Social Network Message Credibility: An Agent-Based Modelling Approach

The increased opportunities to engage in social interaction presented by Internet based platforms such as Facebook, My Space and Google+ has led to larger volumes of personal data being shared online. As such, social phenomena such as information sharing, propagation and 'gossiping', amongst other behaviours, makes it challenging to access the integrity of online social interactions. Furthermore, the ability to remotely access, control and re-purpose text-based messages means that concerns about the security of this personal 'paper-trail' of information is also becoming a higher priority for users of social media. Using an agent based modelling (ABM) approach, we use the abstraction of an 'agent' to investigate how the dynamics of a social network can be affected by the presence of malicious agents. Such a scenario reduces the chances of having information that can be trusted as agents may be fabricating and sharing misleading information with other agents. However, the extent to which malicious agents can penetrate a network and the procedures by which credible data is achieved may not be known which is the primary thrust of this research.

[1]  Freimut Bodendorf,et al.  Ant-Based Simulation of Opinion Spreading in Online Social Networks , 2010, 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology.

[2]  Feng Wang,et al.  Accelerating peer-to-peer file sharing with social relations: Potentials and challenges , 2012, 2012 Proceedings IEEE INFOCOM.

[3]  Nauman Aslam,et al.  Secure Communication in Next Generation Internet , 2008, 6th Annual Communication Networks and Services Research Conference (cnsr 2008).

[4]  P. Pirolli,et al.  It's Not in Their Tweets: Modeling Topical Expertise of Twitter Users , 2012, 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Confernece on Social Computing.

[5]  Refik Molva,et al.  Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network , 2009, 2009 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks & Workshops.

[6]  Latanya Sweeney,et al.  k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[7]  Hirotsugu Kinoshita,et al.  Agent-based social simulation model that accommodates diversity of human values , 2012, 2012 IEEE International Conference on Systems, Man, and Cybernetics (SMC).

[8]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[9]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[10]  Sneha Kumar Kasera,et al.  SocialSwarm: Exploiting distance in social networks for collaborative flash file distribution , 2010, The 18th IEEE International Conference on Network Protocols.

[11]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[12]  Honggang Zhang,et al.  Can Online Social Friends Help to Improve Data Swarming Performance? , 2012, 2012 21st International Conference on Computer Communications and Networks (ICCCN).

[13]  Shiuh-Pyng Shieh,et al.  A Batch-Authenticated and Key Agreement Framework for P2P-Based Online Social Networks , 2012, IEEE Transactions on Vehicular Technology.

[14]  Michael J. North,et al.  Agent-based modeling and simulation: introductory tutorial , 2013, WSC '13.

[15]  Alvaro Arenas,et al.  On trust management in grids , 2007, AUTONOMICS 2007.

[16]  Klaus Rechert,et al.  Spontaneous privacy-aware location sharing , 2009, 2009 Joint Conferences on Pervasive Computing (JCPC).