On the Design of Socially-Aware Distributed Systems

Social media services and applications enable billions of users to share an unprecedented amount of social information, which is further augmented by location and collocation information from mobile phones, and can be aggregated to provide an accurate digital representation of the social world. This dissertation argues that extracted social knowledge from this wealth of information can be embedded in the design of novel distributed, socially-aware applications and services, consequently improving system response time, availability and resilience to attacks, and reducing system overhead. To support this thesis, two research avenues are explored. First, this dissertation presents Prometheus, a socially-aware peer-to-peer service that collects social information from multiple sources, maintains it in a decentralized fashion on user-contributed nodes, and exposes it to applications through an interface that implements non-trivial social inferences. The system's socially-aware design leads to multiple system improvements: 1) it increases service availability by allowing users to manage their social information via socially-trusted peers, 2) it improves social inference performance and reduces message overhead by exploiting naturally-formed social groups, and 3) it reduces the opportunity of attackers to influence application requests. These performance improvements are assessed via simulations and a prototype deployment on a local cluster and on a worldwide testbed (PlanetLab) under emulated application workloads. Second, this dissertation defines the projection graph, the result of decentralizing a social graph onto a peer-to-peer system such as Prometheus, and studies the system's network properties and how they can be used to design more efficient socially-aware distributed applications and services. In particular: 1) it analytically formulates the relation between centrality metrics such as degree centrality, node betweenness centrality, and edge betweenness centrality in the social graph and in the emerging projection graph, 2) it experimentally demonstrates on real networks that for small groups of users mapped on peers, there is high association of social and projection graph properties, 3) it shows how these properties of the (dynamic) projection graph can be accurately inferred from the properties of the (slower changing) social graph, and 4) it demonstrates with two search application scenarios the usability of the projection graph in designing social search applications and unstructured P2P overlays. These research results lead to the formulation of lessons applicable to the design of socially-aware applications and distributed systems for improved application performance such as social search, data dissemination, data placement and caching, as well as for reduced system communication overhead and increased system resilience to attacks.

[1]  Balachander Krishnamurthy,et al.  A few chirps about twitter , 2008, WOSN '08.

[2]  H. Nissenbaum Privacy as contextual integrity , 2004 .

[3]  A-L Barabási,et al.  Structure and tie strengths in mobile communication networks , 2006, Proceedings of the National Academy of Sciences.

[4]  Krishna P. Gummadi,et al.  Ostra: Leveraging Trust to Thwart Unwanted Communication , 2008, NSDI.

[5]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[6]  Marco Gonzalez,et al.  Author's Personal Copy Social Networks Tastes, Ties, and Time: a New Social Network Dataset Using Facebook.com , 2022 .

[7]  GeoS: A Service for the Management of Geo-Social Information in a Distributed System , 2010 .

[8]  Jennifer Golbeck,et al.  The dynamics of Web-based social networks: Membership, relationships, and change , 2007, First Monday.

[9]  Pablo Rodriguez,et al.  The little engine(s) that could: scaling online social networks , 2012, TNET.

[10]  Nick Feamster,et al.  Authenticated out-of-band communication over social links , 2008, WOSN '08.

[11]  Nam P. Nguyen,et al.  A novel method for worm containment on dynamic social networks , 2010, 2010 - MILCOM 2010 MILITARY COMMUNICATIONS CONFERENCE.

[12]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[13]  Cristian Borcea,et al.  MobiSoC: a middleware for mobile social computing applications , 2009, Mob. Networks Appl..

[14]  George Danezis,et al.  Sybil-Resistant DHT Routing , 2005, ESORICS.

[15]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[16]  George Varghese,et al.  MobiClique: middleware for mobile social networking , 2009, WOSN '09.

[17]  Lakshminarayanan Subramanian,et al.  Optimal Sybil-resilient node admission control , 2011, 2011 Proceedings IEEE INFOCOM.

[18]  Duncan J. Watts,et al.  Collective dynamics of ‘small-world’ networks , 1998, Nature.

[19]  Jacob Ratkiewicz,et al.  Truthy: mapping the spread of astroturf in microblog streams , 2010, WWW.

[20]  Krishna P. Gummadi,et al.  Exploiting Social Networks for Internet Search , 2006, HotNets.

[21]  Adriana Iamnitchi,et al.  Cheaters in a gaming social network , 2011, PERV.

[22]  David Mazières,et al.  RE: Reliable Email , 2006, NSDI.

[23]  Sonja Buchegger,et al.  A case for P2P infrastructure for social networks - opportunities & challenges , 2009, 2009 Sixth International Conference on Wireless On-Demand Network Systems and Services.

[24]  Adriana Iamnitchi,et al.  K-path centrality: a new centrality measure in social networks , 2011, SNS '11.

[25]  Alec Wolman,et al.  Lockr: better privacy for social networks , 2009, CoNEXT '09.

[26]  H. Lim,et al.  Vis-à-Vis : Online Social Networking via Virtual Individual Ser vers , 2008 .

[27]  Adriana Iamnitchi,et al.  Vulnerability in socially-informed peer-to-peer systems , 2011, SNS '11.

[28]  Krzysztof Rzadca,et al.  Decentralized Online Social Networks , 2010, Handbook of Social Network Technologies.

[29]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[30]  Ben Y. Zhao,et al.  Measurement-calibrated graph models for social network experiments , 2010, WWW '10.

[31]  Noah E. Friedkin,et al.  Horizons of Observability and Limits of Informal Control in Organizations , 1983 .

[32]  Jennifer Neville,et al.  Using Transactional Information to Predict Link Strength in Online Social Networks , 2009, ICWSM.

[33]  Adriana Iamnitchi,et al.  Inferring peer centrality in socially-informed peer-to-peer systems , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.

[34]  Jia Zhang,et al.  Improving peer-to-peer search performance through intelligent social search , 2009, Expert Syst. Appl..

[35]  Mika Raento,et al.  ContextPhone: a prototyping platform for context-aware mobile applications , 2005, IEEE Pervasive Computing.

[36]  Jennifer Neville,et al.  Modeling relationship strength in online social networks , 2010, WWW '10.

[37]  Leonard M. Freeman,et al.  A set of measures of centrality based upon betweenness , 1977 .

[38]  Konstantin Beznosov,et al.  The socialbot network: when bots socialize for fame and money , 2011, ACSAC '11.

[39]  Adriana Iamnitchi,et al.  BatTorrent: A Battery-Aware BitTorrent for Mobile Devices , 2009 .

[40]  Ramón Cáceres,et al.  Vis-à-Vis: Privacy-preserving online social networking via Virtual Individual Servers , 2011, 2011 Third International Conference on Communication Systems and Networks (COMSNETS 2011).

[41]  Jinyang Li,et al.  Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.

[42]  Tim Dierks,et al.  The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .

[43]  Jie Liu,et al.  SpeakerSense: Energy Efficient Unobtrusive Speaker Identification on Mobile Phones , 2011, Pervasive.

[44]  J. Anthonisse The rush in a directed graph , 1971 .

[45]  Sencun Zhu,et al.  A Social Network Based Patching Scheme for Worm Containment in Cellular Networks , 2009, IEEE INFOCOM 2009.

[46]  Lada A. Adamic,et al.  The very small world of the well-connected , 2009 .

[47]  Gustavo Alonso,et al.  A tuple space for social networking on mobile phones , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[48]  Jinyang Li,et al.  F2F: Reliable Storage in Open Networks , 2006, IPTPS.

[49]  Ian T. Foster,et al.  Mapping the Gnutella Network , 2002, IEEE Internet Comput..

[50]  Jean-Loup Guillaume,et al.  Fast unfolding of communities in large networks , 2008, 0803.0476.

[51]  Cristian Borcea,et al.  Analysis of fusing online and co-presence social networks , 2011, 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops).

[52]  Erdong Chen,et al.  Facebook immune system , 2011, SNS '11.

[53]  Alexandru Iosup,et al.  TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .

[54]  B. Wellman Structural analysis: From method and metaphor to theory and substance. , 1988 .

[55]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[56]  Mirco Musolesi,et al.  Sensing meets mobile social networks: the design, implementation and evaluation of the CenceMe application , 2008, SenSys '08.

[57]  Hector Garcia-Molina,et al.  SPROUT: P2P Routing with Social Networks , 2004, EDBT Workshops.

[58]  Miguel Castro,et al.  Scribe: a large-scale and decentralized application-level multicast infrastructure , 2002, IEEE J. Sel. Areas Commun..

[59]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[60]  Cheng-Fu Chou,et al.  Distributed Social-based Overlay Adaptation for Unstructured P2P Networks , 2007, 2007 IEEE Global Internet Symposium.

[61]  S. Borgatti,et al.  The centrality of groups and classes , 1999 .

[62]  Guillaume Pierre,et al.  A survey of DHT security techniques , 2011, CSUR.

[63]  M. Newman,et al.  Finding community structure in very large networks. , 2004, Physical review. E, Statistical, nonlinear, and soft matter physics.

[64]  Andrew S. Tanenbaum,et al.  Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.

[65]  P. Oscar Boykin,et al.  Collaborative Spam Filtering Using E-Mail Networks , 2006, Computer.

[66]  M. Frans Kaashoek,et al.  Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.

[67]  Robin I. M. Dunbar,et al.  The costs of family and friends: an 18-month longitudinal study of relationship maintenance and decay , 2011 .

[68]  Xiaoning Ding,et al.  Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.

[69]  Cecilia Mascolo,et al.  Socio-Spatial Properties of Online Location-Based Social Networks , 2011, ICWSM.

[70]  Adriana Iamnitchi,et al.  Identifying high betweenness centrality nodes in large social networks , 2012, Social Network Analysis and Mining.

[71]  Kôiti Hasida,et al.  POLYPHONET: an advanced social network extraction system from the web , 2006, WWW '06.

[72]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[73]  Lada A. Adamic,et al.  Search in Power-Law Networks , 2001, Physical review. E, Statistical, nonlinear, and soft matter physics.

[74]  Krishna P. Gummadi,et al.  Measurement and analysis of online social networks , 2007, IMC '07.

[75]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[76]  Adriana Iamnitchi,et al.  The Social Hourglass: An Infrastructure for Socially Aware Applications and Services , 2012, IEEE Internet Computing.

[77]  M E J Newman,et al.  Finding and evaluating community structure in networks. , 2003, Physical review. E, Statistical, nonlinear, and soft matter physics.

[78]  Daniel Stutzbach,et al.  On the Long-term Evolution of the Two-Tier Gnutella Overlay , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[79]  Liam McNamara,et al.  A middleware service for pervasive social networking , 2009, M-PAC '09.

[80]  Refik Molva,et al.  On the Security and Feasibility of Safebook: A Distributed Privacy-Preserving Online Social Network , 2009, PrimeLife.

[81]  Rossano Schifanella,et al.  Tempering Kademlia with a Robust Identity Based System , 2008, 2008 Eighth International Conference on Peer-to-Peer Computing.

[82]  Alex Pentland,et al.  Reality mining: sensing complex social systems , 2006, Personal and Ubiquitous Computing.

[83]  A. Vázquez Growing network with local rules: preferential attachment, clustering hierarchy, and degree correlations. , 2002, Physical review. E, Statistical, nonlinear, and soft matter physics.

[84]  Stephen Farrell,et al.  Harvesting with SONAR: the value of aggregating social network information , 2008, CHI.

[85]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[86]  Marc Barthelemy,et al.  Group betweenness and co-betweenness: Inter-related notions of coalition centrality , 2009, Soc. Networks.

[87]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[88]  Jure Leskovec,et al.  Statistical properties of community structure in large social and information networks , 2008, WWW.

[89]  Ben Y. Zhao,et al.  User interactions in social networks and their implications , 2009, EuroSys '09.

[90]  Panayotis Antoniadis,et al.  Incentives for resource sharing in self-organized communities: From economics to social psychology , 2007, 2007 2nd International Conference on Digital Information Management.

[91]  Ramón Cáceres,et al.  Privacy, cost, and availability tradeoffs in decentralized OSNs , 2009, WOSN '09.

[92]  C. Lee Giles,et al.  Self-Organization and Identification of Web Communities , 2002, Computer.

[93]  Helen Nissenbaum,et al.  Privacy and contextual integrity: framework and applications , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[94]  Paul Anderson,et al.  On managing social data for enabling socially-aware applications and services , 2010, SNS '10.

[95]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[96]  Bernardo A. Huberman,et al.  Rhythms of social interaction: messaging within a massive online network , 2006, ArXiv.

[97]  Michael Szell,et al.  Measuring social dynamics in a massive multiplayer online game , 2009, Soc. Networks.

[98]  Antony I. T. Rowstron,et al.  Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.

[99]  Shivakant Mishra,et al.  Fusing mobile, sensor, and social data to fully enable context-aware computing , 2010, HotMobile '10.

[100]  Matei Ripeanu,et al.  Branded with a scarlet "C": cheaters in a gaming social network , 2012, WWW.

[101]  Giancarlo Ruffo,et al.  LotusNet: Tunable privacy for distributed online social network services , 2012, Comput. Commun..

[102]  Ralf Steinmetz,et al.  LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).

[103]  Mary Baker,et al.  The LOCKSS peer-to-peer digital preservation system , 2005, TOCS.

[104]  Valérie Issarny,et al.  Yarta: A Middleware for Managing Mobile Social Ecosystems , 2011, GPC.

[105]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..

[106]  Paul Anderson,et al.  Prometheus: User-Controlled P2P Social Data Management for Socially-Aware Applications , 2010, Middleware.

[107]  Yaoru Sun,et al.  SELF‐ORGANIZING PEER‐TO‐PEER SOCIAL NETWORKS , 2008, Comput. Intell..

[108]  Robin I. M. Dunbar Grooming, Gossip and the Evolution of Language , 1996 .

[109]  J. Nieminen On the centrality in a graph. , 1974, Scandinavian journal of psychology.