skip to main content
research-article

Social-Chain: Decentralized Trust Evaluation Based on Blockchain in Pervasive Social Networking

Published: 05 January 2021 Publication History

Abstract

Pervasive Social Networking (PSN) supports online and instant social activities with the support of heterogeneous networks. Since reciprocal activities among both familiar/unfamiliar strangers and acquaintances are quite common in PSN, it is essential to offer trust information to PSN users. Past work normally evaluates trust based on a centralized party, which is not feasible due to the dynamic changes of PSN topology and its specific characteristics. The literature still lacks a decentralized trust evaluation scheme in PSN. In this article, we propose a novel blockchain-based decentralized system for trust evaluation in PSN, called Social-Chain. Considering mobile devices normally lack computing resources to process cryptographic puzzle calculation, we design a lightweight consensus mechanism based on Proof-of-Trust (PoT), which remarkably improves system effectivity compared with other blockchain systems. Serious security analysis and experimental results further illustrate the security and efficiency of Social-Chain for being feasibly applied into PSN.

References

[1]
Ian Grigg. [n.d.]. EOS-An Introduction. Retrieved on Dec. 18, 2020 from https://www.iang.org/papers/EOS_An_Introduction-BLACK-EDITION.pdf.
[2]
2017. Qtum whitepaper. Retrieved from https://whitepaperdatabase.com/qtum-whitepaper/.
[3]
2016. Waves whitepaper. Retrieved from https://blog.wavesplatform.com/waves-whitepaper-164dd6ca6a23.
[4]
Christian Badertscher, Peter Gaži, Aggelos Kiayias, Alexander Russell, and Vassilis Zikas. 2018. Ouroboros genesis: Composable proof-of-stake blockchains with dynamic availability. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 913--930.
[5]
Mohamed Baza, Mahmoud Nabil, Mohamed Mohamed Elsalih Abdelsalam Mahmoud, Niclas Bewermeier, Kemal Fidan, Waleed Alasmary, and Mohamed Abdallah. 2019. Detecting Sybil attacks using proofs of work and location in vanets. IEEE Trans. Depend. Sec. Comput. arXiv:1904.05845v1.
[6]
Iddo Bentov, Ariel Gabizon, and Alex Mizrahi. 2016. Cryptocurrencies without proof of work. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 142--157.
[7]
Vitalik Buterin and Virgil Griffith. 2017. Casper the friendly finality gadget. arXiv preprint arXiv:1710.09437 (2017).
[8]
Miguel Castro, Barbara Liskov, et al. 1999. Practical Byzantine fault tolerance. In Proceedings of the USENIX Symposium on Operating Systems Design and Implementation (OSDI ’99), Vol. 99. 173--186.
[9]
Kyle Croman, Christian Decker, Ittay Eyal, Adem Efe Gencer, Ari Juels, Ahmed Kosba, Andrew Miller, Prateek Saxena, Elaine Shi, Emin Gün Sirer, et al. 2016. On scaling decentralized blockchains. In Proceedings of the International Conference on Financial Cryptography and Data Security. Springer, 106--125.
[10]
Christian Decker and Roger Wattenhofer. 2013. Information propagation in the bitcoin network. In Proceedings of the IEEE P2P Conference. IEEE, 1--10.
[11]
Chrysanthos Dellarocas. 2000. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems. In Proceedings of the International Conference on Information Systems (ICIS’00). 52.
[12]
Ittay Eyal, Adem Efe Gencer, Emin Gun Sirer, and Robbert Van Renesse. 2016. Bitcoin-NG: A scalable blockchain protocol. In Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation. 45--59.
[13]
Ittay Eyal and Emin Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.
[14]
Kai Fan, Yanhui Ren, Zheng Yan, Shangyang Wang, Hui Li, and Yintang Yang. 2018. Secure Time synchronization scheme in IoT based on blockchain. IEEE Blockchain (2018).
[15]
Kai Fan, Shangyang Wang, Yanhui Ren, Kan Yang, Zheng Yan, Hui Li, and Yintang Yang. 2018. Blockchain-based secure time protection scheme in IoT. IEEE Internet Things J. (2018).
[16]
Dongqi Fu and Liri Fang. 2016. Blockchain-based trusted computing in social network. In Proceedings of the 2nd IEEE International Conference on Computer and Communications (ICCC’16). IEEE, 19--22.
[17]
Adem Efe Gencer, Soumya Basu, Ittay Eyal, Robbert Van Renesse, and Emin Gün Sirer. 2018. Decentralization in Bitcoin and Ethereum networks. arXiv preprint arXiv:1801.03998 (2018).
[18]
Yossi Gilad, Rotem Hemo, Silvio Micali, Georgios Vlachos, and Nickolai Zeldovich. 2017. Algorand: Scaling byzantine agreements for cryptocurrencies. In Proceedings of the 26th Symposium on Operating Systems Principles. ACM, 51--68.
[19]
Linke Guo, Chi Zhang, and Yuguang Fang. 2015. A trust-based privacy-preserving friend recommendation scheme for online social networks. IEEE Trans. Depend. Sec. Comput. 12, 4 (2015), 413--427.
[20]
Timo Hanke, Mahnush Movahedi, and Dominic Williams. 2018. Dfinity technology overview series, consensus system. arXiv preprint arXiv:1805.04548 (2018).
[21]
Fei Hao, Geyong Min, Man Lin, Changqing Luo, and Laurence T. Yang. 2014. MobiFuzzyTrust: An efficient fuzzy trust inference mechanism in mobile social networks. IEEE Trans. Parallel Distrib. Syst. 25, 11 (2014), 2944--2955.
[22]
Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, and Huanyang Zheng. 2016. Trust evaluation in online social networks using generalized network flow. IEEE Trans. Comput. 65, 3 (2016), 952--963.
[23]
Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web. ACM, 640--651.
[24]
Sunny King and Scott Nadal. 2012. PPCoin: Peer-to-peer crypto-currency with proof-of-stake. Self-published Paper, August 19 (2012). Retrieved on December 18. 2020 from https://decred.org/research/king2012.pdf.
[25]
Marek Klonowski and Micha B. Koza. 2013. Countermeasures against Sybil attacks in WSN based on proofs-of-work. In Proceedings of the 6th ACM Conference on Security and Privacy in Wireless and Mobile Networks. 179--184.
[26]
Daniel Larimer. 2014. Delegated proof-of-stake (DPOS). Bitshare Whitepaper (2014). Retrieved on December 2020 from https://bitcointalk.org/index.php?topic=558316.msg6082114#msg6082114.
[27]
Guanfeng Liu, Yan Wang, Mehmet A. Orgun, and Ee-Peng Lim. 2013. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans. Serv. Comput. 6, 2 (2013), 152--167.
[28]
Loi Luu, Viswesh Narayanan, Chaodong Zheng, Kunal Baweja, Seth Gilbert, and Prateek Saxena. 2016. A secure sharding protocol for open blockchains. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 17--30.
[29]
Dianhui Mao, Fan Wang, Zhihao Hao, and Haisheng Li. 2018. Credit evaluation system based on blockchain for multiple stakeholders in the food supply chain. Int. J. Environ. Res. Pub. Health 15, 8 (2018), 1627.
[30]
Andrew Miller, Yu Xia, Kyle Croman, Elaine Shi, and Dawn Song. 2016. The honey badger of BFT protocols. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 31--42.
[31]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. (2008). Retrieved on December 18, 2020 from https://bitcoin.org/bitcoin.pdf.
[32]
James Newsome, Elaine Shi, Dawn Song, and Adrian Perrig. 2004. The Sybil attack in sensor networks: Analysis 8 defenses. In Proceedings of the 3rd International Symposium on Information Processing in Sensor Networks. IEEE, 259--268.
[33]
Daejun Park, Yi Zhang, Manasvi Saxena, Philip Daian, and Grigore Roşu. 2018. A formal verification tool for Ethereum VM Bytecode. In Proceedings of the 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM, 912--915.
[34]
Maxim Raya, Panagiotis Papadimitratos, Virgil D. Gligor, and J.-P. Hubaux. 2008. On data-centric trust establishment in ephemeral ad hoc networks. In Proceedings of the IEEE 27th Conference on Computer Communications. IEEE, 1238--1246.
[35]
Paul Resnick and Richard Zeckhauser. 2002. Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. In The Economics of the Internet and E-commerce. Emerald Group Publishing Limited, 127--157. Retrieved on December 18, 2020 from http://presnick.people.si.umich.edu/papers/ebayNBER/RZNBERBodegaBay.pdf.
[36]
Emre Sarigöl, Oriana Riva, Patrick Stuedi, and Gustavo Alonso. 2009. Enabling social networking in ad hoc networks of mobile phones. Proc. VLDB Endow. 2, 2 (2009), 1634--1637.
[37]
Jian Shen, Tianqi Zhou, Chin-Feng Lai, Jiguo Li, and Xiong Li. 2017. Hierarchical trust level evaluation for pervasive social networking. IEEE Access 5 (2017), 1178--1187.
[38]
Melanie Swan. 2015. Blockchain: Blueprint for a New Economy. O’Reilly Media, Inc.
[39]
Wenbo Wang, Dinh Thai Hoang, Zehui Xiong, Dusit Niyato, Ping Wang, Peizhao Hu, and Yonggang Wen. 2018. A survey on consensus mechanisms and mining management in blockchain networks. arXiv preprint arXiv:1805.02707 (2018).
[40]
Gavin Wood. 2014. Ethereum: A secure decentralised generalised transaction ledger. Ethereum Proj. Yell. Pap. 151 (2014), 1--32.
[41]
Ronghua Xu, Xuheng Lin, Qi Dong, and Yu Chen. 2018. Constructing trustworthy and safe communities on a blockchain-enabled social credits system. In Proceedings of the 15th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. ACM, 449--453.
[42]
Zheng Yan, Yu Chen, and Yue Shen. 2013. A practical reputation system for pervasive social chatting. J. Comput. Syst. Sci. 79, 5 (2013), 556--572.
[43]
Zheng Yan, Yu Chen, and Yue Shen. 2014. PerContRep: A practical reputation system for pervasive content services. J. Supercomput. 70, 3 (2014), 1051--1074.
[44]
Zheng Yan, Wei Feng, and Pu Wang. 2015. Anonymous authentication for trustworthy pervasive social networking. IEEE Trans. Comput. Soc. Syst. 2, 3 (2015), 88--98.
[45]
Zheng Yan, Xueyun Li, and Raimo Kantola. 2015. Controlling cloud data access based on reputation. Mob. Netw. Applic. 20, 6 (2015), 828--839.
[46]
Zheng Yan, Xueyun Li, Mingjun Wang, and Athanasios V. Vasilakos. 2015. Flexible data access control based on trust and reputation in cloud computing. IEEE Trans. Cloud Comput. 5, 3 (2015), 485--498.
[47]
Zheng Yan and Wangyang Shi. 2017. CloudFile: A cloud data access control system based on mobile social trust. J. Netw. Comput. Applic. 86 (2017), 46--58.
[48]
Zheng Yan, Honggang Wang, Laurence T. Yang, and Valtteri Niemi. 2018. Special section editorial: Trust management in pervasive social networking (TruPSN). IEEE Access 6 (2018), 16851--16854.
[49]
Zheng Yan and Mingjun Wang. 2017. Protect pervasive social networking based on two-dimensional trust levels. IEEE Syst. J. 11, 1 (2017), 207--218.
[50]
Zheng Yan, Pu Wang, and Wei Feng. 2018. A novel scheme of anonymous authentication on trust in pervasive social networking. Inf. Sci. 445 (2018), 79--96.
[51]
Zhe Yang, Kan Yang, Lei Lei, Kan Zheng, and Victor C. M. Leung. 2019. Blockchain-based decentralized trust management in vehicular networks. IEEE Internet Things J. 6, 2 (2019), 1495--1505.
[52]
Zhe Yang, Kan Zheng, Kan Yang, and Victor C. M. Leung. 2017. A blockchain-based reputation system for data credibility assessment in vehicular networks. In Proceedings of the IEEE 28th International Symposium on Personal, Indoor, and Mobile Radio Communications (PIMRC’17). IEEE, 1--5.
[53]
Mahdi Zamani, Mahnush Movahedi, and Mariana Raykova. 2018. RapidChain: Scaling blockchain via full sharding. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. ACM, 931--948.
[54]
Bo Zhang, Ruihan Yong, Meizi Li, Jianguo Pan, and Jifeng Huang. 2017. A hybrid trust evaluation framework for e-commerce in online social network: A factor enrichment perspective. IEEE Access 5 (2017), 7080--7096.

Cited By

View all

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 21, Issue 1
Visions Paper, Regular Papers, SI: Blockchain in E-Commerce, and SI: Human-Centered Security, Privacy, and Trust in the Internet of Things
February 2021
534 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3441681
  • Editor:
  • Ling Liu
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 05 January 2021
Accepted: 01 August 2020
Revised: 01 July 2020
Received: 01 April 2020
Published in TOIT Volume 21, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Trust evaluation
  2. blockchain
  3. consensus mechanism
  4. pervasive social networking

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

  • the Academy of Finland
  • NSFC
  • the Key Lab of Information Network Security, Ministry of Public Security
  • open grant of the Tactical Data Link Lab of the 20th Research Institute of China Electronics Technology Group Corporation, P.R. China
  • the Shaanxi Innovation Team project
  • the National Postdoctoral Program for Innovative Talents
  • the Project funded by China Postdoctoral Science Foundation
  • the 111 project

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)120
  • Downloads (Last 6 weeks)14
Reflects downloads up to 06 Nov 2024

Other Metrics

Citations

Cited By

View all

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media