Top Banner
1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis [email protected] http://www.cs.ucdavis.edu/ ~wu/
115
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

1

Davis Social Links

S. Felix WuComputer Science DepartmentUniversity of California, Davis

[email protected]://www.cs.ucdavis.edu/~wu/

Page 2: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

2

Internet Architecture & Routing

Applications with Tests

Page 3: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

3

Internet Architecture & Routing

• Any identity (email address, IP, url) can communicate with any one else.– Email, web, bittorrent, warcraft, skype…

Page 4: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

4

Social-Control Routing

Applications with Tests

12

3

Page 5: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

5

Page 6: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

6

Page 7: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

7

The value of the “Network”

• A concern about a network losing its “value”– while we are unsure about how to quantify the true value…

Page 8: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

8

Open Issues

• What is the “value” of this social network?

• How would this “value” be distributed and allocated to each individual peers?

• MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation.– But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

Page 9: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

9

Social Network Games

Page 10: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

10

Fighter’s Club

• A Coalition game ~ like Warcraft• Team members who are Facebook friends receive higher fighting powers

• ~1400 new friendships established daily

• ~10% of users with >95% friendships purely based on this game.

Page 11: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

11

Facebook versus Personal Web Site

• WWW: everybody can see it• Facebook: a selected set of people on your social network can see it

Page 12: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

12

Page 13: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

13

Page 14: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

14

Page 15: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

15

Page 16: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

16

Activities, Knowledge Sharing, and Social Relationship

Scalability, Privacy, Trust, Robustness,Performance…

Page 17: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

17

Social Network Applications

• Social-based collaborative filtering

• Recommendation• Privacy-control• Advertising

Page 18: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

18

Urgent! Please contact me!

FROM:MR.CHEUNG PUIHang Seng Bank LtdSai Wan Ho Branch171 Shaukiwan RoadHong Kong.

Please contact me on my personal box [[email protected]]

Let me start by introducing myself. I am Mr. Cheung Pui, director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you.

Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendarmonths, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

Page 19: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

19

http://www.ebolamonkeyman.com/cheung.htm

Page 20: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

20

Pick your favor Spam Filter(s)

Page 21: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

21

This was considered a spam!

Page 22: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

22

This was considered a spam!

Sometimes, the cost of False Positive may be very high…

Page 23: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

23

The Implication of FP’s

• Spam-filters have to be conservative…

• We will have some false negatives in our own inboxes.

• We will use our own time to further filter..– For me, 1~2 seconds per email

Page 24: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

24

The emails I received just THIS morning…

Page 25: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

25

You have about 1 second to decide……

Page 26: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

26

Page 27: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

27

Page 28: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

28

Page 29: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

29

“ Social Spams”

• They might not be spams as we often overlooked the social values of them!

Page 30: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

30

Motivations

• The value of social communication– To leverage– To protect

Page 31: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

31

Communicate: [A, D]

A

B

C

D

As long as “A” knows “D’s routable identity”

Page 32: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

32

Hijackable Routable Identify

Page 33: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

33

[A,D] + social context

A

B

C

D

“A” has to explicitly declare if there is any social context under this communication activity with “D”!

Page 34: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

34

Internet & Routable Identity

• URL, IP address, email,….– For ANYWHERE in the Internet

• Without Routable Identity– Only available to certain parts of Social Networks

• Using OSN to perform access control

Page 35: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

35

Page 36: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

36

Who is Salma?

Page 37: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

37

Who is Salma?

Page 38: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

38

Who is Salma?

Page 39: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

39

My message to Salma

Page 40: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

40

The Social Path(s)

Page 41: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

41

“ Optimality”

• Not necessarily “the shortest path”– Social context consideration

Page 42: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

42

More Examples

Page 43: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

43

CyrusDSL

• How do we accomplish these features?

• How do we realize the concepts scaleable?

• How will this system work against spams?

Page 44: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

44

Just a couple issues …

• How to establish the social route?– How would “A” know about “D” (or “D’s identity”) ?

• How to maintain this “reputation network”?– MessageReaper: A Feed-back Trust Control System (Spear/Lang/Lu)

Page 45: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

45

[A,D] + social context

A

B

C

D

“A” has to explicitly declare if there is any social context under this communication activity with “D”! But, “D” only cares if it is from “C” or not!

??

Page 46: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

46

Search on “OSN”

• How to get to from ?

• The Small world model– 6 degree separation (Milgram, 1967)– “existence of a short path”– How to find the short path? (Kleinberg, 2000)

Page 47: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

47

Re-wiring (Watts/Strogatz)

Trade off between D and Ccluster !

Structured/Clustered

62

35

Page 48: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

48

Routing in a Small World

• Common question: do short paths exist?

• Algorithmic question: assuming short paths exist. How do people find them?

Page 49: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

49

Kleinberg’s results

A decentralized routing problem– For nodes s,t with known lattice coordinates, find a short path from s to t.

– At any step, can only use local information,

– Kleinberg suggests a simple greedy algorithm and analyzes it:

Page 50: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

50

Kleinberg’s Model

• Use only Local information, except the distance to the target.– However, what is the “global distance” in cyber space? Yet, the assumption behind is that the “edges” depend on the “relative distance”.

Page 51: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

51

• How will we tell whether the relative distance between X&Y is closer than X&Z?– X, Y, Z (assuming they are all direct friends to each other)

• One simple idea: “Keyword intersection”– KW(X), KW(Y), KW(Z)– 1/(#[KW(a) KW(b)] + 1)

– Will this work? How about global distance?

X, Y, and Z

Page 52: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

52

Similarity

Page 53: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

53

Similarity

Page 54: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

54

Social Route Discovery for A2D

A

B

C

D

Let’s assume A doesn’t have D’s “routable identity”Or, “D” doesn’t have a global unique identity!Then, how can we do A2D?

??

Page 55: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

55

Finding

A

B

C

D

A2D, while D is McDonald’s!D would like “customers” to find the right route.“idea: keyword propagation” e.g., “McDonald’s”

??

Page 56: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

56

Announcing

A

B

C

D

Hop-by-hop keyword propagation

K: “McDonald’s”

Page 57: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

57

Announcing

A

B

C

D

Hop-by-hop keyword propagation

K: “McDonald’s”

K: “McDonald’s”

Page 58: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

58

Announcing

A

B

C

D

Hop-by-hop keyword propagation

K: “McDonald’s”

K: “McDonald’s”

K: “McDonald’s”

Page 59: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

59

Announcing

A

B

C

D

Hop-by-hop keyword propagation

And, I know I am doing FLOODING!!

K: “McDonald’s”

K: “McDonald’s”

K: “McDonald’s”

Page 60: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

60

Now Finding

A

B

C

D

Search Keyword: “McDonald’s”A might know D’s keyword via two channels(1) Somebody else (2) From its friendsQuestions: does D need an identity? Scalable?

K: “McDonald’s”

K: “McDonald’s”

K: “McDonald’s”

Q: McDonald’s

Page 61: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

61

Page 62: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

62

Application Tests

• Example 1: credential-oriented– “PKI certificate” as the keyword– If you can sign or decrypt the message, you are the ONE!

• Example 2: service-oriented– Service/protocol/bandwidth support

• Example 3: offer-oriented– Please send me your coupons/promotions!

Page 63: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

63

“ Routable Identity”

• Application identity =M=> Network identity

• Network identity =R=> Network identity

• Network identity =M=> Application identity

Page 64: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

64

“ App/Route Identity”

• Application identity =M=> Network identity

• Network identity =R=> Network identity• Network identity =M=> Application identity

• Keywords =(MF-R)=> “Multiple Paths”• Application identity selection• Network route selection

Page 65: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

65

Finding

Search Keyword: “McDonald’s”Questions: is this the right Felix Wu’s?How to avoid/control flooding??

A

B

C

D

K: “McDonald’s”

K: “McDonald’s”

K: “McDonald’s”

Q: McDonald’s

Application Test

Page 66: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

66

Scalability - Avoid the Flooding

• As it is, every keyword will need to be propagated to all the nodes/links (but the same keyword will be propagated through the same link once possibly with different policies).

• The issue: “who should receive my keywords?”

Page 67: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

67

in Community of Davis

A

B

C

D

Who should receive the keyword announcement for “McDonald’s”?

??

Page 68: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

68

as the Social Peer

• Attributes:– {McDonald’s Express, 640 W Covell Blvd, # D, Davis, (530) 756-8886, Davis Senior High School, Community Park, North Davis}

Page 69: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

69

“ Per-Keyword Policy”

• For each keyword, we will associate it with a propagation policy: [T, N, A]– T: Trust Value Threshold– N: Hop counts left to propagate (-1 each step)

– A: Community Attributes

• Examples:– [>0.66, 4, “Davis”] K via L1

– [>=0, , ] K via L2

Page 70: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

70

Scalability & Controllability

• McDonald’s doesn’t want to flood the whole network– It only wants to multicast to the “Target set” of customers

• And, it only wants this target set of users being able to use that particular keyword to contact.– Receiver/owner controllability

Page 71: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

71

Social/Community Attributes

A

B

C

D

Who should receive the keyword announcement for “McDonald’s”? Answer:

??

Page 72: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

72

Community

A

B

C

D

??

Page 73: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

73

Community

• A connected graph of social nodes sharing a set of community attributes

Page 74: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

74

Community

A

B

C

D

??

Page 75: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

75

Social/Community Attributes

A

B

C

D

Who should receive the keyword announcement for “McDonald’s”? Answer: but not ALL

??

Page 76: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

76

Community

A

B

C

D

??

Page 77: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

77

Network Formation

A

B

C

D

??

Page 78: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

78

Network Formation

A

B

C

D

??

Both A & C: why would A & C be willing to establish a direct friendship?

Page 79: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

79

Open Issues

• What is the “value” of this social network?

• How would this “value” be distributed and allocated to each individual peers?

Page 80: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

80

Fighter’s Club

• A Coalition game ~ like Warcraft• Team members who are Facebook friends receive higher fighting powers

• ~1400 new friendships established daily

• ~10% of users with >95% friendships purely based on this game.

Page 81: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

81

[email protected] +

A

B

C

D

Who should receive the keyword announcement for “[email protected]”? Answer:

??

K: “wu@…” + Policy

Page 82: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

82

Even if “A” claims

A

B

C

D

Who should receive the keyword announcement for “[email protected]”? Answer:

??

K: “wu@…”

Page 83: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

83

“ B” can help…

A

B

C

D

What is B’s incentive? What is B’s risk?

??

K: “wu@…”

Page 84: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

84

Message Value & Prioritization

Application IDS

Link RanksReputationIncentives

Other Trust Metrics

[good, bad] messages

Page 85: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

85

Reputation

• Adding “Trust” as another consideration in routing

• Per-packet Reputation Update• Fast Stabilization• Mobility without per-hop authenticated Global/Unique Network layer Identities

Page 86: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

86

Reputation on Feed-back

A

B

C

D

“D” is the one to decide whether the message from A/B/C is good or bad!

??

Page 87: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

87

One Route path from A to D

Pkt[a>d]

End2End Trust: “is this really from A?”

RoutePath Trust: “Should this path be used?”

A B C D

Page 88: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

88

Basic Assumption about the Link

Pkt[a>d]

B & C have a way to decide whether they should establish a link between them, and they can authenticate each other:

Secure MAC authenticationSocial Links in OSNReputation-based AuthenticationSybil Attack robustness

A B C D

Page 89: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

89

The Attack Model• Does the receiver really like this packet being delivered to me over a route path of links:– Corrupted information– Spam– An incorrectly E2E-Authenticated packet– Malware

• Assumption: the receiver has its own security policy to determine whether it like the packet/message or not!

Page 90: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

90

D decides, and rewards/punishes…

A B C DPkt[c>d]

Trust(D>C)Pkt[bcd]

Trust(C>B)Pkt[abc]

Trust(B>A)Pkt[ab]

Page 91: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

91

Trust Structure

We want to stabilize these decentralized values such that they can be used to effectively choose the “best” route.

Page 92: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

92

Game Theory Analysis

A B C DPkt[c>d]

Trust(D>C)Pkt[bcd]

Trust(C>B)Pkt[abc]

Trust(B>A)Pkt[ab]

Value Allocation: if a bad message is delivered, how should we distribute the “damage” along the route path?

Page 93: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

93

Trust Structure as the Utility

We want to stabilize these decentralized values such that they can be used to effectively choose the “best” route.

Page 94: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

94

Three Trust Values per Relationship

• Ta(u,v): u is directly connected to v. How much u trusts v?

• Ainit: v, as the initiator, sends a packet to u.

• Afwd: v forwards a packet to u . I.e., v is not the initiator of the packet.

• Art: sends a packet to, and, v forwards that packet to one of its other neighbors. And, the packet eventually reaches the destination.

u v

Page 95: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

95

Example

Page 96: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

96

Page 97: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

97

Routing with Trust

Page 98: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

98

Page 99: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

99

1000 nodes, 20% bad

Page 100: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

100

1000 nodes, 10%/40% bad

Page 101: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

101

Increasing the Spammers

Page 102: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

102

Orkut (15329 nodes)

Page 103: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

103

Open Issues

• What is the “value” of this social network?

• How would this “value” be distributed and allocated to each individual peers?

• MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation.– But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

Page 104: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

104

Social Network Development

• Social Graph• User-defined keywords and attributes

• DSL server • Trust Routing Protocol

DSL

Facebook

Page 105: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

105

DSL is an old idea!

We, as human, have been using similar communication principles. Maybe it is a good opportunity to re-think about our cyber communication system.

Identity is a per-application, context-oriented, and sometime relative issue.

Forming cyber communities of interests for application.

A B

A BF

FF

Page 106: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

106

DSL, Facebook, AL-BGP and GENI

Facebook

AL-BGP over GENI/PlanetLab

http://www.geni.net/DSLport

Each DSL/FB user should select a “closer” GENI entrance as www.geni.net. In other words, we might need to set up DNS records correctly.

Page 107: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

107

DSL Architecture

AL-BGP

DSL

Applications with Tests

Page 108: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

108

Link

Applications with Tests

12 3

4

Page 109: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

109

AS-oriented Social Mapping

Applications with Tests

Page 110: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

110

Control versus Data Path

Applications with Tests

data path

control path

12

Page 111: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

111

Social-Control Routing

Applications with Tests

12

3

Page 112: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

112

Easy to Send & Receive

•Easy for both the good users and the spammers. (fair simplicity)

•The spammers abuse the “sending” right, while the good users have very limited options to counter back.–how easy can we change our email address?

–how often do we need to do that?•A “receiver” or “the owner of the identity” should have some control.–But, that means also “burden” to the users.

Page 113: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

113

Easy to Send & Receive

•Easy for both the good users and the spammers. (fair simplicity)

•The spammers abuse the “sending” right, while the good users have very limited options to counter back.–how easy can we change our email address?

–how often do we need to do that?•A “receiver” or “the owner of the identity” should have some control.–But, that means also “burden” to the users.

Page 114: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

114

Davis Social Links

• Peer-to-Peer System (P2P)– How human socially communicate?

• Online Social Network (OSN)– How to utilize OSN to enhance communication?

– How to have a securer OSN?

• Autonomous Community (AC)– How to build/develop more effective community-based social networks?

Page 115: 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis wu@cs.ucdavis.edu wu/

115

AcknowledgementA B

A BF

FF