Openly accessible

OST : A transaction based online social trust model for social network and file sharing security

Li, Ming, Bonti, Alessio and Zhou, Wanlei 2010, OST : A transaction based online social trust model for social network and file sharing security, in IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010, IEEE, Piscataway, N.J., pp. 826-832.

Attached Files
Name Description MIMEType Size Downloads
li-ostatransactionbasedonlinesocial-2010.pdf Published version application/pdf 314.29KB 4

Title OST : A transaction based online social trust model for social network and file sharing security
Author(s) Li, Ming
Bonti, Alessio
Zhou, Wanlei
Conference name Embedded and Ubiquitous Computing. Conference (8th : 2010 : Hong Kong, China)
Conference location Hong Kong, China
Conference dates 11-13 Dec, 2010
Title of proceedings IEEE/IFIP 2010 : Proceedings of the IEEE/IFIP 8th International Conference Embedded and Ubiquitous Computing 2010
Editor(s) [Unknown]
Publication date 2010
Conference series Embedded and Ubiquitous Computing Conference
Start page 826
End page 832
Total pages 7
Publisher IEEE
Place of publication Piscataway, N.J.
Keyword(s) trust
social network
security
privacy
Summary The continuous growth of the users pool of Social Networking web sites such as Facebook and MySpace, and their incessant augmentation of services and capabilities will in the future, meet and compare in contrast with today's Content distribution Networks (CDN) and Peer-to-Peer File sharing applications such as Kazaa and BitTorrent, but how can these two main streams applications, that already encounter their own security problems cope with the combined issues, trust for Social Networks, content and index poisoning in CDN? We will address the problems of Social Trust and File Sharing with an overlay level of trust model based on social activity and transactions, this can be an answer to enable users to increase the reliability of their online social life and also enhance the content distribution and create a better file sharing example. The aim of this research is to lower the risk of malicious activity on a given Social Network by applying a correlated trust model, to guarantee the validity of someone's identity, privacy and trustfulness in sharing content.
Notes This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright. In most cases, these works may not be reposted without the explicit permission of the copyright holder.
ISBN 9780769543222
Language eng
Field of Research 080303 Computer System Security
Socio Economic Objective 890103 Mobile Data Networks and Services
HERDC Research category E1 Full written paper - refereed
HERDC collection year 2010
Copyright notice ©2010, IEEE
Persistent URL http://hdl.handle.net/10536/DRO/DU:30033644

Document type: Conference Paper
Collections: School of Information Technology
Open Access Collection
Connect to link resolver
 
Unless expressly stated otherwise, the copyright for items in DRO is owned by the author, with all rights reserved.

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.

Versions
Version Filter Type
Access Statistics: 234 Abstract Views, 11 File Downloads  -  Detailed Statistics
Created: Fri, 25 Mar 2011, 16:04:12 EST by Sandra Dunoon

Every reasonable effort has been made to ensure that permission has been obtained for items included in DRO. If you believe that your rights have been infringed by this repository, please contact drosupport@deakin.edu.au.