Advertisement

Peer-to-Peer Networking and Applications

, Volume 9, Issue 6, pp 1177–1194 | Cite as

DiDuSoNet: A P2P architecture for distributed Dunbar-based social networks

  • Barbara GuidiEmail author
  • Tobias Amft
  • Andrea De Salve
  • Kalman Graffi
  • Laura Ricci
Article

Abstract

Online Social Networks (OSNs) are becoming more and more popular on the Web. Distributed Online Social Networks (DOSNs) are OSNs which do not exploit a central server for storing users data and enable users to have more control on their profile content, ensuring a higher level of privacy. In a DOSN there are some technical challenges to face. One of the most important challenges is the data availability problem when a user is offline. In this paper we propose DiDuSoNet, a novel P2P Distributed Online Social Network where users can exercise full access control on their data. Our system exploits trust relationships for providing a set of important social services, such as trustness, information diffusion, and data availability. In this paper we show how our system manages the problem of data availability by proposing a new P2P dynamic trusted storage approach. By following the Dunbar concept, our system stores the data of a user only on a restricted number of friends which have regular contacts with him/her. Differently from other approaches, nodes chosen to keep data replicas are not statically defined but dynamically change according to users churn. In according to our previous work, we use only two online profile replicas at time. By using real Facebook data traces we prove that our approach offers high availability.

Keywords

Distributed Online Social Networks P2P Data availability Dunbar 

References

  1. 1.
    Datta A, Buchegger S, Vu L-H, Strufe T, Rzadca K (2010) Decentralized online social networks. In: Handbook of social network technologies and applications. SpringerGoogle Scholar
  2. 2.
    Adya A, Bolosky WJ, Castro M, Cermak G, Chaiken R, Douceur JR, Howell J, Lorch JR, Theimer M, Wattenhofer RP (2002) Farsite: Federated, available, and reliable storage for an incompletely trusted environment. In: Proceedings of the 5th symposium on operating systems design and implementation (OSDI)Google Scholar
  3. 3.
    Narendula R, Papaioannou TG, Aberer K (2012) A decentralized online social network with efficient user-driven replication. In: International Conference on Social Computing (SocialCom)Google Scholar
  4. 4.
    Schiöberg D, Schneider F, Trédan G, Uhlig S, Feldmann A (2012) Revisiting content availability in distributed online social networks. CoRR. arXiv:http://arxiv.org/abs/1210.1394
  5. 5.
    Tinedo RG, Artigas MS, Lȯpez PG (2012) Analysis of data availability in F2F storage systems: When correlations matter. In: Proceedings of the 12th international conference on peer-to-peer computing (P2P)Google Scholar
  6. 6.
    Dunbar RIM (1998) The social brain hypothesis. Evolutionary Anthropology: Issues, News, and Reviews vol. 6Google Scholar
  7. 7.
    Roberts SGB, Dunbar RIM, Pollet TV, Kuppens T (2009) Exploring variation in active network size: Constraints and ego characteristics. Soc Networks 31Google Scholar
  8. 8.
    Sutcliffe A, Dunbar R, Binder J, Arrow H (2012) Relationships and the social brain: Integrating psychological and evolutionary perspectives. Br J Psychol 103Google Scholar
  9. 9.
    Graffi K, Gross C, Stingl D, Hartung D, Kovacevic A, Steinmetz R (2011) LifeSocial.KOM: A secure and p2p-based solution for online social networks. In: IEEE CCNCGoogle Scholar
  10. 10.
    Tran DN, Chiang F, Li J (2008) Friendstore: Cooperative online backup using trusted nodes. In: Proceedings of the 1st workshop on social network systems (SNS)Google Scholar
  11. 11.
    Cutillo LA, Molva R, Strufe T (2009) Safebook: A privacy preserving online social network leveraging on real-life trust. IEEE Commun Mag 47Google Scholar
  12. 12.
  13. 13.
    Sharma R, Datta A (2011) SuperNova: Super-peers based architecture for decentralized online social networks. CoRR. arXiv:http://arxiv.org/abs/1105.0074
  14. 14.
    Li J, Dabek F (2006) F2F: Reliable storage in open networks. In: Proceedings of the 5th international workshop on peer-to-peer systems (IPTPS)Google Scholar
  15. 15.
    Pamies-Juarez L, Lȯpez PG, Artigas MS (2009) Heterogeneity-aware erasure codes for peer-to-peer storage systems. In: International conference on parallel processing (ICPP)Google Scholar
  16. 16.
    Blond S, Fessant F, Merrer E (2009) Finding good partners in availability-aware P2P networks. In: Proceedings of the 11th international symposium on stabilization, safety, and security of distributed systems (SSS)Google Scholar
  17. 17.
    Mickens JW, Noble BD (2006) Exploiting availability prediction in distributed systems. In: Proceedings of the 3rd symposium on networked systems design and implementation (NSDI)Google Scholar
  18. 18.
    Boutet A, Kermarrec A-M, Le Merrer E, Van Kempen A (2012) On the impact of users availability in OSNs. In: Proceedings of the 5th workshop on social network systems (SNS)Google Scholar
  19. 19.
    Sharma R, Datta A, Dell’Amico M, Michiardi P (2011) An empirical study of availability in friend-to-friend storage systems. In: International conference on peer-to-peer computing (P2P)Google Scholar
  20. 20.
    Li J, Dabek F (2006) F2F: Reliable storage in open networks. In: Proceedings of the 5th international workshop on peer-to-peer systems (IPTPS)Google Scholar
  21. 21.
    Conti M, De Salve A, Guidi B, Ricci L (2014) Epidemic diffusion of social updates in dunbar based dosn. In: 2nd workshop on large scale distributed virtual environments on clouds and P2P (LSDVE 2014)Google Scholar
  22. 22.
    Conti M, De Salve A, Guidi B, Pitto F, Ricci L (2014) Trusted dynamic storage for dunbar-based P2P online social networks. In: On the move to meaningful internet systems: OTM 2014 conferencesGoogle Scholar
  23. 23.
    Balakrishnan H, Kaashoek MF, Karger D, Morris R, Stoica I (2003) Looking up data in P2P systems. Commun ACM 46Google Scholar
  24. 24.
    Benevenuto F, Rodrigues T, Cha M, Almeida VAF (2009) Characterizing user behavior in online social networks. In: Proceedings of the 9th conference on internet measurementGoogle Scholar
  25. 25.
    Mega G, Montresor A, Picco GP (2011) Efficient dissemination in decentralized social networks. In: International conference on peer-to-peer computing (P2P)Google Scholar
  26. 26.
    Arnaboldi V, Guazzini A, Passarella A (2013) Egocentric online social networks: Analysis of key features and prediction of tie strength in Facebook. Comput Commun 36Google Scholar
  27. 27.
    Everett MG, Borgatti SP (2005) Ego network betweenness. Soc Networks 27Google Scholar
  28. 28.
    Sahai A, Waters B (2005) Fuzzy identity-based encryption. In: Advances in Cryptology - EUROCRYPT 2005. SpringerGoogle Scholar
  29. 29.
    Bethencourt J, Sahai A, Waters B (2007) Ciphertext-policy attribute-based encryption. In: Symposium on security and privacy (SP)Google Scholar
  30. 30.
    Rowstron AIT, Druschel P (2001) Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Proceedings of the international conference on distributed systems platformsGoogle Scholar
  31. 31.
    Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: A scalable peer-to-peer lookup service for internet applications. In: Proceedings of the international conference on applications, technologies, architectures, and protocols for computer communicationsGoogle Scholar
  32. 32.
    Bhagwan R, Savage S, Voelker G (2003) Understanding availability. In: Proceedings of IPTPS’03Google Scholar
  33. 33.
    La Gala M, Arnaboldi V, Conti M, Passarella A (2012) Ego-Net digger: A new way to study ego networks in online social networks. In: Proceedings of the 1st ACM international workshop on hot topics on interdisciplinary social networks researchGoogle Scholar
  34. 34.
    Golder S, Wilkinson D, Huberman B (2007) Rhythms of social interaction: Messaging within a massive online network. In: Communities and technologies 2007, pp 41–66Google Scholar
  35. 35.
    Graffi K (2011) PeerfactSim.KOM: A P2P system simulator experiences and lessons learned. In: Proceedings of the international conference on peer-to-peer computing (P2P)Google Scholar
  36. 36.
    Feldotto M, Graffi K (2013) Comparative evaluation of peer-to-peer systems using PeerfactSim.KOM. In: International conference on high performance computing and simulation (HPCS)Google Scholar
  37. 37.
    Ng TSE, Zhang H (2002) Predicting internet network distance with coordinates-based approaches. In: Proceedings of the international conference on the joint conference of the ieee computer and communications societiesGoogle Scholar
  38. 38.
    Matthews W, Cottrell L (2000) The PingER Project: Active internet performance monitoring for the HENP community. IEEE Commun Mag 38Google Scholar

Copyright information

© Springer Science+Business Media New York 2015

Authors and Affiliations

  • Barbara Guidi
    • 1
    • 2
    Email author
  • Tobias Amft
    • 3
  • Andrea De Salve
    • 1
    • 2
  • Kalman Graffi
    • 3
  • Laura Ricci
    • 1
  1. 1.Department of Computer ScienceUniversity of PisaPisaItaly
  2. 2.IIT-CNRPisaItaly
  3. 3.Technology of Social Networks Group Department of Computer ScienceUniversity of DüsseldorfDüsseldorfGermany

Personalised recommendations