An evaluation of user importance when integrating social networks and mobile cloud computing

Recently, motivated by incorporating the advantages of social networks (SNs) and mobile cloud computing (MCC), the integration of SNs and MCC receives a lot of attention from both academia and industry, since the SNs could be utilized to share the rich cloud resources and services as well as the cloud can be taken to host or enhance SNs. However, one very critical and unexplored issue when integrating SNs and MCC is evaluating the importance of users to obtain the potential influential users. In this paper, focusing on exploring the user importance evaluation issue during the integration of SNs and MCC, we propose a RFTRS scheme, which innovatively considers the Reputation, Fractal, and Topological importance in SNs as well as the Request and Storage importance in MCC to evaluate user importance. The detailed design about RFTRS is presented. A further case study is also conducted to compare the user evaluation results identified by RFTRS and other popular traditional user importance evaluation approaches in SNs. They show that new user evaluation approaches (e.g., RFTRS) when integrating SNs and MCC are needed.

[1]  Hsinchun Chen,et al.  Fighting organized crimes: using shortest-path algorithms to identify associations in criminal networks , 2004, Decis. Support Syst..

[2]  Jie Wu,et al.  Outsourcing privacy-preserving social networks to a cloud , 2013, 2013 Proceedings IEEE INFOCOM.

[3]  Myungsik Yoo,et al.  A new framework for secure sharing data on cloud-based social networks , 2012, 2012 International Conference on ICT Convergence (ICTC).

[4]  Carson Kai-Sang Leung,et al.  Finding Strong Groups of Friends among Friends in Social Networks , 2011, 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing.

[5]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[6]  Ji Yang,et al.  Towards Cloud and Terminal Collaborative Mobile Social Network Service , 2010, 2010 IEEE Second International Conference on Social Computing.

[7]  Jianlin Li,et al.  Agriculture Emergency Decision System Based on Semantic Web Services , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[8]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[9]  Christopher C. Yang,et al.  Analysis of terrorist social networks with fractal views , 2009, J. Inf. Sci..

[10]  Martin F. Arlitt,et al.  Facebook Meets the Virtualized Enterprise , 2008, 2008 12th International IEEE Enterprise Distributed Object Computing Conference.

[11]  Victor C. M. Leung,et al.  A Review of Key Issues That Concern the Feasibility of Mobile Cloud Computing , 2013, 2013 IEEE International Conference on Green Computing and Communications and IEEE Internet of Things and IEEE Cyber, Physical and Social Computing.

[12]  Jun Li,et al.  Recommendation on social network based on graph model , 2012, Proceedings of the 31st Chinese Control Conference.

[13]  L. Freeman Centrality in social networks conceptual clarification , 1978 .

[14]  Kyle Chard,et al.  Social Cloud: Cloud Computing in Social Networks , 2010, 2010 IEEE 3rd International Conference on Cloud Computing.

[15]  He Nan,et al.  Evaluate Nodes Importance in the Network Using Data Field Theory , 2007, 2007 International Conference on Convergence Information Technology (ICCIT 2007).

[16]  Ramon Sangüesa,et al.  Extracting reputation in multi agent systems by means of social network topology , 2002, AAMAS '02.

[17]  Katarzyna Musial,et al.  User position measures in social networks , 2009, SNA-KDD '09.

[18]  Kyle Chard,et al.  Social Cloud Computing: A Vision for Socially Motivated Resource Sharing , 2012, IEEE Transactions on Services Computing.

[19]  Chen-Shu Wang,et al.  Constructing a Cloud Computing Based Social Networks Data Warehousing and Analyzing System , 2011, 2011 International Conference on Advances in Social Networks Analysis and Mining.

[20]  Hideki Koike Hirot Fractal Approaches for Visualizing Huge Hierarchies , 1993 .

[21]  Hideki Koike,et al.  Fractal views: a fractal-based method for controlling information display , 1995, TOIS.

[22]  Fei Hao,et al.  TFRank: An Evaluation of Users Importance with Fractal Views in Social Networks , 2011 .

[23]  Said Elnaffar,et al.  Social Networks: Challenges and New Opportunities , 2010, 2010 IEEE/ACM Int'l Conference on Green Computing and Communications & Int'l Conference on Cyber, Physical and Social Computing.

[24]  Raouf Boutaba,et al.  Cloud computing: state-of-the-art and research challenges , 2010, Journal of Internet Services and Applications.