网络与信息安全学报 ›› 2016, Vol. 2 ›› Issue (2): 30-40.doi: 10.11959/j.issn.2096-109x.2016.00024
闫峥,吴宸梓,冯伟,王子龙
修回日期:
2016-02-08
出版日期:
2016-02-15
发布日期:
2020-03-26
作者简介:
闫峥(1972-),女,陕西西安人,西安电子科技大学教授、博士生导师,主要研究方向为网络与信息安全、信任管理和可信计算、隐私保护。|吴宸梓(1990-),男,陕西西安人,西安电子科技大学硕士生,主要研究方向为社交网络安全。|冯伟(1992-),男,河北沧州人,西安电子科技大学博士生,主要研究方向为信息安全、隐私保护、信任管理。|王子龙(1982-),男,河南新郑人,西安电子科技大学副教授,主要研究方向为信息论与密码学。
Zheng YAN,Chen-zi WU,Wei FENG,Zi-long WANG
Revised:
2016-02-08
Online:
2016-02-15
Published:
2020-03-26
摘要:
信任对于陌生人在普适社交网中的交互活动起到了重要作用。它帮助人们克服不确定性、规避风险并做出正确的社交决策。首先,多方面综述了可信普适社交网络信任管理的研究现状,并对现有工作的优势与不足进行了分析;其次,分析揭示了其关键科学问题和研究方向;最后,提出了全面实现可信普适社交网络的研究模型。
中图分类号:
闫峥,吴宸梓,冯伟,王子龙. 可信普适社交网络研究综述和展望[J]. 网络与信息安全学报, 2016, 2(2): 30-40.
Zheng YAN,Chen-zi WU,Wei FENG,Zi-long WANG. Survey of trustworthy pervasive social networking[J]. Chinese Journal of Network and Information Security, 2016, 2(2): 30-40.
[1] | YAN Z . Trust management in mobile environments-usable and autonomic models[J]. Register, 2013(1):2. |
[2] | GUO Z , YAN Z , WANG F . A methodology to predicate hu-man-being's movement based on movement group[C]//2010 IEEE/ACM International Conference on Green Computing and Communications (GreenCom) and International Conference on Cyber,Physical and Social Computing (CPSCom). c2010:612-619. |
[3] | Familiar stranger[EB/OL]. . |
[4] | Junction,stanford mobisocial group[EB/OL]. . |
[5] | Microblog[EB/OL]. . |
[6] | SARIGOL E , RIVA O , STUEDI P , et al. Enabling social network-ing in ad hoc networks of mobile phones[J]. Proceedings of the VLDB Endowment, 2009,2(2):1634-1637. |
[7] | HYYTIA E , VIRTAMO J , LASSILA P , et al. When does content float? characterizing availability of anchored information in oppor-tunistic content sharing[C]//IEEE International Conference on Computer Communications. c2011:3137-3145. |
[8] | Ezsetup[EB/OL]. . |
[9] | AHTIAINEN A , ARVI K K , KASSLIN M , et al. Awareness net-working in wireless environments[J]. Vehicular Technology Maga-zine, 2009,4(3):48-54. |
[10] | GONG J , TANG J , FONG A C M . ACTPred:activity prediction in mobile social networks[J]. Tsinghua Science and Technology, 2014,19(3):265-274. |
[11] | YU Z , ZHOU X . Socially aware computing:concepts,technologies,and practices[M]//Mobile Social Networking. New York:Springer, 2014:9-23. |
[12] | 程瑶, 应凌云, 焦四辈 , 等. 移动社交应用的用户隐私泄露问题研究[J]. 计算机学报, 2014,37(1):87-100. |
CHENG Y , YING L Y , JIAO S B , et al. Research on user privacy leakage in mobile social messaging applications[J]. Chinese Journal of Computers, 2014,37(1):87-100. | |
[13] | 吕志泉, 洪澄, 张敏 , 等. 面向社交网络的隐私保护方案[J]. 通信学报, 2014,35(8):23-32. |
LV Z Q , HONG C , ZHANG M , et al. Privacy-perserving scheme for social networks[J]. Journal on Communications, 2014,35(8):23-32. | |
[14] | 霍峥, 孟小峰, 黄毅 . PrivateCheckIn:一种移动社交网络中的轨迹隐私保护方法[J]. 计算机学报, 2013,36(4):716-726. |
HUO Z , MENG X F , HUANG Y . PrivateCheckIn:trajectory pri-vacy-preserving for check-in services in MSNS[J]. Chinese Journal of Computers, 2013,36(4):716-726. | |
[15] | YAN Z . Trust modeling and management in digital environments:from social concept to system development:from social concept to system development[M]. IGI Global, 2010. |
[16] | SUN Y L , YU W , HAN Z , et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks[J]. Journal on Selected Areas in Communications, 2006,24(2):305-317. |
[17] | THEODORAKOPOULOS G , BARAS J S . On trust models and trust evaluation metrics for ad hoc networks[J]. Journal on Selected Areas in Communications, 2006,24(2):318-328. |
[18] | YAN Z , HOLTMANNS S . Trust modeling and management:from social trust to digital trust[J]. Examining the Concepts Issues & Im-plications of Internet Trolling, 2008:290-323. |
[19] | SONG S , HWANG K , ZHOU R , et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. Internet Computing, 2005,9(6):24-34. |
[20] | RESNICK P , ZECKHAUSER R . Trust among strangers in internet transactions:empirical analysis of ebay’s reputation system[J]. The Economics of the Internet and E-commerce, 2002,11(2):127-157. |
[21] | XIONG L , LIU L . Peertrust:supporting reputation-based trust for peer-to-peer electronic communities[J]. Transactions on Knowledge and Data Engineering, 2004,16(7):843-857. |
[22] | LI J , LI R , KATO J . Future trust management framework for mo-bile ad hoc networks[J]. Communications Magazine, 2008,46(4):108-114. |
[23] | WALSH K , SIRER E G . Fighting peer-to-peer spam and decoys with object reputation[C]//The 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. c2005:138-143. |
[24] | 李建欣, 怀进鹏, 李先贤 , 等. DTM:一种面向网络计算的动态信任管理模型[J]. 计算机学报, 2009,32(3):493-505. |
LI J X , HUAI J P , LI X X , et al. DTM:a dynamic trust management model for internet computing environments[J]. Chinese Journal of Computers, 2009,32(3):493-505. | |
[25] | 李致远, 王汝传 . P2P 电子商务环境下的动态安全信任管理模型[J]. 通信学报, 2011,32(3):50-59. |
LI Z Y , WANG R C . Dynamic secure trust management model for P2P e-commerce environments[J]. Journal on Communications, 2011,32(3):50-59. | |
[26] | 胡建理, 周斌, 吴泉源 . P2P 网络中具有激励机制的信任管理研究[J]. 通信学报, 2011,32(5):22-32. |
HU J L , ZHOU B , WU Q Y . Research on incentive mechanism in-tegrated trust management for P2P networks[J]. Journal on Com-munications, 2011,32(5):22-32. | |
[27] | 罗俊海, 范明钰 . 基于置信度的MANETs主观信任管理模型[J]. 计算机研究与发展, 2010,47(3):515-523. |
LUO J H , FAN M Y . A subjective trust management model based on certainty-factor for MANETs[J]. Journal of Computer Research and Development, 2010,47(3):515-523. | |
[28] | 郭晶晶, 马建峰, 李琦 , 等. 基于博弈论的移动自组织网络的信任管理方法[J]. 通信学报, 2014,35(11):50-58. |
GUO J J , MA J F , LI Q , et al. Game theory based trust management method for mobile ad hoc networks[J]. Journal on Communications, 2014,35(11):50-58. | |
[29] | TRIFUNOVIC S , LEGENDRE F , ANASTASIADES C . Social trust in opportunistic networks[C]//IEEE Conference on Computer Communications Workshops. Journal of Artificial Intelligence Research, c2010:1-6. |
[30] | DOUCEUR J R . The sybil attack[C]//The First International Workshop on Peer-to-Peer Systems,Cambridge,MA. Berlin Hei-delberg:Springer, 2002:251-260. |
[31] | SUN Y L , HAN Z , YU W , et al. A trust evaluation framework in distributed networks:vulnerability analysis and defense against at-tacks[C]//IEEE Conference on Computer Communications Work-shops. c2006:1-13. |
[32] | RAYA M , PAPADIMITRATOS P , GLIGOR V D , et al. On data-centric trust establishment in ephemeral ad hoc networks[C]//The 27th Conference on Computer Communications. c2008:1912-1920. |
[33] | YAN Z , NIEMI V . A methodology towards usable trust manage-ment[C]//The 6th International Conference on Autonomic and Trusted Computing,Brisbane. Berlin Heidelberg:Springer, 2009:179-193. |
[34] | PAVLOV E , ROSENSCHEIN J S , TOPOL Z . Supporting privacy in decentralized additive reputation systems[C]//The Second Interna-tional Conference on Trust Management,Oxford. Berlin Heidelberg:Springer, 2004:108-119. |
[35] | YAO D , TAMASSIA R , PROCTOR S . Private distributed scalar product protocol with application to privacy-preserving computa-tion of trust[M]//Trust Management. 2007:1-16. |
[36] | MELCHOR C A , AIT-SALEM B , GABORIT P . A collu-sion-resistant distributed scalar product protocol with application to privacy-preserving computation of trust[C]//The Eighth IEEE In-ternational Symposium on Network Computing and Applications. c2009:140-147. |
[37] | NITHYANAND R , RAMAN K . Fuzzy privacy preserving peer-to-peer reputation management[J]. IACR Cryptology ePrint Archive, 2009:442. |
[38] | YAN Z , CHEN Y , SHEN Y , et al. A practical reputation system for per-vasive social chatting[J]. Journal of Computer and System Sciences, 2013,79(5):556-572. |
[39] | FUJIMURA K , NISHIHARA T . Reputation rating system based on past behavior of evaluators[C]//The 4th ACM Conference on Elec-tronic Commerce. c2003:246-247. |
[40] | YAN Z , CHEN Y , SHEN Y . PerContRep:a practical reputation system for pervasive content services[J]. The Journal of Super-computing, 2014,70(3):1051-1074. |
[41] | YAN Z , DING W , NIEMI V , et al. Two schemes of privacy- pre-serving trust evaluation[J]. Future Generation Computer Systems, 2015(12). |
[42] | J?SANG A , ISMAIL R , BOYD C . A survey of trust and reputation systems for online service provision[J]. Decision Support Systems, 2007,43(2):618-644. |
[43] | SUN Y , HAN Z , LIU K J R . Defense of trust management vulner-abilities in distributed networks[J]. Communications Magazine, 2008,46(2):112-119. |
[44] | BUCHEGGER S , Boudec J Y L . Performance analysis of the CONFIDANT protocol[C]//The 3rd ACM International Symposium on Mobile Ad Hoc Networking & Computing. c2002:226-236. |
[45] | MICHIARDI P , MOLVA R . Core:a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc net-works[C]//The Sixth Joint Working Conference on Communica-tions and Multimedia Security. 2002:107-121. |
[46] | BUCHEGGER S , BOUDEC J L . The effect of rumor spreading in reputation systems for mobile ad-hoc networks[C]//WiOpt'03:Modeling and Optimization in Mobile,Ad Hoc and Wireless Net-works. c2003. |
[47] | 田俊峰, 田瑞 . 基于领域和贝叶斯网络的 P2P 电子商务细粒度信任模型[J]. 计算机研究与发展, 2011,48(6):974-982. |
TIAN J F , TIAN R . A fine-grain trust model based on domain and bayesian network for P2P e-commerce system[J]. Journal of Com-puter Research and Development, 2011,48(6):974-982. | |
[48] | RESNICK P , KUWABARA K , ZECKHAUSER R , et al. Reputa-tion systems[J]. Communications of the ACM, 2000,43(12):45-48. |
[49] | BLAZE M , FEIGENBAUM J , LACY J . Decentralized trust man-agement[C]//The 1996 IEEE Symposium on Security and Privacy. c1996:164-173. |
[50] | YAN Z , ZHANG P . AdPriRec:a context-aware recommender sys-tem for user privacy in MANET services[M]//Ubiquitous Intelli-gence and Computing. Berlin Heidelberg:Springer, 2011:295-309. |
[51] | YAN Z , CHEN Y . AdContRep:a privacy enhanced reputation system for MANET content services[C]//The 7th International Conference on Ubiquitous Intelligence and Computing,Beijing. Berlin Heidelberg:Springer, 2010:414-429. |
[52] | BANSAL S , BAKER M . Observation-based cooperation enforce-ment in ad hoc networks[R]. 2003. |
[53] | HU J , BURMESTER M . LARS:a locally aware reputation system for mobile ad hoc networks[C]//The 44th Annual Southeast Re-gional Conference. c2006:119-123. |
[54] | ZHELEVA E , KOLCZ A , GETOOR L . Trusting spam reporters:a reporter-based reputation system for email filtering[J]. ACM Transac-tions on Information Systems (TOIS), 2008,27(1):1139-1141. |
[55] | ZHANG J Z , XU W , PENG Y D , et al. MailTrust:a mail reputation mechanism based on improved trustguard[C]//The 2010 Interna-tional Conference on Communications and Mobile Computing (CMC). c2010:218-222. |
[56] | ZHANG H , DUAN H , LIU W , et al. IPGroupRep:a novel reputa-tion based system for anti-spam[C]//Symposia and Workshops on Ubiquitous,Autonomic and Trusted Computing. c2009:513-518. |
[57] | BI J , WU J , ZHANG W . A trust and reputation based anti-spim method[C]//IEEE International Conference on Computer Commu-nications. c2008:2485-2493. |
[58] | TANG Y , KRASSER S , HE Y , et al. Support vector machines and random forests modeling for spam senders behavior analy-sis[C]//Global Telecommunications Conference. c2008:1-5. |
[59] | WU B , GOEL V , DAVISON B D . Topical trustrank:using topical-ity to combat web spam[C]//The 15th International Conference on World Wide Web. c2006:63-72. |
[60] | KOLAN P , DANTU R . Socio-technical defense against voice spamming[J]. ACM Transactions on Autonomous and Adaptive Systems (TAAS), 2007,2(1):130-138. |
[61] | YAN Z , KANTOLA R , SHEN Y . A generic solution for unwanted traffic control through trust management[J]. New Review of Hy-permedia and Multimedia, 2014,20(1):25-51. |
[62] | MA S , YAN Z . PSNcontroller:an unwanted content control system in pervasive social networking based on trust management[J]. ACM Transactions on Multimedia Computing,Communications,and Ap-plications (TOMM), 2015,12(1s):17. |
[63] | O’DONOVAN J , SMYTH B . Trust in recommender sys-tems[C]//The 10th International Conference on Intelligent User In-terfaces. c2005:167-174. |
[64] | RESNICK P , VARIAN H R . Recommender systems[J]. Communi-cations of the ACM, 1997,40(3):56-58. |
[65] | LUO Y , LE J , CHEN H . A privacy-preserving book recommenda-tion model based on multi-agent[C]//The Second International Workshop on Computer Science and Engineering. c2009:323-327. |
[66] | POLAT H , DU W . Privacy-preserving top-n recommendation on horizontally partitioned data[C]//The 2005 IEEE/WIC/ACM Inter-national Conference on Web Intelligence. c2005:725-731. |
[67] | YU Z , ZHOU X , ZHANG D , et al. Supporting context-aware me-dia recommendations for smart phones[J]. Pervasive Computing, 2006,5(3):68-75. |
[68] | ZHANG D , YU Z . Spontaneous and context-aware media recom-mendation in heterogeneous spaces[C]//The 65th Vehicular Tech-nology Conference. c2007:267-271. |
[69] | 王玙, 高琳 . 基于社交圈的在线社交网络朋友推荐算法[J]. 计算机学报, 2014(4):801-808. |
WANG Y , GAO L . Online social network friends recommendation algorithm based on social network[J]. Chinese Journal of Com-puters, 2014(4):801-808. | |
[70] | 黄震华, 张波, 方强 . 一种社交网络群组间信息推荐的有效方法[J]. 电子学报, 2015,43(6):1090-1093. |
HUANG Z H , ZHANG B , FANG Q . An efficient algorithm of in-formation recommendation between groups in social networks[J]. Acta Electronica Sinica, 2015,43(6):1090-1093. | |
[71] | ZOURIDAKI C , MARK B L , HEJMO M , et al. Robust cooperative trust establishment for MANETs[C]//The Fourth ACM Workshop on Security of Ad Hoc and Sensor Networks. c2006:23-34. |
[72] | PUTTASWAMY K P N , ZHAO B Y . Preserving privacy in loca-tion-based mobile social applications[C]//The Eleventh Workshop on Mobile Computing Systems & Applications. c2010:1-6. |
[73] | CHEN G , RAHMAN F . Analyzing privacy designs of mobile social networking applications[C]//IEEE/IFIP International Conference on Embedded and Ubiquitous Computing. c2008:83-88. |
[74] | BEACH A , GARTRELL M , HAN R . Solutions to security and privacy issues in mobile social networking[C]//International Confer-ence on Computational Science and Engineering. c2009:1036-1042. |
[75] | SADEH N , HONG J , CRANOR L , et al. Understanding and cap-turing people's privacy policies in a mobile social networking ap-plication[J]. Personal Ubiquitous Computing, 2009,13(6):401-412. |
[76] | MILUZZO E , LANE N D , FODOR K , et al. Sensing meets mobile social networks:the design,implementation and evaluation of the cenceme application[C]//The 6th ACM Conference on Embedded Network Sensor Systems. c2008:337-350 |
[77] | CHIN A , ZHANG D Q . Mobile social networking:an innovative approach[M]. New York:Springer, 2014:195-235. |
[78] | YANG H , LUO H , YE F , et al. Security in mobile ad hoc networks:challenges and solutions[J]. Wireless Communications, 2004,11(1):38-47. |
[79] | LUO H , KONG J , ZERFOS P , et al. URSA:ubiquitous and robust access control for mobile ad hoc networks[J]. IEEE/ACM Transac-tions on Networking (ToN), 2004,12(6):1049-1063. |
[80] | YAN Z , WANG M . Protect pervasive social networking based on two-dimensional trust levels[J]. IEEE Systems Journal, 2014(9):1-12. |
[81] | YAN Z , WANG M , NIEMI V , et al. Secure pervasive social net-working based on multi-dimensional trust levels[C]//The 2013 IEEE Conference on Communications and Network Security (CNS). c2013:100-108. |
[82] | YAN Z , FENG W , WANG P . Anonymous authentication for trust-worthy pervasive social networking[J]. IEEE Transactions on Computational Social Systems, 2016(11):1-11. |
[83] | LIU X , FANG Z , SHI L . Securing vehicular ad hoc net-works[C]//The 2nd International Conference on Pervasive Com-puting and Applications. c2007:424-429. |
[84] | LIN X , SUN X , WANG X , et al. TSVC:timed efficient and secure vehicular communications with privacy preserving[J]. IEEE Trans-actions on Wireless Communications, 2008,7(12):4987-4998. |
[85] | KELLEY P G , BREWER R , MAYER Y , et al. An investigation into facebook friend grouping[C]//The 13th IFIP TC 13 International Conference on Human-Computer Interaction,Lisbon. c2011:216-233. |
[86] | CISZKOWSKI T , KOTULSKI Z . Distributed reputation manage-ment in collaborative environment of anonymous MANETs[C]//The International Conference on “Computer as a Tool”. c2007:1028-1033. |
[1] | 陈赛特, 李卫海, 姚远志, 俞能海. 轻量级K匿名增量近邻查询位置隐私保护算法[J]. 网络与信息安全学报, 2023, 9(3): 60-72. |
[2] | 肖敏, 毛发英, 黄永洪, 曹云飞. 基于属性签名的车载网匿名信任管理方案[J]. 网络与信息安全学报, 2023, 9(2): 33-45. |
[3] | 许建龙, 林健, 黎宇森, 熊智. 分布式用户隐私保护可调节的云服务个性化QoS预测模型[J]. 网络与信息安全学报, 2023, 9(2): 70-80. |
[4] | 孙哲, 宁洪, 殷丽华, 方滨兴. 基于教学实训靶场的“数据隐私保护”课程建设初探[J]. 网络与信息安全学报, 2023, 9(1): 178-188. |
[5] | 白雪, 秦宝东, 郭瑞, 郑东. 基于SM2的两方协作盲签名协议[J]. 网络与信息安全学报, 2022, 8(6): 39-51. |
[6] | 肖敏, 姚涛, 刘媛妮, 黄永洪. 具有隐私保护的动态高效车载云管理方案[J]. 网络与信息安全学报, 2022, 8(6): 70-83. |
[7] | 卢晨昕, 陈兵, 丁宁, 陈立全, 吴戈. 具有紧凑标签的基于身份匿名云审计方案[J]. 网络与信息安全学报, 2022, 8(6): 156-168. |
[8] | 明盛智, 朱建明, 隋智源, 张娴. 信息增值机制下在线医疗隐私保护策略[J]. 网络与信息安全学报, 2022, 8(6): 169-177. |
[9] | 张娴, 朱建明, 隋智源, 明盛智. 数字货币交易匿名性与监管的博弈分析[J]. 网络与信息安全学报, 2022, 8(5): 150-157. |
[10] | 刘峰, 杨杰, 齐佳音. 区块链密码学隐私保护技术综述[J]. 网络与信息安全学报, 2022, 8(4): 29-44. |
[11] | 金琳, 田有亮. 基于区块链的多权限属性隐藏电子病历共享方案[J]. 网络与信息安全学报, 2022, 8(4): 66-76. |
[12] | 时文旗, 罗向阳, 郭家山. 基于加权最小二乘的社交网络用户定位方法[J]. 网络与信息安全学报, 2022, 8(3): 41-52. |
[13] | 张伟成, 卫红权, 刘树新, 普黎明. 5G移动边缘计算场景下的快速切换认证方案[J]. 网络与信息安全学报, 2022, 8(3): 154-168. |
[14] | 陈前昕, 毕仁万, 林劼, 金彪, 熊金波. 支持多数不规则用户的隐私保护联邦学习框架[J]. 网络与信息安全学报, 2022, 8(1): 139-150. |
[15] | 高振升, 曹利峰, 杜学绘. 基于区块链的访问控制技术研究进展[J]. 网络与信息安全学报, 2021, 7(6): 68-87. |
阅读次数 | ||||||
全文 |
|
|||||
摘要 |
|
|||||
|