Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South.

Slides:



Advertisements
Similar presentations
Inferring Peer Centrality in Socially-Informed P2P Systems Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University.
Advertisements

P2P data retrieval DHT (Distributed Hash Tables) Partially based on Hellerstein’s presentation at VLDB2004.
Presentation of Designing Efficient Irregular Networks for Heterogeneous Systems-on-Chip by Christian Neeb and Norbert Wehn and Workload Driven Synthesis.
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
Search in Power-Law Networks Presented by Hakim Weatherspoon CS294-4: Peer-to-Peer Systems Slides also borrowed from the following paper Path Finding Strategies.
LightFlood: An Optimal Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
The Power of Indirect Ties in Friend-to-Friend Storage Systems Xiang Zuo 1, Jeremy Blackburn 2, Nicolas Kourtellis 3, John Skvoretz 1 and Adriana Iamnitchi.
Edith C. H. Ngai1, Jiangchuan Liu2, and Michael R. Lyu1
Small Worlds Presented by Geetha Akula For the Faculty of Department of Computer Science, CALSTATE LA. On 8 th June 07.
Small-World File-Sharing Communities Adriana Iamnitchi, Matei Ripeanu and Ian Foster,
Are You moved by Your Social Network Application? Abderrahmen Mtibaa, Augustin Chaintreau, Jason LeBrun, Earl Oliver, Anna-Kaisa Pietilainen, Christophe.
P2p, Spring 05 1 Topics in Database Systems: Data Management in Peer-to-Peer Systems March 29, 2005.
Beneficial Caching in Mobile Ad Hoc Networks Bin Tang, Samir Das, Himanshu Gupta Computer Science Department Stony Brook University.
Can ISPs and P2P Users Cooperate for Improved Performance? Vinay Aggarwal, Anja Feldmann (German Telecom Laboratories) Christian Scheideler (TU, Munchen)
Peer-to-Peer Based Multimedia Distribution Service Zhe Xiang, Qian Zhang, Wenwu Zhu, Zhensheng Zhang IEEE Transactions on Multimedia, Vol. 6, No. 2, April.
Efficient Content Location Using Interest-based Locality in Peer-to-Peer Systems Presented by: Lin Wing Kai.
On Power-Law Relationships of the Internet Topology CSCI 780, Fall 2005.
Analysis of the Internet Topology Michalis Faloutsos, U.C. Riverside (PI) Christos Faloutsos, CMU (sub- contract, co-PI) DARPA NMS, no
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
presented by Hasan SÖZER1 Scalable P2P Search Daniel A. Menascé George Mason University.
Chord-over-Chord Overlay Sudhindra Rao Ph.D Qualifier Exam Department of ECECS.
1 Spring Semester 2007, Dept. of Computer Science, Technion Internet Networking recitation #5 Mobile Ad-Hoc Networks TBRPF.
Spring Routing & Switching Umar Kalim Dept. of Communication Systems Engineering 06/04/2007.
UNIVERSITY OF JYVÄSKYLÄ Resource Discovery in Unstructured P2P Networks Distributed Systems Research Seminar on Mikko Vapa, research student.
Peer-to-peer file-sharing over mobile ad hoc networks Gang Ding and Bharat Bhargava Department of Computer Sciences Purdue University Pervasive Computing.
1CS 6401 Peer-to-Peer Networks Outline Overview Gnutella Structured Overlays BitTorrent.
A distributed Search Service for Peer-to-Peer File Sharing in Mobile Applications From U. of Dortmund, Germany.
The Influence of Indirect Ties on Social Network Dynamics Xiang Zuo 1, Jeremy Blackburn 2, Nicolas Kourtellis 3, John Skvoretz 1 and Adriana Iamnitchi.
P2P File Sharing Systems
Freenet. Anonymity  Napster, Gnutella, Kazaa do not provide anonymity  Users know who they are downloading from  Others know who sent a query  Freenet.
P2P Systems Meet Mobile Computing A Community-Oriented Software Infrastructure for Mobile Social Applications Cristian Borcea *, Adriana Iamnitchi + *
On The Change Rate of Identifier (ID)-to-locator Mappings in Networks with ID/Locator Separation Hongbin Luo, Hongke Zhang Beijing Jiaotong University.
A Distributed and Privacy Preserving Algorithm for Identifying Information Hubs in Social Networks M.U. Ilyas, Z Shafiq, Alex Liu, H Radha Michigan State.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
09/07/2004Peer-to-Peer Systems in Mobile Ad-hoc Networks 1 Lookup Service for Peer-to-Peer Systems in Mobile Ad-hoc Networks M. Tech Project Presentation.
1 Pertemuan 20 Teknik Routing Matakuliah: H0174/Jaringan Komputer Tahun: 2006 Versi: 1/0.
The Social Hourglass: Enabling Socially-aware Applications and Services Adriana Iamnitchi University of South Florida
Prometheus: User-Controlled P2P Social Data Management for Socially-aware Applications Nicolas Kourtellis, Joshua Finnis, Paul Anderson, Jeremy Blackburn,
A Routing Underlay for Overlay Networks Akihiro Nakao Larry Peterson Andy Bavier SIGCOMM’03 Reviewer: Jing lu.
03/19/02Scalab Seminar Series1 Mapping the Gnutella Network Macroscopic Properties of Large Scale P2P Systems Ramaswamy N.Vadivelu Scalab, ASU.
Peer Pressure: Distributed Recovery in Gnutella Pedram Keyani Brian Larson Muthukumar Senthil Computer Science Department Stanford University.
InterConnection Network Topologies to Minimize graph diameter: Low Diameter Regular graphs and Physical Wire Length Constrained networks Nilesh Choudhury.
Vulnerability in Socially-informed Peer-to-Peer Systems Jeremy Blackburn Nicolas Kourtellis Adriana Iamnitchi University of South Florida.
A Utility-based Approach to Scheduling Multimedia Streams in P2P Systems Fang Chen Computer Science Dept. University of California, Riverside
APPLICATION LAYER MULTICASTING
Experience Sharing in Mobile Peer Communities EPI Planete, INRIA International Consortium Meeting (Oulou) 10 June, 2009.
Eclipse Attacks on Overlay Networks: Threats and Defenses By Atul Singh, et. al Presented by Samuel Petreski March 31, 2009.
6 December On Selfish Routing in Internet-like Environments paper by Lili Qiu, Yang Richard Yang, Yin Zhang, Scott Shenker presentation by Ed Spitznagel.
LightFlood: An Efficient Flooding Scheme for File Search in Unstructured P2P Systems Song Jiang, Lei Guo, and Xiaodong Zhang College of William and Mary.
Measuring Behavioral Trust in Social Networks
Network Coordinates : Internet Distance Estimation Jieming ZHU
Performance of Adaptive Beam Nulling in Multihop Ad Hoc Networks Under Jamming Suman Bhunia, Vahid Behzadan, Paulo Alexandre Regis, Shamik Sengupta.
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
Brief Announcement : Measuring Robustness of Superpeer Topologies Niloy Ganguly Department of Computer Science & Engineering Indian Institute of Technology,
Algorithms and Techniques in Structured Scalable Peer-to-Peer Networks
Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design Authors: Matei Ripeanu Ian Foster Adriana.
1 HOTP2P 2011 Parallel and Distributed Systems Group, Delft University of Technology, the Netherlands May 20, 2011 Betweenness Centrality Approximations.
1 Finding Spread Blockers in Dynamic Networks (SNAKDD08)Habiba, Yintao Yu, Tanya Y., Berger-Wolf, Jared Saia Speaker: Hsu, Yu-wen Advisor: Dr. Koh, Jia-Ling.
A Bandwidth Scheduling Algorithm Based on Minimum Interference Traffic in Mesh Mode Xu-Yajing, Li-ZhiTao, Zhong-XiuFang and Xu-HuiMin International Conference.
A Simulation-Based Study of Overlay Routing Performance CS 268 Course Project Andrey Ermolinskiy, Hovig Bayandorian, Daniel Chen.
Stefanos Antaris Distributed Publish/Subscribe Notification System for Online Social Networks Stefanos Antaris *, Sarunas Girdzijauskas † George Pallis.
03/19/02Scalab Seminar Series1 Finding Good Peers in Peer-to-Peer Networks Ramaswamy N.Vadivelu Scalab, ASU.
Internet Traffic Engineering Motivation: –The Fish problem, congested links. –Two properties of IP routing Destination based Local optimization TE: optimizing.
1 Multipath Routing in WSN with multiple Sink nodes YUEQUAN CHEN, Edward Chan and Song Han Department of Computer Science City University of HongKong.
Incrementally Improving Lookup Latency in Distributed Hash Table Systems Hui Zhang 1, Ashish Goel 2, Ramesh Govindan 1 1 University of Southern California.
Distributed Caching and Adaptive Search in Multilayer P2P Networks Chen Wang, Li Xiao, Yunhao Liu, Pei Zheng The 24th International Conference on Distributed.
Jon Crowcroft Pan Hui Computer Laboratory University of Cambridge
Lei Chen and Wendi B. Heinzelman , University of Rochester
Early Measurements of a Cluster-based Architecture for P2P Systems
Peer-to-Peer Information Systems Week 6: Performance
Presentation transcript:

Peer Centrality in Socially-Informed P2P Topologies Nicolas Kourtellis, Adriana Iamnitchi Department of Computer Science & Engineering University of South Florida Tampa, USA 11 th IEEE International Conference on Peer-to-Peer Computing Kyoto, Japan, 2011

Social and Socially-aware Applications  Applications collect social information: Location, collocation, history of interactions, etc.  Use it for recommendations, inferring trust, etc.  How is this information stored and mined? 2 Internet Applications Mobile Applications

Social Graphs and P2P Networks  User social graph over particular activity edges  Users’ peers organized into a P2P network  Users store their data (edges) on particular peers 3

Motivational Example  G’s 2-hop neighborhood?  Social graph traversals translate to many P2P lookups 4 => B, C, E, A, D, F, I

Motivation  Peers acquire particular network properties due to users storing their data on them. E.g., peer 2 more central than peer 1  Application performance affected by projection of social graph on P2P network.  How does the topology of the social graph affect the P2P routing? 5

 Projection Graphs: help us study the network properties of the peers. Projection Graph Model 6 Projection Graph (PG) P2P Overlay Social Graph (SG)

7 Outline  Motivation  Projection Graph Model  Social Network Centrality Metrics Degree Node Betweenness Edge Betweenness  Centrality Calculation Limitations  Research Questions  Experimental Setup  Experimental Results  Impacts on Applications & Systems

Degree Centrality  Direct connections of a node with others  Useful to identify nodes that: Can contact directly many others with a message broadcast and perform as network hubs in a graph 8

Node Betweenness Centrality  Shortest paths between two nodes that pass through a third node, over all shortest paths between the two nodes.  Useful to identify nodes that: Control communication over indirect routes Can host data caches for reduced latency to locate data 9

Edge Betweenness Centrality  Shortest paths between two nodes that pass through an edge, over all shortest paths between the two nodes.  Useful to identify edges that: Connect distant parts of network Can monitor and block malware traffic 10

Centrality Calculation: Not easy!  Limiting factors in calculation of peer measures: Users keep their data private (encrypted, etc.) Users allow access only to their peer Intractable number of shortest paths in large graphs Unavailability of data due to peer churn 11

Research Questions  Assuming that users allow access to their centrality scores in the social graph (SG): How well can we approximate the centrality scores of their peers in the projection graph (PG)? How do the cumulative centrality scores of users associate with the centrality scores of their peers? How does the number of users storing data per peer affect the centrality scores of their peers? 12

13 Outline  Motivation  Projection Graph Model  Social Network Centrality Metrics Degree Node Betweenness Edge Betweenness  Calculation Problems  Research Questions  Experimental Setup  Experimental Results  Impacts on Applications & Systems

Experimental Setup  Community Detection: a recursive version of the Louvain algorithm  Each community mapped on a peer  Merged communities to reach average size 10, 20, …, 1000 users/peer  Community sizes exhibit social structure of power-law nature  Calculate & compare centralities for SGs & PGs 14 Social NetworkNumber of UsersNumber of Edges gnutella0410,87639,994 gnutella3162,561147,878 enron33,696180,811 epinions75,877405,739 slashdot82,168504,230

Comparison of Centrality Scores  Turning point: Centralities of peers reach max P2P network exhibits optimal structuring Maximum opportunity for peers to influence information flows through them. 15 Users/Peer vs. Degree Users/Peer vs. Node Betweenness Users/Peer Vs. Edge Betweenness

Correlation of Centrality Scores  Before turning point: PG resembles closely SG Correlation of SG and PG metrics is highest Degree and Node Betweenness estimated by local info (cumulative scores) 16  After turning point: PG topology loses social properties A highly connected clique Peers acquire equal importance in graph traversal Users/Peer vs. Degree Users/Peer vs. Node Betweenness Users/Peer vs. Edge Betweenness

Finding High Betweenness Peers  Such peers affect system performance and security.  Difficult to identify (network scale, peer churn, etc.)  Can we identify such peers, knowing the top betweenness users?  Top 5% betweenness centrality users => top betweenness centrality peers with 80–90% accuracy 17 Users/Peer (Top-N% users) Users/Peer (Top-N% communities)

Impact on Applications & Systems  Target high degree peers to: Decrease search time Increase breadth of search and diversity of results  Target high betweenness peers to: Monitor information flow and collect traces Place data caches and indexes of data location Quarantine malware outbursts Disseminate software patches  Tackle P2P churn Predict centrality of peers to allocate resources  Reduce overlay overhead Enhance routing tables with P2P edges for faster & more secure peer discovery 18

19 Thank you! This work was supported by NSF Grants: CNS and CNS

Projection Graphs  Community Size Distribution  Degree Distribution 20

Approximation of Peer Betweenness  Top 5% betweenness centrality users => top betweenness centrality peers with 80–90% accuracy 21 1.Pick top-N% betweenness users. 2.Identify set U of their peers. 3.Pick k=|U| top betweenness peers, set P. 4.Compare sets U & P, find peer overlap. 1.Pick set C communities in top-N% cumulative score of betweenness. 2.Pick q=|C| top-N% betweenness peers, set P. 3.Compare sets C & P, find peer overlap.

P2P Social Networks and Services  P2P Systems that could benefit from this work: Commercial Efforts:  Diaspora  FreedomBox  EnThinnai Academic Efforts:  Prometheus  LifeSocial.KOM  Vis-à-Vis  Safebook  PeerSoN  Tribler  F2F  Turtle  Sprout 22