Trustworthy Distributed Computing on Social Networks

In this paper we investigate a new computing paradigm, called SocialCloud, in which computing nodes are governed by social ties driven from a bootstrapping trust-possessing social graph. We investigate how this paradigm differs from existing computing paradigms, such as grid computing and the conventional cloud computing paradigms. We show that incentives to adopt this paradigm are intuitive and natural, and security and trust guarantees provided by it are solid. We propose metrics for measuring the utility and advantage of this computing paradigm, and using real-world social graphs and structures of social traces; we investigate the potential of this paradigm for ordinary users. We study several design options and trade-offs, such as scheduling algorithms, centralization, and straggler handling, and show how they affect the utility of the paradigm. Interestingly, we conclude that whereas graphs known in the literature for high trust properties do not serve distributed trusted computing algorithms, such as Sybil defenses--for their weak algorithmic properties, such graphs are good candidates for our paradigm for their self-load-balancing features.

[1]  Chenyu Wang,et al.  Exploring MapReduce efficiency with highly-distributed data , 2011, MapReduce '11.

[2]  Nicholas Hopper,et al.  Membership-concealing overlay networks , 2009, CCS.

[3]  Aziz Mohaisen,et al.  Trustworthy Distributed Computing on Social Networks , 2013, IEEE Transactions on Services Computing.

[4]  Kyle Chard,et al.  Social Cloud: Cloud Computing in Social Networks , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[5]  Christian Haas,et al.  Engineering Incentives in Social Clouds , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[6]  Mads Haahr,et al.  Social network analysis for routing in disconnected delay-tolerant MANETs , 2007, MobiHoc '07.

[7]  Aziz Mohaisen,et al.  Dynamix: anonymity on dynamic social structures , 2013, ASIA CCS '13.

[8]  Prateek Mittal,et al.  Pisces: Anonymous Communication Using Social Networks , 2013, NDSS.

[9]  Marios D. Dikaiakos,et al.  Cloud Computing: Distributed Internet Computing for IT and Scientific Research , 2009, IEEE Internet Computing.

[10]  Bart Selman,et al.  Referral Web: combining social networks and collaborative filtering , 1997, CACM.

[11]  Lizhe Wang,et al.  Scientific Cloud Computing: Early Definition and Experience , 2008, 2008 10th IEEE International Conference on High Performance Computing and Communications.

[12]  Luiz André Barroso,et al.  The Case for Energy-Proportional Computing , 2007, Computer.

[13]  Greg Bigwood,et al.  Social DTN routing , 2008, CoNEXT '08.

[14]  Shouhuai Xu,et al.  Exploiting social networks for threshold signing: attack-resilience vs. availability , 2008, ASIACCS '08.

[15]  Feng Wang,et al.  Measurement and utilization of customer-provided resources for cloud computing , 2012, 2012 Proceedings IEEE INFOCOM.

[16]  Shishir Nagaraja,et al.  Anonymity in the Wild: Mixes on Unstructured Networks , 2007, Privacy Enhancing Technologies.

[17]  Abhishek Chandra,et al.  Nebulas: Using Distributed Voluntary Resources to Build Clouds , 2009, HotCloud.

[18]  Kyle Chard,et al.  A Social Cloud for Public eResearch , 2011, 2011 IEEE Seventh International Conference on eScience.

[19]  K. J. Ray Liu,et al.  Incentive Cooperation Strategies for Peer-to-Peer Live Multimedia Streaming Social Networks , 2009, IEEE Transactions on Multimedia.

[20]  Sanjay Ghemawat,et al.  MapReduce: a flexible data processing tool , 2010, CACM.

[21]  Aziz Mohaisen,et al.  On the mixing time of directed social graphs and security implications , 2012, ASIACCS '12.

[22]  Aziz Mohaisen,et al.  Measuring the mixing time of social graphs , 2010, IMC '10.

[23]  Miron Livny,et al.  Condor-a hunter of idle workstations , 1988, [1988] Proceedings. The 8th International Conference on Distributed.

[24]  Wenjun Wu,et al.  Open Social Based Collaborative Science Gateways , 2011, 2011 11th IEEE/ACM International Symposium on Cluster, Cloud and Grid Computing.

[25]  Kyle Chard,et al.  Social Cloud Computing: A Vision for Socially Motivated Resource Sharing , 2012, IEEE Transactions on Services Computing.

[26]  Gaetano Borriello,et al.  Next century challenges: data-centric networking for invisible computing: the Portolano project at the University of Washington , 1999, MobiCom.

[27]  Tharam S. Dillon,et al.  Cloud Computing: Issues and Challenges , 2010, 2010 24th IEEE International Conference on Advanced Information Networking and Applications.

[28]  Yong Zhao,et al.  Cloud Computing and Grid Computing 360-Degree Compared , 2008, GCE 2008.

[29]  Kyle Chard,et al.  Collaborative eResearch in a Social Cloud , 2011, 2011 IEEE Seventh International Conference on eScience.

[30]  V. Kavitha,et al.  A survey on security issues in service delivery models of cloud computing , 2011, J. Netw. Comput. Appl..

[31]  Jinyang Li,et al.  Friendstore: cooperative online backup using trusted nodes , 2008, SocialNets '08.

[32]  Wu-chun Feng,et al.  MOON: MapReduce On Opportunistic eNvironments , 2010, HPDC '10.

[33]  David P. Anderson,et al.  SETI@home: an experiment in public-resource computing , 2002, CACM.

[34]  Aziz Mohaisen,et al.  Keep your friends close: Incorporating trust into social network-based Sybil defenses , 2011, 2011 Proceedings IEEE INFOCOM.

[35]  Dawn Xiaodong Song,et al.  Preserving Link Privacy in Social Network Based Systems , 2012, NDSS.

[36]  Krishna P. Gummadi,et al.  Canal: scaling social network-based Sybil tolerance schemes , 2012, EuroSys '12.

[37]  Aziz Mohaisen,et al.  Secure Encounter-Based Mobile Social Networks: Requirements, Designs, and Tradeoffs , 2013, IEEE Transactions on Dependable and Secure Computing.

[38]  Christian Haas,et al.  Foundations of Trust: Contextualising Trust in Social Clouds , 2012, 2012 Second International Conference on Cloud and Green Computing.

[39]  Jiye Yu,et al.  iLink: search and routing in social networks , 2007, KDD '07.

[40]  George Danezis,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.

[41]  Prateek Mittal,et al.  X-Vine: Secure and Pseudonymous Routing Using Social Networks , 2011, ArXiv.

[42]  Abhishek Chandra,et al.  Early experience with the distributed nebula cloud , 2011, DIDC '11.

[43]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[44]  Muthucumaru Maheswaran,et al.  Towards Trust-Aware Resource Management in Grid Computing Systems , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).

[45]  Ravi Sundaram,et al.  WebCloud: Recruiting Social Network Users to Assist in Content Distribution , 2012, 2012 IEEE 11th International Symposium on Network Computing and Applications.

[46]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2008, TNET.

[47]  Daniel S. Katz,et al.  A Social Content Delivery Network for Scientific Cooperation: Vision, Design, and Architecture , 2012, 2012 SC Companion: High Performance Computing, Networking Storage and Analysis.

[48]  Michael Kaminsky,et al.  SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.