (ego, alter)  Ego & alter don’t have to be directly connected  Normalized result: consider ego’s overall activity  Search all 2-hop paths

12 Application Example: CallCensor  Socially-aware incoming call filtering  Ring/vibrate/silence phone based on current social context and relationship with caller  Invokes  proximity() to determine current social context  social_strength() to determine relationship with caller

13 Request Execution: social_strength() 1 st hop 2 nd hop 1 st hop 2 nd hop 1.Application sends request to a peer 2.Peer forwards request to trusted peer 3.Trusted peer enforces ACPs 4.Trusted peer sends secondary requests 5.Trusted peers enforce ACPs & reply 6.Primary peer combines results 7.Primary peer replies to application through contacted peer with final result

14 Access Control Policies  User specifies ACPs upon registration ACPs stored on user’s trusted peer group Update them at any time  Changes propagated through multicast mechanism Applied for each inference request  Control relations, labels, weights & locations Example:Alice’s ACPs relations:hops-2 hiking-label:lbl-hiking work-label:lbl-work general-label: --- weights: --- location:hops-1 blacklist:user-Eve

15 Outline  Motivation  Social Graph Management  API and Access Control  Prototype Implementation  Evaluation over PlanetLab  Summary  Future Work

16 Prototype Implementation  FreePastry Java implementation with support for DHT (Pastry) P2P storage (Past) Multicast (Scribe)  Social graph management implemented in Python

17 Evaluation over PlanetLab  Goals: 1.Assess performance under realistic network conditions (peers distributed around the world) 2.Assess performance at large scale using realistic workloads with large number of users 3.Assess the effect of socially-aware mapping of users onto trusted peers on system’s performance 4.Validate Prometheus with socially-aware application under real-time constraints (CallCensor)  Metric: end-to-end response time

18 Large-Scale Evaluation Setup  100 PCs around the globe RTT~ ms  1000 users: synthetic social graph  Random vs. socially-aware trusted peer assignment 10 & 30 users assigned per peer  Workloads for: Social sensor inputs based on Facebook study Neighborhood requests based on Twitter study Social strength requests based on BitTorrent study  Applied a timeout of 15 seconds to fulfill a 1-hop request in PlanetLab

19 Neighborhood Request Results  Socially-aware assignment of users onto peers results in faster response time  Message overhead reduced by an order of magnitude  Replication for improved availability does not induce high overhead

20 Social Strength Request Results  Similar performance with 2-hop Neighborhood Requests Search all 2-hop paths from source to destination

21 CallCensor Evaluation Setup  CallCensor implemented and tested on Nexus Android phone  100 users: real social graph Volunteer students from NJIT Two social sensors  Collocation from Bluetooth 45 & 90 minutes threshold  Friendship from Facebook  3 USA PlanetLab peers  Socially-aware trusted peer assignment

22 CallCensor Results  Met real-time performance constraint: response arrives before call forwarded automatically to voic

23 Summary  Users of Prometheus: Decide what personal social data are collected by installing/configuring social sensors Cooperate to store and manage their social data in a decentralized fashion Own and control access to their data  Prometheus enables: Socially-aware applications that utilize social data collected from multiple sources Accurate social world representation through multi- edged, labeled, directed and weighted graph Improved performance through socially-aware P2P system design

24 Future Work  Improve Prometheus performance Network optimizations Caching of inference request results  Develop new social sensors  Develop new socially-aware applications & services  Study tolerance to malicious attacks Exposure of social information to intermediate peers during request execution Manipulation of social connections to alter the structure of the social graph

25 Thank you! This work was supported by NSF Grants: CNS , CNS , CNS