Computational Offloading for Efficient Trust Management in Pervasive Online Social Networks Using Osmotic Computing

Pervasive social networking (PSN) aims at bridging the gap between the services and users by providing a platform for social communication irrespective of the time and location. With the advent of a new era of high-speed telecommunication services, mobile users have evolved to a large extent demanding secure, private, and trustworthy services. Online social networks have evolved as pervasive online social networks (POSNs), which uses a common platform to connect users from hybrid applications. Trust has always been a concern for these networks. However, existing approaches tend to provide application-specific trust management, thus resulting in the cost of excessive network resource utilization and high computations. In this paper, a pervasive trust management framework is presented for POSNs, which is capable of generating high trust value between the users with a lower cost of monitoring. The proposed approach uses a flexible mixture model to develop the system around six different properties, and then utilizes the concept of osmotic computing to perform computational offloading, which reduces the number of computations as well as computational time. The novel concepts of lock door policy and intermediate state management procedure are used to allow trust visualization by providing efficient identification of trustworthy and untrustworthy users. The proposed approach is capable of predicting user ratings efficiently with extremely low errors, which are in the range of ±2. The effectiveness of the proposed approach is demonstrated using theoretical and numerical analyses along with data set-based simulations.

[1]  Luo Si,et al.  A study of mixture models for collaborative filtering , 2006, Information Retrieval.

[2]  Gianpiero Costantino,et al.  Enhancing Video Surveillance with Usage Control and Privacy-Preserving Solutions , 2016, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[3]  Carol J. Fung,et al.  Disincentivizing Malicious Users in RecDroid Using Bayesian Game Model , 2015, J. Internet Serv. Inf. Secur..

[4]  Mudita Singhal,et al.  Supervised and Unsupervised methods to detect Insider Threat from Enterprise Social and Online Activity Data , 2015, J. Wirel. Mob. Networks Ubiquitous Comput. Dependable Appl..

[5]  Zheng Yan,et al.  Trust Evaluation in Social Networking: A Review , 2016, MobiMedia.

[6]  Jie Wu,et al.  Generating trusted graphs for trust evaluation in online social networks , 2014, Future Gener. Comput. Syst..

[7]  Inderveer Chana,et al.  Artificial bee colony based energy‐aware resource utilization technique for cloud computing , 2015, Concurr. Comput. Pract. Exp..

[8]  Valtteri Niemi,et al.  Secure pervasive social networking based on multi-dimensional trust levels , 2013, 2013 IEEE Conference on Communications and Network Security (CNS).

[9]  D. Karaboga,et al.  On the performance of artificial bee colony (ABC) algorithm , 2008, Appl. Soft Comput..

[10]  ChanaInderveer,et al.  Artificial bee colony based energy-aware resource utilization technique for cloud computing , 2015 .

[11]  Kouichi Sakurai,et al.  A Hybrid Encryption Scheme with Key-cloning Protection: User / Terminal Double Authentication via Attributes and Fingerprints , 2016, J. Internet Serv. Inf. Secur..

[12]  Luo Si,et al.  Flexible Mixture Model for Collaborative Filtering , 2003, ICML.

[13]  Yue Shen,et al.  PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.

[14]  Azzedine Boukerche,et al.  Pervasive forwarding mechanism for mobile social networks , 2016, Comput. Networks.

[15]  Santosh V. Nagaraj,et al.  Entropy-based spectrum sensing in cognitive radio , 2009, Signal Process..

[16]  Zheng Yan,et al.  PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management , 2015, ACM Trans. Multim. Comput. Commun. Appl..

[17]  J. Mosimann On the compound multinomial distribution, the multivariate β-distribution, and correlations among proportions , 1962 .

[18]  Xuemin Shen,et al.  Exploiting mobile crowdsourcing for pervasive cloud services: challenges and solutions , 2015, IEEE Communications Magazine.

[19]  Georgios Theodoropoulos,et al.  Insider Threats: Identifying Anomalous Human Behaviour in Heterogeneous Systems Using Beneficial Intelligent Software (Ben-ware) , 2015, MIST@CCS.

[20]  Yue Shen,et al.  A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..

[21]  Jia Guo,et al.  Trust Management for SOA-Based IoT and Its Application to Service Composition , 2016, IEEE Transactions on Services Computing.

[22]  Zhou Su,et al.  Cooperative Networking towards Maritime Cyber Physical Systems , 2016, Int. J. Distributed Sens. Networks.

[23]  Lale Özbakır,et al.  Artificial Bee Colony Algorithm and Its Application to Generalized Assignment Problem , 2007 .

[24]  Rajiv Ranjan,et al.  Osmotic Computing: A New Paradigm for Edge/Cloud Integration , 2016, IEEE Cloud Computing.

[25]  Raimo Kantola,et al.  Unwanted Content Control via Trust Management in Pervasive Social Networking , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[26]  Zheng Yan,et al.  Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels , 2017, IEEE Systems Journal.

[27]  Zheng Yan,et al.  Secure Pervasive Social Communications Based on Trust in a Distributed Way , 2016, IEEE Access.

[28]  Yan Zheng,et al.  Anonymous Authentication for Trustworthy Pervasive Social Networking , 2015, IEEE Transactions on Computational Social Systems.

[29]  Yue Zhang,et al.  Social behavior study under pervasive social networking based on decentralized deep reinforcement learning , 2017, J. Netw. Comput. Appl..

[30]  Thomas Stützle,et al.  Ant colony optimization: artificial ants as a computational intelligence technique , 2006 .

[31]  Hsing-Chung Chen,et al.  Driver behaviour detection and vehicle rating using multi-UAV coordinated vehicular networks , 2017, J. Comput. Syst. Sci..

[32]  Michael H. Coen A Similarity Metric for Spatial Probability Distributions , .

[33]  Raimo Kantola,et al.  Personal Data Access Based on Trust Assessment in Mobile Social Networking , 2014, 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and Communications.