Abstract
Behavior patterns of users in mobile social cloud are always based on real world relationships and can be used to infer a level of trust between users. In this paper, we describe the implicit call behavioral graph which is formed by users’ interactions with call. We rate these relationships to form a dynamic local cloud trust, which enables users to evaluate the trust values between users within the context of a mobile social cloud network. We, then, calculate local trust values according to users’ behavioral attributes, such as call frequency, relevance, call moment, and satisfaction. Due to the unique nature of the social cloud, we discuss the propagation and aggregation of local trust values for global social cloud network. Finally, we evaluate the performance of our trust model through simulations, and show simulation results that demonstrate the importance of interaction-based behavioural relationships in recommendation system.
Keywords
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Preview
Unable to display preview. Download preview PDF.
References
Christensen, J.H.: Using RESTful web-services and cloud computing to create next generation mobile applications. In: Proceeding of the 24th ACM SIGPLAN Conference Companion on Object-Oriented Programming Systems Languages and Applications, Orlando, FL, USA, pp. 627–634 (2009)
Takabi, H.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)
Heurta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services, vol. (6) (2010)
Chard, K., Bubendorfer, K., Caton, S., Rana, O.F.: Social Cloud Computing: A Vision for Socially Motivated Resource Sharing. IEEE Transactions on Services Computing 5(4), 551–563 (2012)
Costa, C., Bijlsma-Frankema, K.: Trust and Control Interrelations. Group and Organization Management 32(4), 392–406 (2007)
Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. In: Proc. of Cloud Computing, pp. 98–104 (2011)
Golbeck, J., Hendler, J.: Film Trust: Movie recommendations using Trust in Web-based social network. In: CCNC 2006, pp. 1314–1315. IEEE 3rd Publication (2006)
Kim, S., Han, S.: The method of inferring trust in Web-based social network using fuzzy logic. In: Proc. of the International Workshop on Machine Intelligence Research, pp. 140–144 (2009)
Kikin-Gil, R.: Affective is effective: how information appliances can mediate relationships within communities and increase oneŠs social effectiveness. Personal and Ubiquitous Computing 10(2-3), 77–83 (2006)
Counts, S.: Group-based mobile messaging in support of the social side of leisure. Computer Supported Cooperative Work 16(1-2), 75–97 (2007)
Pezzi, R.: Information Technology Tools for a Transition Economy (September 2009), http://www.socialcloud.net/papers/ITtools.pdf
Grob, R., Kuhn, M., Wattenhofer, R., Wirz, M.: Cluestr: Mobile Social Networking for Enhanced Group Communication. In: Proc. of GROUP 2009, USA, pp. 81–90 (2009)
Oulasvirta, A., Raento, M., Tiitta, S.: ContextContacts: redesigning SmartPhone’s contact book to support mobile awareness and collaboration. In: Mobile HCI, pp. 167–174 (2005)
Farnham, S., Keyani, P.: Swarm: Hyper awareness, micro coordination, and smart convergence through mobile group text messaging. In: HICSS, vol. 3, pp. 1–10 (2006)
Kim, M., Seo, J., Noh, S., Han, S.: Identity management-based social trust model for mediating information sharing and privacy enhancement. Secur. Commun. Netw. 5(8), 887–897 (2012)
Kim, M., Park, S.: Group affinity based social trust model for an intelligent movie recommender system. Multimed. Tools Appl. 64(2), 505–516 (2013)
Balasubramaniyan, V.A., Ahamad, M., Park, H.: CallRank: combating SPIT using call duration, social networks and global reputation. In: Proceedings of Fourth Conference on Email and Anti-Spam, pp. 18–24 (2007)
Ankolekar, A., Szabo, G., Luon, Y., Huberman, B.A., Wilkinson, D., Wu, F.: Friendlee: a mobile application for your social life. In: Proceedings of the 11st International Conference on Human-Computer Interaction with Mobile Devices and Services, vol. (27) (2009), doi:10.1145/1613858.1613893
Roth, M., Ben-David, A., Deutscher, D., Flysher, G., Horn, I., Leichtberg, A., Leiser, N., Matias, Y., Merom, R.: Suggesting Friends Using the Implicit Social Graph. In: KDD 2010, pp. 233–241 (2010)
Lund, M., Solhaug, B.: Evolution in Relation to Risk and Trust Management. Computer, 49–55 (May 2010)
Gambetta, D.: Can We Trust Trust? Trust: Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell (1988)
Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Survey and Tutorials, 2–16 (2000)
Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th International Conference on the World Wide Web, pp. 403–412. ACM Press (2004)
Gray, E., Seigneur, J.-M., Chen, Y., Jensen, C.: Trust propagation in small worlds. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 239–254. Springer, Heidelberg (2003)
Walter, F.E., Battiston, S., Schweitzer, F.: A model of a trust-based recommendation system on a social network. Auton Agent Multi-Agent Syst. 16, 57–74 (2008)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer International Publishing Switzerland
About this paper
Cite this paper
Chen, S., Wang, G., Jia, W. (2013). A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_29
Download citation
DOI: https://doi.org/10.1007/978-3-319-03584-0_29
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-03583-3
Online ISBN: 978-3-319-03584-0
eBook Packages: Computer ScienceComputer Science (R0)