Davis Social Links - PowerPoint PPT Presentation

1 / 101
About This Presentation
Title:

Davis Social Links

Description:

Let me start by introducing myself. ... MySpace, Facebook, LinkedIn didn't define the 'game' for network formation and value allocation. ... – PowerPoint PPT presentation

Number of Views:26
Avg rating:3.0/5.0
Slides: 102
Provided by: cyrusCs
Category:

less

Transcript and Presenter's Notes

Title: Davis Social Links


1
Davis Social Links
S. Felix Wu Computer Science Department University
of California, Davis wu_at_cs.ucdavis.edu http//ww
w.cs.ucdavis.edu/wu/
2
SMTP
3
Internet
SMTP
Applications with Tests
4
Internet Architecture Routing
SMTP
  • Any identity (email address, IP, url) can
    communicate with any one else.
  • Email, web, bittorrent, warcraft, skype

5
Social-Control Routing
SMTP
Applications with Tests
3
2
1
6
Urgent! Please contact me!
FROMMR.CHEUNG PUI Hang Seng Bank Ltd Sai Wan Ho
Branch 171 Shaukiwan Road Hong Kong. Please
contact me on my personal box puicheungcheungpui_at_
yahoo.com Let me start by introducing myself. I
am Mr. Cheung Pui, director of operations of the
Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a
obscured business suggestion for you. Before the
U.S and Iraqi war our client Major Fadi Basem who
was with the Iraqi forces and also business man
made a numbered fixed deposit for 18
calendar months, with a value of Twenty Four
millions Five Hundred Thousand United State
Dollars only in my branch. Upon maturity several
notice was sent to him,
7
http//www.ebolamonkeyman.com/cheung.htm
8
Pick your favor Spam Filter(s)
9
This was considered a spam!
10
This was considered a spam!
Sometimes, the cost of False Positive may be very
high
11
The Implication of FPs
  • Spam-filters have to be conservative
  • We will have some false negatives in our own
    inboxes.
  • We will use our own time to further filter..
  • For me, 12 seconds per email

12
The emails I received typically
13
You have about 1 second to decide
14
(No Transcript)
15
(No Transcript)
16
(No Transcript)
17
Social Spams
  • They might not be spams as we often overlooked
    the social values of them!

18
SMTP
19
SMTP
20
SMTP
Lerone
Felix
21
(No Transcript)
22
The value of the Network
  • Social Network has its own unique value in
    facilitating human communication
  • A concern about a network losing its value
  • while we are unsure about how to quantify the
    true value

23
Dont worry about the language
24
(No Transcript)
25
(No Transcript)
26
(No Transcript)
27
Real Facebook identifier
28
Social Network Games
29
Fighters Club
  • A Coalition game like Warcraft
  • Team members who are Facebook friends receive
    higher fighting powers
  • 1400 new friendships established daily
  • 10 of users with gt95 friendships purely based
    on this game.

30
Open Issues
  • What is the value of this social network?
  • How would this value be distributed and
    allocated to each individual peers?
  • MySpace, Facebook, LinkedIn didnt define the
    game for network formation and value
    allocation.
  • But, it is important to design the game such that
    the OSN will eventually converge to a state to
    best support the communities.

31
Activities, Knowledge Sharing, and Social
Relationship
Scalability, Privacy, Trust, Robustness, Performan
ce
32
Facebook versus Personal Web Site
  • WWW everybody can see it
  • Facebook a selected set of people on your social
    network can see it
  • But, that differential value

33
SMTP
Lerone
Felix
34
SMTP
Lerone
Felix
Facebook
35
SMTP
Lerone
Felix
Social Context
DSL Kernel
Policy/Reputation-based Route discovery
Facebook
36
SMTP
Lerone
Felix
Social Context
DSL Kernel
Policy/Reputation-based Route discovery
Facebook
37
(No Transcript)
38
Just a couple issues
  • How to establish the social route?
  • How would A know about D (or Ds identity)
    ?
  • How to maintain this reputation network?
  • MessageReaper A Feed-back Trust Control System
    (Spear/Lang/Lu)

39
Who is Salma?
40
Who is Salma?
41
My message to Salma
42
The Social Path(s)
43
More Examples
44
A,D social context
??
B
D
A
C
A has to explicitly declare if there is any
social context under this communication activity
with D! But, D only cares if it is from C
or not!
45
Search on OSN
  • How to get to from ?
  • The Small world model
  • 6 degree separation (Milgram, 1967)
  • existence of a short path
  • How to find the short path? (Kleinberg, 2000)

46
Social Route Discovery for A2D
??
B
D
A
C
Lets assume A doesnt have Ds routable
identity Or, D doesnt have a global unique
identity! Then, how can we do A2D?
47
Finding
??
B
D
A
C
A2D, while D is McDonalds! D would like
customers to find the right route. idea
keyword propagation e.g., McDonalds
48
(No Transcript)
49
Announcing
B
D
K McDonalds
A
C
Hop-by-hop keyword propagation
50
Announcing
B
D
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
51
Announcing
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation
52
Announcing
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Hop-by-hop keyword propagation And, I know I am
doing FLOODING!!
53
Now Finding
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
  • Search Keyword McDonalds
  • A might know Ds keyword via two channels
  • (1) Somebody else (2) From its friends
  • Questions does D need an identity? Scalable?

54
Application Tests
  • Example 1 credential-oriented
  • PKI certificate as the keyword
  • If you can sign or decrypt the message, you are
    the ONE!
  • Example 2 service-oriented
  • Service/protocol/bandwidth support
  • Example 3 offer-oriented
  • Please send me your coupons/promotions!

55
Routable Identity
  • Application identity Mgt Network identity
  • Network identity Rgt Network identity
  • Network identity Mgt Application identity

56
App/Route Identity
  • Application identity Mgt Network identity
  • Network identity Rgt Network identity
  • Network identity Mgt Application identity
  • Keywords (MF-R)gt Multiple Paths
  • Application identity selection
  • Network route selection

57
SMTP
Lerone
Felix
Social Context
DSL Kernel
Policy/Reputation-based Route discovery
Facebook
58
SMTP
Wrapper
Lerone
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Policy/Reputation-based Route discovery
Facebook
59
Finding
Application Test
Q McDonalds
B
D
K McDonalds
K McDonalds
K McDonalds
A
C
Search Keyword McDonalds Questions is this
the right Felix Wus? How to avoid/control
flooding??
60
Scalability - Avoid the Flooding
  • As it is, every keyword will need to be
    propagated to all the nodes/links (but the same
    keyword will be propagated through the same link
    once possibly with different policies).
  • The issue who should receive my keywords?

61
in Community of Davis
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds?
62
as the Social Peer
  • Attributes
  • McDonalds Express, 640 W Covell Blvd, D,
    Davis, (530) 756-8886, Davis Senior High School,
    Community Park, North Davis

63
Per-Keyword Policy
  • For each keyword, we will associate it with a
    propagation policy T, N, A
  • T Trust Value Threshold
  • N Hop counts left to propagate (-1 each step)
  • A Community Attributes
  • Examples
  • gt0.66, 4, Davis K via L1
  • gt0, , K via L2

64
Scalability Controllability
  • McDonalds doesnt want to flood the whole
    network
  • It only wants to multicast to the Target set of
    customers
  • And, it only wants this target set of users being
    able to use that particular keyword to contact.
  • Receiver/owner controllability

65
Social/Community Attributes
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds? Answer
66
Community
??
B
D
A
C
67
Community
  • A connected graph of social nodes sharing a set
    of community attributes

68
Community
??
B
D
A
C
69
Social/Community Attributes
??
B
D
A
C
Who should receive the keyword announcement for
McDonalds? Answer but not ALL
70
Community
??
B
D
A
C
71
Network Formation
??
B
D
A
C
72
Network Formation
??
B
D
A
C
Both A C why would A C be willing to
establish a direct friendship?
73
Open Issues
  • What is the value of this social network?
  • How would this value be distributed and
    allocated to each individual peers?

74
Reputation
  • Adding Trust as another consideration in
    routing
  • Per-packet Reputation Update
  • Fast Stabilization
  • Mobility without per-hop authenticated
    Global/Unique Network layer Identities

75
Reputation on Feed-back
??
B
D
A
C
D is the one to decide whether the message from
A/B/C is good or bad!
76
One Route path from A to D
Pktagtd
A
B
C
D
End2End Trust is this really from
A? RoutePath Trust Should this path be used?
77
Basic Assumption about the Link
Pktagtd
A
B
C
D
B C have a way to decide whether they should
establish a link between them, and they can
authenticate each other Secure MAC
authentication Social Links in
OSN Reputation-based Authentication Sybil
Attack robustness
78
The Attack Model
  • Does the receiver really like this packet being
    delivered to me over a route path of links
  • Corrupted information
  • Spam
  • An incorrectly E2E-Authenticated packet
  • Malware
  • Assumption the receiver has its own security
    policy to determine whether it like the
    packet/message or not!

79
D decides, and rewards/punishes
Pktcgtd
A
B
C
D
Trust(DgtC)
Trust(CgtB)
Trust(BgtA)
Pktbcd
Pktabc
Pktab
80
Trust Structure
We want to stabilize these decentralized values
such that they can be used to effectively choose
the best route.
81
Game Theory Analysis
Pktcgtd
A
B
C
D
Trust(DgtC)
Trust(CgtB)
Trust(BgtA)
Pktbcd
Pktabc
Pktab
Value Allocation if a bad message is delivered,
how should we distribute the damage along the
route path?
82
Trust Structure as the Utility
We want to stabilize these decentralized values
such that they can be used to effectively choose
the best route.
83
Three Trust Values per Relationship
u
v
  • Ta(u,v) u is directly connected to v. How much u
    trusts v?
  • Ainit v, as the initiator, sends a packet to u.
  • Afwd v forwards a packet to u . I.e., v is not
    the initiator of the packet.
  • Art sends a packet to, and, v forwards that
    packet to one of its other neighbors. And, the
    packet eventually reaches the destination.

84
Example
85
(No Transcript)
86
Routing with Trust
87
(No Transcript)
88
1000 nodes, 20 bad
89
1000 nodes, 10/40 bad
90
Increasing the Spammers
91
Orkut (15329 nodes)
92
(No Transcript)
93
(No Transcript)
94
SMTP
Divert
Existing Applications
Native DSL Applications and Games
Wrapper
Lerone
Felix
Social Context
DSL Kernel
Community Oriented Keywords
Name-ID resolution
Policy/Reputation-based Route discovery
Facebook
DSLoFB
95
DSL, Facebook, AL-BGP and GENI
http//www.geni.net/DSLport
AL-BGP over GENI/PlanetLab
Each DSL/FB user should select a closer GENI
entrance as www.geni.net. In other words, we
might need to set up DNS records correctly.
Facebook
96
Social-Control Routing
Applications with Tests
3
2
1
97
DSL is an old idea!
A
B
  • We, as human, have been using similar
    communication principles. Maybe it is a good
    opportunity to re-think about our cyber
    communication system.
  • Identity is a per-application, context-oriented,
    and sometime relative issue.
  • Forming cyber communities of interests for
    application.

F
A
B
F
F
98
Easy to Send Receive
  • Easy for both the good users and the spammers.
    (fair simplicity)
  • The spammers abuse the sending right, while the
    good users have very limited options to counter
    back.
  • how easy can we change our email address?
  • how often do we need to do that?
  • A receiver or the owner of the identity
    should have some control.
  • But, that means also burden to the users.

99
Easy to Send Receive
  • Easy for both the good users and the spammers.
    (fair simplicity)
  • The spammers abuse the sending right, while the
    good users have very limited options to counter
    back.
  • how easy can we change our email address?
  • how often do we need to do that?
  • A receiver or the owner of the identity
    should have some control.
  • But, that means also burden to the users.

100
Davis Social Links
  • Peer-to-Peer System (P2P)
  • How human socially communicate?
  • Online Social Network (OSN)
  • How to utilize OSN to enhance communication?
  • How to have a securer OSN?
  • Autonomous Community (AC)
  • How to build/develop more effective
    community-based social networks?

101
Acknowledgement
A
B
F
A
B
F
F
Write a Comment
User Comments (0)
About PowerShow.com