The Social Hourglass: Enabling Socially-aware Applications and Services Adriana Iamnitchi University of South Florida

Slides:



Advertisements
Similar presentations
Inferring Peer Centrality in Socially-Informed P2P Systems Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University.
Advertisements

Operating System Security
W3C Workshop on Web Services Mark Nottingham
BatTorrent: A Battery-Aware BitTorrent for Mobile Devices Zach King, Jeremy Blackburn, Adriana Iamnitchi Computer Science and Engineering, University of.
Networking Problems in Cloud Computing Projects. 2 Kickass: Implementation PROJECT 1.
SCENARIO Suppose the presenter wants the students to access a file Supply Credenti -als Grant Access Is it efficient? How can we make this negotiation.
Socially-Aware Distributed Systems or Why this Class Collaboration? Anda Iamnitchi
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
1 Towards Pervasive Connectivity in Mobile Computing Frank Siegemund European Microsoft Innovation Center November 2006.
Building and Analyzing Social Networks Web Data and Semantics in Social Network Applications Dr. Bhavani Thuraisingham February 15, 2013.
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
Provenance in Open Distributed Information Systems Syed Imran Jami PhD Candidate FAST-NU.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
Topology Generation Suat Mercan. 2 Outline Motivation Topology Characterization Levels of Topology Modeling Techniques Types of Topology Generators.
Privacy in Social Networks CSCE 201. Reading Dwyer, Hiltz, Passerini, Trust and privacy concern within social networking sites: A comparison of Facebook.
The Structure of Networks with emphasis on information and social networks RU T-214-SINE Summer 2011 Ýmir Vigfússon.
Small-World File-Sharing Communities Adriana Iamnitchi, Matei Ripeanu and Ian Foster,
Lecture III : Communication Security, Services & Mechanisms Internet Security: Principles & Practices John K. Zao, PhD SMIEEE National Chiao-Tung University.
FeedTree: Sharing Web Micronews with Peer-to-Peer Event Notification D. Sandler, A. Mislove, A. Post, P. Druschel Presented by: Andrew Sutton.
Juan (Susan) Pan, Daniel Boston, and Cristian Borcea Department of Computer Science New Jersey Institute of Technology.
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
Small Worlds and the Security of Ubiquitous Computing From : IEEE CNF Author : Harald Vogt Presented by Chen Shih Yu.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
CMPE 80N - Introduction to Networks and the Internet 1 CMPE 80N Winter 2004 Lecture 9 Introduction to Networks and the Internet.
APPLAUS: A Privacy-Preserving Location Proof Updating System for Location-based Services Zhichao Zhu and Guohong Cao Department of Computer Science and.
Winter Retreat Connecting the Dots: Using Runtime Paths for Macro Analysis Mike Chen, Emre Kıcıman, Anthony Accardi, Armando Fox, Eric Brewer
 Structured peer to peer overlay networks are resilient – but not secure.  Even a small fraction of malicious nodes may result in failure of correct.
Audumbar Chormale Advisor: Dr. Anupam Joshi M.S. Thesis Defense
A Social Help Engine for Online Social Network Mobile Users Tam Vu, Akash Baid WINLAB, Rutgers University May 21,
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
Dr. Raimund Ege: Research Summary  Security in the Mobile Context Trust and Access control models Peer-to-peer delivery networks  Opportunities for student.
Privacy-Preserving P2P Data Sharing with OneSwarm -Piggy.
Aegis: A Semantic Implementation of Privacy as Contextual Integrity in Social Ecosystems Imrul Kayes, Adriana Iamnitchi.
GDC: Group Discovery using Co-location Traces Steve Mardenfeld Daniel Boston Susan Juan Pan Quentin Jones † Adriana Iamntichi ‡ Cristian Borcea Department.
Chapter Fifteen Employing the Internet for Advertising.
Network Aware Resource Allocation in Distributed Clouds.
Gil EinzigerRoy Friedman Computer Science Department Technion.
Enabling Socially-Aware Distributed Systems or Some Ongoing Research in the Distributed Systems Group Adriana Iamnitchi
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
Report on Intrusion Detection and Data Fusion By Ganesh Godavari.
1 presentation of article: Small-World File-Sharing Communities Article: Adriana Iamnitchi, Matei Ripeanu, Ian Foster Presentation: Periklis Akritidis.
1 Security on Social Networks Or some clues about Access Control in Web Data Management with Privacy, Time and Provenance Serge Abiteboul, Alban Galland.
USER DRIVEN ACCESS CONTROL: RETHINKING PERMISSION GRANTING IN MODERN OPERATING SYSTEM Presentation by: Manik Challana Presented at : IEEE Symposium on.
Freelib: A Self-sustainable Digital Library for Education Community Ashraf Amrou, Kurt Maly, Mohammad Zubair Computer Science Dept., Old Dominion University.
Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.
The Second Life of a Sensor: Integrating Real-World Experience in Virtual Worlds using Mobile Phones Mirco Musolesi, Emiliano Miluzzo, Nicholas D. Lane,
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
WEB 2.0 PATTERNS Carolina Marin. Content  Introduction  The Participation-Collaboration Pattern  The Collaborative Tagging Pattern.
Android System Security Xinming Ou. Android System Basics An open-source operating system for mobile devices (AOSP, led by Google) – Consists of a base.
SybilGuard: Defending Against Sybil Attacks via Social Networks.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Internet of Things. IoT Novel paradigm – Rapidly gaining ground in the wireless scenario Basic idea – Pervasive presence around us a variety of things.
Providing web services to mobile users: The architecture design of an m-service portal Minder Chen - Dongsong Zhang - Lina Zhou Presented by: Juan M. Cubillos.
Feb 12, ECET 581/CPET/ECET 499 Mobile Computing Technologies & Apps Context Aware Computing 3 of 3 Lecture 12 Paul I-Hai Lin, Professor Electrical.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
The Claromentis Digital Workplace An Introduction
Speaker : 童耀民 MA1G /3/21 1 Authors: Phone Lin and Pai-Chun Chung, National Taiwan University Yuguang Fang, University of Florida.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
IS3220 Information Technology Infrastructure Security
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
September 2003, 7 th EDG Conference, Heidelberg – Roberta Faggian, CERN/IT CERN – European Organization for Nuclear Research The GRACE Project GRid enabled.
PREPARED BY: MS. ANGELA R.ICO & MS. AILEEN E. QUITNO (MSE-COE) COURSE TITLE: OPERATING SYSTEM PROF. GISELA MAY A. ALBANO PREPARED BY: MS. ANGELA R.ICO.
Fabián E. Bustamante, Fall 2005 A brief introduction to Pastry Based on: A. Rowstron and P. Druschel, Pastry: Scalable, decentralized object location and.
Privacy Vulnerability of Published Anonymous Mobility Traces Chris Y. T. Ma, David K. Y. Yau, Nung Kwan Yip (Purdue University) Nageswara S. V. Rao (Oak.
Android System Security
Outline Introduction Standards Project General Idea
Sentio: Distributed Sensor Virtualization for Mobile Apps
Analyzing and Securing Social Networks
A Semantic Peer-to-Peer Overlay for Web Services Discovery
Presentation transcript:

The Social Hourglass: Enabling Socially-aware Applications and Services Adriana Iamnitchi University of South Florida

Much Social Information Available Connects people through relationships – Object centric: use of same objects – Person centric: declared relationships or co-participation in events, groups, etc.

Mining Social Data Spam filtering Sybil identification Personalized search Target marketing Medical emergency notifications …

Current Approach: Vertically Integrated Socially-aware Applications

Challenges with Current Approach Application-limited collection and use of social information – High bootstrap cost – Limited (potentially inaccurate) information. E.g., Information from online social networks Hidden incentives to have many “friends” All relationships equal Symmetric relationships Newer proposals to merge different sources of social (and sensor) information for one app – Specifically targeting context awareness 5

Motivating Application: CallCensor 6

Motivating Application: Sofa Surfer 7

Motivating Application: Data Placement 8

Proposal: An Infrastructure for Social Computing Sofa Surfer Roommate Finder CallCensor …

Objective An infrastructure that: Can fuse information from various sources Allow user to control own information – What is collected – Where it is stored – Who can access it Provide social knowledge to a variety of applications: – Social inferences (may be non-trivial) 10

Outline Motivation The Social Hourglass architecture Social Sensors (work in progress) Personal Aggregator (some ideas) Social Knowledge Service: Prometheus (Kourtellis et al, Middleware 2010) – Data Management – API for social inferences – Experimental evaluation (on PlanetLab) Summary 11

12 The Social Hourglass Architecture Applications Social Inference API Social Data Management Personal Aggregators Social Sensors Social Signals

Social Sensors Consume existing social signals Location Collocation Schedule (e.g., Google calendar) Mobile phone activity (calls, sms) Online social network interactions Personal relations (family) Shared content Shared interest (e.g., CiteULike) … 13

Social Sensors Report on behalf of ego: – Alter, the person ego is interacting with – An activity tag: e.g., “outdoors”, “dining” Based on content, location, predefined labels, etc. – A weight: e.g., 0.15 Run on ego’s mobile devices, desktop, or on web Processes user interactions – To reduce noise – To distinguish between routine and meaningful interactions 14

Social Sensors: Challenges Identifying activity tags: – Mine text for keywords ( s, sms, blogs, etc) – Reverse geo-coding to find where (co)located – Predefined labels or dictionary and ontologies Quantifying interactions (assigning weights): – Frequency, duration, time in-between interactions – Familiar strangers versus active social interaction 15

Work in Progress: Social Sensor for Gaming Interactions Variability in playing habits Variability in playing skills Time patterns

Aggregators Act as the user’s personal assistant Runs on trusted device (cell phone) Responsible for – Managing passwords for various applications – Personalization – Identity management

18 The Social Hourglass Architecture Applications Social Inference API Social Data Management Personal Aggregators Social Sensors Social Signals

Social Graph 19

Prometheus Peer-to-peer architecture – Users contribute resources (peers) – Fundamental change from typical peer-to-peer networks: not every user has its peer Input: Social information collected from different social sensors (reported via aggregators) Output: Social information made available to applications and services – Information made available subject to user policies 20

Distributed Social Graph 21

Prometheus: A P2P Social Data Management Service Collects social information from multiple sources (social sensors) Maintains this information in a social graph Offers a set of basic social inference functions 22

Prometheus Architecture 23

Architecture Details Users have a unique user ID Select trusted peer group based on offline social trust with peer owners A user’s trusted peers communicate via Scribe Only the user’s trusted peers can decrypt user’s social data and thus perform social inference functions 24

Social Data Protection 2 sets of public/private keys – User’s – User’s trusted peer group Social sensors submit data encrypted with the group’s public key and signed with the user’s private key – Access to user’s private key only on user’s devices – Data stored in the Pastry overlay Only trusted peers can decrypt and authenticate data 25

Social Inference Functions The social graph management service exports an API that implement social inferences 26

API for Applications: Social Inference Functions 5 basic social inference functions: relation_test (ego, alter, ɑ, w) top_relations (ego, ɑ, n) neighborhood (ego, ɑ, w, radius) proximity (ego, ɑ, w, radius, distance) social_strength (ego, alter) More complex functions can be built 27

Social Strength Quantifies strength between ego and alter Result normalized to consider overall activity Search all paths of maximum 2 social hops One approach to quantify social strength. Others are certainly possible. 28

Lessons from Experiments on PlanetLab Social-based mapping of users onto peers leads to significant performance gains: – More than 15% of requests finish faster – An order of magnitude fewer messages Reasonable latency – Code significantly improved since publication in Middleware

Experimental Results: Neighborhood Requests users per peer 50 users per peer Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications, Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn, Cristian Borcea, Adriana Iamnitchi. 11th International Middleware Conference, Bangalore, India, November 2010.

Real Social Traces: NJIT Social Graph 100 randomly selected students from NJIT given Bluetooth- enabled phones that report their collocation Data recorded – Collocation with two thresholds (45 and 90 minutes) – Facebook friendships Sparse graph (commuters) 31

CallCensor CallCensor implemented on Android – Cell phone silenced, rings or vibrates depending on the social context and relationship with caller – Relationship with caller: Social strength > threshold: allow call Caller directly connected by work Caller connected by work and ≤ 2 hops away Real social data from 100 users stored on 3 nodes from PlanetLab Real time performance constraints 32

Lessons from CallCensor Experiments 33

Vulnerability to malicious users mitigated by directed, multi-edged, weighted social graph Vulnerability to malicious peers related to social graph distribution Peers gain the properties of the social graph they represent Resilience to (Social) Attacks

Summary The social hourglass architecture Prometheus: a decentralized service that enables socially-aware applications and services by collecting, managing and exposing social knowledge, subject to user-specified privacy policies. Unique contributions: – Social graph representation – Aggregated social data – Social inference functions – Socially-aware design 35

Much Work to Be Done Developing social sensors Aggregator: – proof of concept implementation – Performance Evaluating benefits of social knowledge in system design Socially-aware applications Query language for social inferences Privacy protection 36

More Information The Social Hourglass: an Infrastructure for Socially-aware Applications and Services, Iamnitchi et al., IEEE Internet Computing, May/June 2012 Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications, Kourtellis et al., Middleware 2010 Vulnerability in Socially-Informed Peer-to-Peer System, Jeremy Blackburn, Nicolas Kourtellis, and Adriana Iamnitchi. Fourth Workshop on Social Network Systems (SNS 2011) 37

Acknowledgements My team of talented graduate students and alumni: US National Science Foundation grants CNS and CNS

Thank you! 39

Neighborhood Inference 40

Social Strength Inference 41

42 A Distributed System 42

43 Or a Distributed System 43

An Example: Interest Sharing 44 “ No 24 in B minor, BWV 869 ” “ Les Bonbons ” “ Yellow Submarine ” “ Les Bonbons ” “ Yellow Submarine ” “ Wood Is a Pleasant Thing to Think About ” “ Wood Is a Pleasant Thing to Think About ” The interest-sharing graph G m T (V, E):  V is set of users active during interval T  An edge in E connects users who share at least m file requests within T

Small Worlds 45 Word co-occurrences Film actors LANL coauthors Internet Web Food web Power grid D. J. Watts and S. H. Strogatz, Collective dynamics of small-world networks. Nature, 393: , 1998 R. Albert and A.-L. Barabási, Statistical mechanics of complex networks, R. Modern Physics 74, 47 (2002).

Web Interest-Sharing Graphs s, 50files 3600s, 50files 1800s, 100files 1800s, 10file 300s, 1file

DØ Interest-Sharing Graphs 47 7days, 1file 28 days, 1 file

KaZaA Interest-Sharing Graphs 48 7day, 1file 28 days 1 file 2 hours 1 file 1 day 2 files 4h 2 files 12h 4 files

Proactive Information Dissemination 49 D0 Web Kazaa