Peer-to-Peer Social Networks

In the last ten years, the pervasive adoption of social networking sites has deeply changed the web. Social web sites have attracted users with very weak interest in technology, including people that before the social networking revolution were not even regular users of other popular Internet services and computers in general (Stroud, 2008). The phenomenon is so widespread that many people started using social networking systems to ask questions directly to people instead of querying search engines (Morris et al., 2010) and in place of regular email. Moreover, some of the largest social networking sites constitute a separate and closed network (Sabbag, 2011). After the huge success of the early social networking systems, many other players came in the social networking market and nowadays hundreds of different social networking systems exist. Even if the social networking systems are greatly dissimilar in their user base and functionality, they are almost always centralized systems. The centralized nature allows a simple browser-based user experience and, moreover, many algorithms, e.g., friend suggestion, are far easier and more efficient to implement in this setting. However, it also presents many drawbacks, e.g., lack of privacy, lack of anonymity, risks of censorship and operating costs. The goal of this chapter is to briefly introduce social networks, to show their relationships with peer-to-peer and multi-agent systems, and to discuss about the use of peer-to-peer and multi-agent systems in development of social network systems.

[1]  Meredith Ringel Morris,et al.  What do people ask their social networks, and why?: a survey study of status message q&a behavior , 2010, CHI.

[2]  Refik Molva,et al.  Safebook: A privacy-preserving online social network leveraging on real-life trust , 2009, IEEE Communications Magazine.

[3]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[4]  Jörg P. Müller,et al.  Architectures and applications of intelligent agents: A survey , 1999, The Knowledge Engineering Review.

[5]  Ian Clarke,et al.  Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[6]  Brian W. Fitzpatrick,et al.  The Case Against Data Lock-in , 2010, ACM Queue.

[7]  Diomidis Spinellis,et al.  A survey of peer-to-peer content distribution technologies , 2004, CSUR.

[8]  Rüdiger Schollmeier,et al.  A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.

[9]  Danah Boyd,et al.  Social Network Sites: Definition, History, and Scholarship , 2007, J. Comput. Mediat. Commun..

[10]  Emmanuelle Anceaume,et al.  PeerCube: A Hypercube-Based P2P Overlay Robust against Collusion and Churn , 2008, 2008 Second IEEE International Conference on Self-Adaptive and Self-Organizing Systems.

[11]  Michael Zink,et al.  Characteristics of YouTube network traffic at a campus network - Measurements, models, and implications , 2009, Comput. Networks.

[12]  Bobby Bhattacharjee,et al.  Persona: an online social network with user-defined privacy , 2009, SIGCOMM '09.

[13]  B. Cohen,et al.  Incentives Build Robustness in Bit-Torrent , 2003 .

[14]  D. Stroud Social networking: An age-neutral commodity — Social networking becomes a mature web application , 2008 .

[15]  Bill Moore,et al.  GFS: Evolution on Fast-Forward , 2010 .

[16]  Kazuhiro Kuwabara,et al.  Shine: a peer-to-peer based framework of network community support systems , 2003, Comput. Commun..

[17]  Giancarlo Ruffo,et al.  LotusNet: Tunable privacy for distributed online social network services , 2012, Comput. Commun..

[18]  S. Wasserman,et al.  Models and methods in social network analysis , 2005 .

[19]  Manolis Koubarakis,et al.  Multi-agent Systems and Peer-to-Peer Computing: Methods, Systems, and Challenges , 2003, CIA.

[20]  Makoto Yokoo,et al.  Socialware: multiagent systems for supporting network communities , 1999, CACM.

[21]  Jürgen Dix,et al.  Multi-Agent Programming: Languages, Tools and Applications , 2009 .

[22]  Nicholas R. Jennings,et al.  Developing Industrial Multi-Agent Systems , 1995, ICMAS.

[23]  Agostino Poggi,et al.  Multi-Agent Systems and Social Networks , 2012 .

[24]  Kenneth G. Paterson,et al.  Trusted computing: providing security for peer-to-peer networks , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).

[25]  Rayadurgam Srikant,et al.  Modeling and performance analysis of BitTorrent-like peer-to-peer networks , 2004, SIGCOMM 2004.

[26]  Luciano Rossoni,et al.  Models and methods in social network analysis , 2006 .

[27]  Michele Tomaiuolo,et al.  Software Agents for Distributed Social Networking , 2012, WOA.

[28]  Li Xiaoming,et al.  Maze: a social peer-to-peer network , 2004, IEEE International Conference on E-Commerce Technology for Dynamic E-Business.

[29]  Guillaume Pierre,et al.  A survey of DHT security techniques , 2011, CSUR.

[30]  Jacques Ferber,et al.  Multi-agent systems - an introduction to distributed artificial intelligence , 1999 .

[31]  Fang Wang,et al.  Structure of peer-to-peer social networks. , 2006, Physical review. E, Statistical, nonlinear, and soft matter physics.

[32]  Sonja Buchegger,et al.  PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.

[33]  Michael McGill,et al.  Introduction to Modern Information Retrieval , 1983 .

[34]  Jun Wang,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[35]  Bart Selman,et al.  Referral Web: combining social networks and collaborative filtering , 1997, CACM.

[36]  Munindar P. Singh,et al.  Searching social networks , 2003, AAMAS '03.

[37]  Rita Gunther McGrath Business Models: A Discovery Driven Approach , 2010 .

[38]  Leonard N. Foner,et al.  Yenta: a multi-agent, referral-based matchmaking system , 1997, AGENTS '97.

[39]  Agostino Poggi,et al.  JADE: A software framework for developing multi-agent applications. Lessons learned , 2008, Inf. Softw. Technol..