PSNController: An Unwanted Content Control System in Pervasive Social Networking Based on Trust Management

Pervasive social networking (PSN) supports online and instant social activities and communications in a universal and pervasive manner on the basis of heterogeneous networks. However, at the same time, when mobile users expect useful and valuable contents via PSN, they may also receive unwanted, unexpected, or even malicious contents. These contents may intrude user devices, occupy device memories, and irritate mobile users. Unwanted content control in PSN has become a crucial issue that impacts the success of PSN usage. Nowadays, the literature still lacks a robust and generic unwanted content control system that can be practically applied. In this article, we present the design and implementation of PSNController, an unwanted content control system in PSN based on trust management. We evaluate the system performance under a variety of intrusions and attacks. The result shows the system is effective with regard to accuracy, efficiency, and robustness. It can control unwanted contents in PSN according to trust evaluation. We further study user acceptance on PSNController prototype system based on a small-scale user study. We receive sound user feedback on PSNController with regard to perceived ease of use, perceived usefulness, interface design, playfulness, and acceptance attitude.

[1]  Wilfried N. Gansterer,et al.  Multi-Level Reputation-Based Greylisting , 2008, 2008 Third International Conference on Availability, Reliability and Security.

[2]  Hong Peng,et al.  Research on a Naive Bayesian Based Short Message Filtering System , 2006, 2006 International Conference on Machine Learning and Cybernetics.

[3]  Yue Shen,et al.  A practical reputation system for pervasive social chatting , 2013, J. Comput. Syst. Sci..

[4]  Zheng Yan,et al.  Autonomic Trust Management for a Component-Based Software System , 2011, IEEE Transactions on Dependable and Secure Computing.

[5]  Lise Getoor,et al.  Trusting spam reporters: A reporter-based reputation system for email filtering , 2008, TOIS.

[6]  Raimo Kantola,et al.  Analysis on the acceptance of Global Trust Management for unwanted traffic control based on game theory , 2014, Comput. Secur..

[7]  Xianchao Zhang,et al.  Automatic seed set expansion for trust propagation based anti-spamming algorithms , 2009, WIDM.

[8]  Tie-Yan Liu,et al.  BrowseRank: letting web users vote for page importance , 2008, SIGIR '08.

[9]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[10]  Raimo Kantola,et al.  Unwanted Traffic Control via Hybrid Trust Management , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[11]  Viswanath Venkatesh,et al.  Technology Acceptance Model 3 and a Research Agenda on Interventions , 2008, Decis. Sci..

[12]  Jianping Wu,et al.  A Trust and Reputation based Anti-SPIM Method , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[13]  Raimo Kantola,et al.  Unwanted Content Control via Trust Management in Pervasive Social Networking , 2013, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications.

[14]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[15]  Fred D. Davis Perceived Usefulness, Perceived Ease of Use, and User Acceptance of Information Technology , 1989, MIS Q..

[16]  Brian D. Davison,et al.  Topical TrustRank: using topicality to combat web spam , 2006, WWW '06.

[17]  Raimo Kantola,et al.  A generic solution for unwanted traffic control through trust management , 2014, New Rev. Hypermedia Multim..

[18]  Jimmy McGibney,et al.  A Trust Overlay Architecture and Protocol for Enhanced Protection against Spam , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[19]  Gustavo Alonso,et al.  Enabling social networking in ad hoc networks of mobile phones , 2009, Proc. VLDB Endow..

[20]  Yuchun Tang,et al.  Support Vector Machines and Random Forests Modeling for Spam Senders Behavior Analysis , 2008, IEEE GLOBECOM 2008 - 2008 IEEE Global Telecommunications Conference.

[21]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[22]  Roberto A. Rocha,et al.  Evaluation of a flowchart-based EHR query system: A case study of RetroGuide , 2010, J. Biomed. Informatics.

[23]  Haiyun Luo,et al.  Security in mobile ad hoc networks: challenges and solutions , 2004, IEEE Wireless Communications.

[24]  Sudhir Aggarwal,et al.  Incorporating accountability into internet email , 2009, SAC '09.

[25]  Xu Jingdong,et al.  MailTrust: A Mail Reputation Mechanism Based on Improved TrustGuard , 2010, 2010 International Conference on Communications and Mobile Computing.

[26]  Jörg Ott,et al.  Author's Personal Copy Pervasive and Mobile Computing Floating Content for Probabilistic Information Sharing , 2022 .

[27]  Ram Dantu,et al.  Socio-technical defense against voice spamming , 2007, TAAS.

[28]  Wu Liu,et al.  IPGroupRep: A Novel Reputation Based System for Anti-Spam , 2009, 2009 Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing.

[29]  Raimo Kantola,et al.  Unwanted Traffic Control via Global Trust Management , 2011, 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications.

[30]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[31]  Yue Shen,et al.  PerContRep: a practical reputation system for pervasive content services , 2014, The Journal of Supercomputing.

[32]  Liang Chen,et al.  TruSMS: A trustworthy SMS spam control system based on trust management , 2015, Future Gener. Comput. Syst..

[33]  Haiyun Luo,et al.  URSA: ubiquitous and robust access control for mobile ad hoc networks , 2004, IEEE/ACM Transactions on Networking.