Skip to main content

A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing

  • Conference paper
Cyberspace Safety and Security (CSS 2013)

Part of the book series: Lecture Notes in Computer Science ((LNSC,volume 8300))

Included in the following conference series:

Abstract

Behavior patterns of users in mobile social cloud are always based on real world relationships and can be used to infer a level of trust between users. In this paper, we describe the implicit call behavioral graph which is formed by users’ interactions with call. We rate these relationships to form a dynamic local cloud trust, which enables users to evaluate the trust values between users within the context of a mobile social cloud network. We, then, calculate local trust values according to users’ behavioral attributes, such as call frequency, relevance, call moment, and satisfaction. Due to the unique nature of the social cloud, we discuss the propagation and aggregation of local trust values for global social cloud network. Finally, we evaluate the performance of our trust model through simulations, and show simulation results that demonstrate the importance of interaction-based behavioural relationships in recommendation system.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Christensen, J.H.: Using RESTful web-services and cloud computing to create next generation mobile applications. In: Proceeding of the 24th ACM SIGPLAN Conference Companion on Object-Oriented Programming Systems Languages and Applications, Orlando, FL, USA, pp. 627–634 (2009)

    Google Scholar 

  2. Takabi, H.: Security and privacy challenges in cloud computing environments. IEEE Secur. Priv. 8(6), 24–31 (2010)

    Article  Google Scholar 

  3. Heurta-Canepa, G., Lee, D.: A virtual cloud computing provider for mobile devices. In: Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services, vol. (6) (2010)

    Google Scholar 

  4. Chard, K., Bubendorfer, K., Caton, S., Rana, O.F.: Social Cloud Computing: A Vision for Socially Motivated Resource Sharing. IEEE Transactions on Services Computing 5(4), 551–563 (2012)

    Article  Google Scholar 

  5. Costa, C., Bijlsma-Frankema, K.: Trust and Control Interrelations. Group and Organization Management 32(4), 392–406 (2007)

    Article  Google Scholar 

  6. Kuada, E., Olesen, H.: A social network approach to provisioning and management of cloud computing services for enterprises. In: Proc. of Cloud Computing, pp. 98–104 (2011)

    Google Scholar 

  7. Golbeck, J., Hendler, J.: Film Trust: Movie recommendations using Trust in Web-based social network. In: CCNC 2006, pp. 1314–1315. IEEE 3rd Publication (2006)

    Google Scholar 

  8. Kim, S., Han, S.: The method of inferring trust in Web-based social network using fuzzy logic. In: Proc. of the International Workshop on Machine Intelligence Research, pp. 140–144 (2009)

    Google Scholar 

  9. Kikin-Gil, R.: Affective is effective: how information appliances can mediate relationships within communities and increase oneŠs social effectiveness. Personal and Ubiquitous Computing 10(2-3), 77–83 (2006)

    Article  Google Scholar 

  10. Counts, S.: Group-based mobile messaging in support of the social side of leisure. Computer Supported Cooperative Work 16(1-2), 75–97 (2007)

    Article  Google Scholar 

  11. Pezzi, R.: Information Technology Tools for a Transition Economy (September 2009), http://www.socialcloud.net/papers/ITtools.pdf

  12. Grob, R., Kuhn, M., Wattenhofer, R., Wirz, M.: Cluestr: Mobile Social Networking for Enhanced Group Communication. In: Proc. of GROUP 2009, USA, pp. 81–90 (2009)

    Google Scholar 

  13. Oulasvirta, A., Raento, M., Tiitta, S.: ContextContacts: redesigning SmartPhone’s contact book to support mobile awareness and collaboration. In: Mobile HCI, pp. 167–174 (2005)

    Google Scholar 

  14. Farnham, S., Keyani, P.: Swarm: Hyper awareness, micro coordination, and smart convergence through mobile group text messaging. In: HICSS, vol. 3, pp. 1–10 (2006)

    Google Scholar 

  15. Kim, M., Seo, J., Noh, S., Han, S.: Identity management-based social trust model for mediating information sharing and privacy enhancement. Secur. Commun. Netw. 5(8), 887–897 (2012)

    Article  Google Scholar 

  16. Kim, M., Park, S.: Group affinity based social trust model for an intelligent movie recommender system. Multimed. Tools Appl. 64(2), 505–516 (2013)

    Article  Google Scholar 

  17. Balasubramaniyan, V.A., Ahamad, M., Park, H.: CallRank: combating SPIT using call duration, social networks and global reputation. In: Proceedings of Fourth Conference on Email and Anti-Spam, pp. 18–24 (2007)

    Google Scholar 

  18. Ankolekar, A., Szabo, G., Luon, Y., Huberman, B.A., Wilkinson, D., Wu, F.: Friendlee: a mobile application for your social life. In: Proceedings of the 11st International Conference on Human-Computer Interaction with Mobile Devices and Services, vol. (27) (2009), doi:10.1145/1613858.1613893

    Google Scholar 

  19. Roth, M., Ben-David, A., Deutscher, D., Flysher, G., Horn, I., Leichtberg, A., Leiser, N., Matias, Y., Merom, R.: Suggesting Friends Using the Implicit Social Graph. In: KDD 2010, pp. 233–241 (2010)

    Google Scholar 

  20. Lund, M., Solhaug, B.: Evolution in Relation to Risk and Trust Management. Computer, 49–55 (May 2010)

    Google Scholar 

  21. Gambetta, D.: Can We Trust Trust? Trust: Making and Breaking Cooperative Relations, pp. 213–237. Basil Blackwell (1988)

    Google Scholar 

  22. Grandison, T., Sloman, M.: A survey of trust in Internet applications. IEEE Communications Survey and Tutorials, 2–16 (2000)

    Article  Google Scholar 

  23. Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: WWW 2004: Proceedings of the 13th International Conference on the World Wide Web, pp. 403–412. ACM Press (2004)

    Google Scholar 

  24. Gray, E., Seigneur, J.-M., Chen, Y., Jensen, C.: Trust propagation in small worlds. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 239–254. Springer, Heidelberg (2003)

    Chapter  Google Scholar 

  25. Walter, F.E., Battiston, S., Schweitzer, F.: A model of a trust-based recommendation system on a social network. Auton Agent Multi-Agent Syst. 16, 57–74 (2008)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer International Publishing Switzerland

About this paper

Cite this paper

Chen, S., Wang, G., Jia, W. (2013). A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing. In: Wang, G., Ray, I., Feng, D., Rajarajan, M. (eds) Cyberspace Safety and Security. CSS 2013. Lecture Notes in Computer Science, vol 8300. Springer, Cham. https://doi.org/10.1007/978-3-319-03584-0_29

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-03584-0_29

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-03583-3

  • Online ISBN: 978-3-319-03584-0

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics