TY - GEN
T1 - Trustworthy distributed computing on social networks
AU - Mohaisen, Abedelaziz
AU - Tran, Huy
AU - Chandra, Abhishek
AU - Kim, Yongdae
PY - 2013
Y1 - 2013
N2 - We investigate a new computing paradigm, called SocialCloud, in which computing nodes are governed by social ties driven from a bootstrapping trust-possessing social graph. We investigate how this paradigm differs from existing computing paradigms, such as grid computing and the conventional cloud computing paradigms. We show that incentives to adopt this paradigm are intuitive and natural, and security and trust guarantees provided by it are solid. We propose metrics for measuring the utility and advantage of this computing paradigm, and using real-world social graphs and structures of social traces; we investigate the potential of this paradigm for ordinary users. We study several design options and trade-offs, such as scheduling algorithms, centralization, and straggler handling, and show how they affect the utility of the paradigm. Interestingly, we conclude that whereas graphs known in the literature for high trust properties do not serve distributed trusted computing algorithms, such as Sybil defenses - for their weak algorithmic properties, such graphs are good candidates for our paradigm for their self-load-balancing features.
AB - We investigate a new computing paradigm, called SocialCloud, in which computing nodes are governed by social ties driven from a bootstrapping trust-possessing social graph. We investigate how this paradigm differs from existing computing paradigms, such as grid computing and the conventional cloud computing paradigms. We show that incentives to adopt this paradigm are intuitive and natural, and security and trust guarantees provided by it are solid. We propose metrics for measuring the utility and advantage of this computing paradigm, and using real-world social graphs and structures of social traces; we investigate the potential of this paradigm for ordinary users. We study several design options and trade-offs, such as scheduling algorithms, centralization, and straggler handling, and show how they affect the utility of the paradigm. Interestingly, we conclude that whereas graphs known in the literature for high trust properties do not serve distributed trusted computing algorithms, such as Sybil defenses - for their weak algorithmic properties, such graphs are good candidates for our paradigm for their self-load-balancing features.
KW - distributed computing
KW - social computing
KW - trust
UR - http://www.scopus.com/inward/record.url?scp=84877954096&partnerID=8YFLogxK
UR - http://www.scopus.com/inward/citedby.url?scp=84877954096&partnerID=8YFLogxK
U2 - 10.1145/2484313.2484332
DO - 10.1145/2484313.2484332
M3 - Conference contribution
AN - SCOPUS:84877954096
SN - 9781450317672
T3 - ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
SP - 155
EP - 160
BT - ASIA CCS 2013 - Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security
T2 - 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, ASIA CCS 2013
Y2 - 8 May 2013 through 10 May 2013
ER -