A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing

  • Shuhong Chen
  • Guojun Wang
  • Weijia Jia
Part of the Lecture Notes in Computer Science book series (LNCS, volume 8300)

Abstract

Behavior patterns of users in mobile social cloud are always based on real world relationships and can be used to infer a level of trust between users. In this paper, we describe the implicit call behavioral graph which is formed by users’ interactions with call. We rate these relationships to form a dynamic local cloud trust, which enables users to evaluate the trust values between users within the context of a mobile social cloud network. We, then, calculate local trust values according to users’ behavioral attributes, such as call frequency, relevance, call moment, and satisfaction. Due to the unique nature of the social cloud, we discuss the propagation and aggregation of local trust values for global social cloud network. Finally, we evaluate the performance of our trust model through simulations, and show simulation results that demonstrate the importance of interaction-based behavioural relationships in recommendation system.

Keywords

Trust relationships Mobile social cloud Call behavioral graph Trust entropy 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Christensen, J.H.: Using RESTful web-services and cloud computing to create next generation mobile applications. In: Proceeding of the 24th ACM SIGPLAN Conference Companion on Object-Oriented Programming Systems Languages and Applications, Orlando, FL, USA, pp. 627–634 (2009)Google Scholar
  2. 2.
    Takabi, H.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)CrossRefGoogle Scholar
  3. 3.
    Heurta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services, vol. (6) (2010)Google Scholar
  4. 4.
    Chard, K., Bubendorfer, K., Caton, S., Rana, O.F.: Social Cloud Computing: A Vision for Socially Motivated Resource Sharing. IEEE Transactions on Services Computing 5(4), 551–563 (2012)CrossRefGoogle Scholar
  5. 5.
    Costa, C., Bijlsma-Frankema, K.: Trust and Control Interrelations. Group and Organization Management 32(4), 392–406 (2007)CrossRefGoogle Scholar
  6. 6.
    Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. In: Proc. of Cloud Computing, pp. 98–104 (2011)Google Scholar
  7. 7.
    Golbeck, J., Hendler, J.: Film Trust: Movie recommendations using Trust in Web-based social network. In: CCNC 2006, pp. 1314–1315. IEEE 3rd Publication (2006)Google Scholar
  8. 8.
    Kim, S., Han, S.: The method of inferring trust in Web-based social network using fuzzy logic. In: Proc. of the International Workshop on Machine Intelligence Research, pp. 140–144 (2009)Google Scholar
  9. 9.
    Kikin-Gil, R.: Affective is effective: how information appliances can mediate relationships within communities and increase oneŠs social effectiveness. Personal and Ubiquitous Computing 10(2-3), 77–83 (2006)CrossRefGoogle Scholar
  10. 10.
    Counts, S.: Group-based mobile messaging in support of the social side of leisure. Computer Supported Cooperative Work 16(1-2), 75–97 (2007)CrossRefGoogle Scholar
  11. 11.
    Pezzi, R.: Information Technology Tools for a Transition Economy (September 2009), http://www.socialcloud.net/papers/ITtools.pdf
  12. 12.
    Grob, R., Kuhn, M., Wattenhofer, R., Wirz, M.: Cluestr: Mobile Social Networking for Enhanced Group Communication. In: Proc. of GROUP 2009, USA, pp. 81–90 (2009)Google Scholar
  13. 13.
    Oulasvirta, A., Raento, M., Tiitta, S.: ContextContacts: redesigning SmartPhone’s contact book to support mobile awareness and collaboration. In: Mobile HCI, pp. 167–174 (2005)Google Scholar
  14. 14.
    Farnham, S., Keyani, P.: Swarm: Hyper awareness, micro coordination, and smart convergence through mobile group text messaging. In: HICSS, vol. 3, pp. 1–10 (2006)Google Scholar
  15. 15.
    Kim, M., Seo, J., Noh, S., Han, S.: Identity management-based social trust model for mediating information sharing and privacy enhancement. Secur. Commun. Netw. 5(8), 887–897 (2012)CrossRefGoogle Scholar
  16. 16.
    Kim, M., Park, S.: Group affinity based social trust model for an intelligent movie recommender system. Multimed. Tools Appl. 64(2), 505–516 (2013)CrossRefGoogle Scholar
  17. 17.
    Balasubramaniyan, V.A., Ahamad, M., Park, H.: CallRank: combating SPIT using call duration, social networks and global reputation. In: Proceedings of Fourth Conference on Email and Anti-Spam, pp. 18–24 (2007)Google Scholar
  18. 18.
    Ankolekar, A., Szabo, G., Luon, Y., Huberman, B.A., Wilkinson, D., Wu, F.: Friendlee: a mobile application for your social life. In: Proceedings of the 11st International Conference on Human-Computer Interaction with Mobile Devices and Services, vol. (27) (2009), doi:10.1145/1613858.1613893Google Scholar
  19. 19.
    Roth, M., Ben-David, A., Deutscher, D., Flysher, G., Horn, I., Leichtberg, A., Leiser, N., Matias, Y., Merom, R.: Suggesting Friends Using the Implicit Social Graph. In: KDD 2010, pp. 233–241 (2010)Google Scholar
  20. 20.
    Lund, M., Solhaug, B.: Evolution in Relation to Risk and Trust Management. Computer, 49–55 (May 2010)Google Scholar
  21. 21.
    Gambetta, D.: Can We Trust Trust? Trust: Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell (1988)Google Scholar
  22. 22.
    Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Survey and Tutorials, 2–16 (2000)Google Scholar
  23. 23.
    Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th International Conference on the World Wide Web, pp. 403–412. ACM Press (2004)Google Scholar
  24. 24.
    Gray, E., Seigneur, J.-M., Chen, Y., Jensen, C.: Trust propagation in small worlds. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 239–254. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  25. 25.
    Walter, F.E., Battiston, S., Schweitzer, F.: A model of a trust-based recommendation system on a social network. Auton Agent Multi-Agent Syst. 16, 57–74 (2008)CrossRefGoogle Scholar

Copyright information

© Springer International Publishing Switzerland 2013

Authors and Affiliations

  • Shuhong Chen
    • 1
  • Guojun Wang
    • 1
  • Weijia Jia
    • 2
  1. 1.School of Information Science and EngineeringCentral South UniversityChangshaChina
  2. 2.Department of Computer ScienceCity University of Hong KongKowloonHong Kong

Personalised recommendations