A Formal Analytic Approach to Credible Potential Path and Mining Algorithms for Multimedia Social Networks

Multimedia social networks (MSNs) services and tools provide a convenient platform for users to share multimedia contents, such as electronic book, digital image, audio and video, with each other. However, in an open network, uncontrolled sharing and transmission mode of digital content betweenuserscreateconsiderableproblemsregardingdigitalrightsmanagement(DRM).Thispaper aims to explore potential paths on the propagation of copyrighted contents. An approach to mining credible potential paths is proposed for MSNs. The formal descriptions were primarily based on rough set theory for mining potential paths.Trust was also measured to find credible potential paths. We presented related algorithms for mining two kinds of paths between any two nodes. Finally, we conducted an experiment based on three non-overlapped sharing communities multiplied by 150 nodes. In the communities found by using a representative real-world MSN YouTube dataset, we further mine the general and credible potential paths based on the simulated trust assessment values. The proposed method could effectively and accurately mine two kinds of potential paths of copyrighted digital content distribution and sharing, which can help to resolve critical DRM issues.

[1]  Mohan S. Kankanhalli,et al.  An efficient access control method for multimedia social networks , 2010, WSM@MM.

[2]  Mark S. Granovetter The Strength of Weak Ties , 1973, American Journal of Sociology.

[3]  Hua Wang,et al.  Trust-Involved Access Control in Collaborative Open Social Networks , 2010, 2010 Fourth International Conference on Network and System Security.

[4]  Jure Leskovec,et al.  Defining and Evaluating Network Communities Based on Ground-Truth , 2012, ICDM.

[5]  Yuan Cheng,et al.  A User-Activity-Centric Framework for Access Control in Online Social Networks , 2011, IEEE Internet Computing.

[6]  M E J Newman,et al.  Community structure in social and biological networks , 2001, Proceedings of the National Academy of Sciences of the United States of America.

[7]  Panagiotis Papadimitratos,et al.  Privacy-Preserving Relationship Path Discovery in Social Networks , 2009, CANS.

[8]  Elena Ferrari,et al.  Combining access control and trust negotiations in an On-line Social Network , 2010, 6th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom 2010).

[9]  Barbara Carminati,et al.  P3D - Privacy-Preserving Path Discovery in Decentralized Online Social Networks , 2011, 2011 IEEE 35th Annual Computer Software and Applications Conference.

[10]  Barbara Carminati,et al.  A probability-based approach to modeling the risk of unauthorized propagation of information in on-line social networks , 2011, CODASPY '11.

[11]  Przemyslaw Kazienko,et al.  Shortest Path Discovery in the Multi-layered Social Network , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[12]  Mudhakar Srivatsa,et al.  Modeling data flow in socio-information networks: a risk estimation approach , 2011, SACMAT '11.

[13]  MyoungBeom Chung,et al.  Intelligent copyright protection system using a matching video retrieval algorithm , 2011, Multimedia Tools and Applications.

[14]  Xi Chen,et al.  Content distribution and copyright authentication based on combined indexing and watermarking , 2010, Multimedia Tools and Applications.

[15]  Lili Zhang,et al.  A Novel DRM Security Scheme and its Prototype System Implementation , 2011 .

[16]  Richard Chbeir,et al.  Discovering relationship types between users using profiles and shared photos in a social network , 2013, Multimedia Tools and Applications.

[17]  Kanliang Wang,et al.  A trust model for multimedia social networks , 2012, Social Network Analysis and Mining.

[18]  Zhiyong Zhang,et al.  Digital Rights Management Ecosystem and its Usage Controls: A Survey , 2011 .

[19]  Zhiyong Zhang Security, trust and risk in Digital Rights Management ecosystem , 2010, 2010 International Conference on High Performance Computing & Simulation.