1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis...

Post on 13-Jan-2016

225 views 5 download

Tags:

Transcript of 1 Davis Social Links S. Felix Wu Computer Science Department University of California, Davis...

1

Davis Social Links

S. Felix WuComputer Science DepartmentUniversity of California, Davis

wu@cs.ucdavis.eduhttp://www.cs.ucdavis.edu/~wu/

2

Internet Architecture & Routing

Applications with Tests

3

Internet Architecture & Routing

• Any identity (email address, IP, url) can communicate with any one else.– Email, web, bittorrent, warcraft, skype…

4

Social-Control Routing

Applications with Tests

12

3

5

6

7

The value of the “Network”

• A concern about a network losing its “value”– while we are unsure about how to quantify the true value…

8

Open Issues

• What is the “value” of this social network?

• How would this “value” be distributed and allocated to each individual peers?

• MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation.– But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

9

Social Network Games

10

Fighter’s Club

• A Coalition game ~ like Warcraft• Team members who are Facebook friends receive higher fighting powers

• ~1400 new friendships established daily

• ~10% of users with >95% friendships purely based on this game.

11

Facebook versus Personal Web Site

• WWW: everybody can see it• Facebook: a selected set of people on your social network can see it

12

13

14

15

16

Activities, Knowledge Sharing, and Social Relationship

Scalability, Privacy, Trust, Robustness,Performance…

17

Social Network Applications

• Social-based collaborative filtering

• Recommendation• Privacy-control• Advertising

18

Urgent! Please contact me!

FROM:MR.CHEUNG PUIHang Seng Bank LtdSai Wan Ho Branch171 Shaukiwan RoadHong Kong.

Please contact me on my personal box [puicheungcheungpui@yahoo.com]

Let me start by introducing myself. I am Mr. Cheung Pui, director of operations of the Hang Seng Bank Ltd,Sai Wan Ho Branch. I have a obscured business suggestion for you.

Before the U.S and Iraqi war our client Major Fadi Basem who was with the Iraqi forces and also business man made a numbered fixed deposit for 18 calendarmonths, with a value of Twenty Four millions Five Hundred Thousand United State Dollars only in my branch. Upon maturity several notice was sent to him,…

19

http://www.ebolamonkeyman.com/cheung.htm

20

Pick your favor Spam Filter(s)

21

This was considered a spam!

22

This was considered a spam!

Sometimes, the cost of False Positive may be very high…

23

The Implication of FP’s

• Spam-filters have to be conservative…

• We will have some false negatives in our own inboxes.

• We will use our own time to further filter..– For me, 1~2 seconds per email

24

The emails I received just THIS morning…

25

You have about 1 second to decide……

26

27

28

29

“ Social Spams”

• They might not be spams as we often overlooked the social values of them!

30

Motivations

• The value of social communication– To leverage– To protect

31

Communicate: [A, D]

A

B

C

D

As long as “A” knows “D’s routable identity”

32

Hijackable Routable Identify

33

[A,D] + social context

A

B

C

D

“A” has to explicitly declare if there is any social context under this communication activity with “D”!

34

Internet & Routable Identity

• URL, IP address, email,….– For ANYWHERE in the Internet

• Without Routable Identity– Only available to certain parts of Social Networks

• Using OSN to perform access control

35

36

Who is Salma?

37

Who is Salma?

38

Who is Salma?

39

My message to Salma

40

The Social Path(s)

41

“ Optimality”

• Not necessarily “the shortest path”– Social context consideration

42

More Examples

43

CyrusDSL

• How do we accomplish these features?

• How do we realize the concepts scaleable?

• How will this system work against spams?

44

Just a couple issues …

• How to establish the social route?– How would “A” know about “D” (or “D’s identity”) ?

• How to maintain this “reputation network”?– MessageReaper: A Feed-back Trust Control System (Spear/Lang/Lu)

45

[A,D] + social context

A

B

C

D

“A” has to explicitly declare if there is any social context under this communication activity with “D”! But, “D” only cares if it is from “C” or not!

??

46

Search on “OSN”

• How to get to from ?

• The Small world model– 6 degree separation (Milgram, 1967)– “existence of a short path”– How to find the short path? (Kleinberg, 2000)

47

Re-wiring (Watts/Strogatz)

Trade off between D and Ccluster !

Structured/Clustered

62

35

48

Routing in a Small World

• Common question: do short paths exist?

• Algorithmic question: assuming short paths exist. How do people find them?

49

Kleinberg’s results

A decentralized routing problem– For nodes s,t with known lattice coordinates, find a short path from s to t.

– At any step, can only use local information,

– Kleinberg suggests a simple greedy algorithm and analyzes it:

50

Kleinberg’s Model

• Use only Local information, except the distance to the target.– However, what is the “global distance” in cyber space? Yet, the assumption behind is that the “edges” depend on the “relative distance”.

51

• How will we tell whether the relative distance between X&Y is closer than X&Z?– X, Y, Z (assuming they are all direct friends to each other)

• One simple idea: “Keyword intersection”– KW(X), KW(Y), KW(Z)– 1/(#[KW(a) KW(b)] + 1)

– Will this work? How about global distance?

X, Y, and Z

52

Similarity

53

Similarity

54

Social Route Discovery for A2D

A

B

C

D

Let’s assume A doesn’t have D’s “routable identity”Or, “D” doesn’t have a global unique identity!Then, how can we do A2D?

??

55

Finding

A

B

C

D

A2D, while D is McDonald’s!D would like “customers” to find the right route.“idea: keyword propagation” e.g., “McDonald’s”

??

56

Announcing

A

B

C

D

Hop-by-hop keyword propagation

K: “McDonald’s”

57

Announcing

A

B

C

D

Hop-by-hop keyword propagation

K: “McDonald’s”

K: “McDonald’s”

58

Announcing

A

B

C

D

Hop-by-hop keyword propagation

K: “McDonald’s”

K: “McDonald’s”

K: “McDonald’s”

59

Announcing

A

B

C

D

Hop-by-hop keyword propagation

And, I know I am doing FLOODING!!

K: “McDonald’s”

K: “McDonald’s”

K: “McDonald’s”

60

Now Finding

A

B

C

D

Search Keyword: “McDonald’s”A might know D’s keyword via two channels(1) Somebody else (2) From its friendsQuestions: does D need an identity? Scalable?

K: “McDonald’s”

K: “McDonald’s”

K: “McDonald’s”

Q: McDonald’s

61

62

Application Tests

• Example 1: credential-oriented– “PKI certificate” as the keyword– If you can sign or decrypt the message, you are the ONE!

• Example 2: service-oriented– Service/protocol/bandwidth support

• Example 3: offer-oriented– Please send me your coupons/promotions!

63

“ Routable Identity”

• Application identity =M=> Network identity

• Network identity =R=> Network identity

• Network identity =M=> Application identity

64

“ App/Route Identity”

• Application identity =M=> Network identity

• Network identity =R=> Network identity• Network identity =M=> Application identity

• Keywords =(MF-R)=> “Multiple Paths”• Application identity selection• Network route selection

65

Finding

Search Keyword: “McDonald’s”Questions: is this the right Felix Wu’s?How to avoid/control flooding??

A

B

C

D

K: “McDonald’s”

K: “McDonald’s”

K: “McDonald’s”

Q: McDonald’s

Application Test

66

Scalability - Avoid the Flooding

• As it is, every keyword will need to be propagated to all the nodes/links (but the same keyword will be propagated through the same link once possibly with different policies).

• The issue: “who should receive my keywords?”

67

in Community of Davis

A

B

C

D

Who should receive the keyword announcement for “McDonald’s”?

??

68

as the Social Peer

• Attributes:– {McDonald’s Express, 640 W Covell Blvd, # D, Davis, (530) 756-8886, Davis Senior High School, Community Park, North Davis}

69

“ Per-Keyword Policy”

• For each keyword, we will associate it with a propagation policy: [T, N, A]– T: Trust Value Threshold– N: Hop counts left to propagate (-1 each step)

– A: Community Attributes

• Examples:– [>0.66, 4, “Davis”] K via L1

– [>=0, , ] K via L2

70

Scalability & Controllability

• McDonald’s doesn’t want to flood the whole network– It only wants to multicast to the “Target set” of customers

• And, it only wants this target set of users being able to use that particular keyword to contact.– Receiver/owner controllability

71

Social/Community Attributes

A

B

C

D

Who should receive the keyword announcement for “McDonald’s”? Answer:

??

72

Community

A

B

C

D

??

73

Community

• A connected graph of social nodes sharing a set of community attributes

74

Community

A

B

C

D

??

75

Social/Community Attributes

A

B

C

D

Who should receive the keyword announcement for “McDonald’s”? Answer: but not ALL

??

76

Community

A

B

C

D

??

77

Network Formation

A

B

C

D

??

78

Network Formation

A

B

C

D

??

Both A & C: why would A & C be willing to establish a direct friendship?

79

Open Issues

• What is the “value” of this social network?

• How would this “value” be distributed and allocated to each individual peers?

80

Fighter’s Club

• A Coalition game ~ like Warcraft• Team members who are Facebook friends receive higher fighting powers

• ~1400 new friendships established daily

• ~10% of users with >95% friendships purely based on this game.

81

wu@cs.ucdavis.edu +

A

B

C

D

Who should receive the keyword announcement for “wu@cs.ucdavis.edu”? Answer:

??

K: “wu@…” + Policy

82

Even if “A” claims

A

B

C

D

Who should receive the keyword announcement for “wu@cs.ucdavis.edu”? Answer:

??

K: “wu@…”

83

“ B” can help…

A

B

C

D

What is B’s incentive? What is B’s risk?

??

K: “wu@…”

84

Message Value & Prioritization

Application IDS

Link RanksReputationIncentives

Other Trust Metrics

[good, bad] messages

85

Reputation

• Adding “Trust” as another consideration in routing

• Per-packet Reputation Update• Fast Stabilization• Mobility without per-hop authenticated Global/Unique Network layer Identities

86

Reputation on Feed-back

A

B

C

D

“D” is the one to decide whether the message from A/B/C is good or bad!

??

87

One Route path from A to D

Pkt[a>d]

End2End Trust: “is this really from A?”

RoutePath Trust: “Should this path be used?”

A B C D

88

Basic Assumption about the Link

Pkt[a>d]

B & C have a way to decide whether they should establish a link between them, and they can authenticate each other:

Secure MAC authenticationSocial Links in OSNReputation-based AuthenticationSybil Attack robustness

A B C D

89

The Attack Model• Does the receiver really like this packet being delivered to me over a route path of links:– Corrupted information– Spam– An incorrectly E2E-Authenticated packet– Malware

• Assumption: the receiver has its own security policy to determine whether it like the packet/message or not!

90

D decides, and rewards/punishes…

A B C DPkt[c>d]

Trust(D>C)Pkt[bcd]

Trust(C>B)Pkt[abc]

Trust(B>A)Pkt[ab]

91

Trust Structure

We want to stabilize these decentralized values such that they can be used to effectively choose the “best” route.

92

Game Theory Analysis

A B C DPkt[c>d]

Trust(D>C)Pkt[bcd]

Trust(C>B)Pkt[abc]

Trust(B>A)Pkt[ab]

Value Allocation: if a bad message is delivered, how should we distribute the “damage” along the route path?

93

Trust Structure as the Utility

We want to stabilize these decentralized values such that they can be used to effectively choose the “best” route.

94

Three Trust Values per Relationship

• Ta(u,v): u is directly connected to v. How much u trusts v?

• Ainit: v, as the initiator, sends a packet to u.

• Afwd: v forwards a packet to u . I.e., v is not the initiator of the packet.

• Art: sends a packet to, and, v forwards that packet to one of its other neighbors. And, the packet eventually reaches the destination.

u v

95

Example

96

97

Routing with Trust

98

99

1000 nodes, 20% bad

100

1000 nodes, 10%/40% bad

101

Increasing the Spammers

102

Orkut (15329 nodes)

103

Open Issues

• What is the “value” of this social network?

• How would this “value” be distributed and allocated to each individual peers?

• MySpace, Facebook, LinkedIn didn’t define the “game” for network formation and value allocation.– But, it is important to design the game such that the OSN will eventually converge to a state to best support the communities.

104

Social Network Development

• Social Graph• User-defined keywords and attributes

• DSL server • Trust Routing Protocol

DSL

Facebook

105

DSL is an old idea!

We, as human, have been using similar communication principles. Maybe it is a good opportunity to re-think about our cyber communication system.

Identity is a per-application, context-oriented, and sometime relative issue.

Forming cyber communities of interests for application.

A B

A BF

FF

106

DSL, Facebook, AL-BGP and GENI

Facebook

AL-BGP over GENI/PlanetLab

http://www.geni.net/DSLport

Each DSL/FB user should select a “closer” GENI entrance as www.geni.net. In other words, we might need to set up DNS records correctly.

107

DSL Architecture

AL-BGP

DSL

Applications with Tests

108

Link

Applications with Tests

12 3

4

109

AS-oriented Social Mapping

Applications with Tests

110

Control versus Data Path

Applications with Tests

data path

control path

12

111

Social-Control Routing

Applications with Tests

12

3

112

Easy to Send & Receive

•Easy for both the good users and the spammers. (fair simplicity)

•The spammers abuse the “sending” right, while the good users have very limited options to counter back.–how easy can we change our email address?

–how often do we need to do that?•A “receiver” or “the owner of the identity” should have some control.–But, that means also “burden” to the users.

113

Easy to Send & Receive

•Easy for both the good users and the spammers. (fair simplicity)

•The spammers abuse the “sending” right, while the good users have very limited options to counter back.–how easy can we change our email address?

–how often do we need to do that?•A “receiver” or “the owner of the identity” should have some control.–But, that means also “burden” to the users.

114

Davis Social Links

• Peer-to-Peer System (P2P)– How human socially communicate?

• Online Social Network (OSN)– How to utilize OSN to enhance communication?

– How to have a securer OSN?

• Autonomous Community (AC)– How to build/develop more effective community-based social networks?

115

AcknowledgementA B

A BF

FF