计算机科学 ›› 2015, Vol. 42 ›› Issue (11): 8-21.doi: 10.11896/j.issn.1002-137X.2015.11.002

• 目次 • 上一篇    下一篇

社交网络研究综述

李立耀,孙鲁敬,杨家海   

  1. 福建师范大学福清分校电子与信息工程学院 福清350300;清华大学网络科学与网络空间研究院 北京100084,清华大学网络科学与网络空间研究院 北京100084;清华大学清华信息科学与技术国家实验室 北京100084,清华大学网络科学与网络空间研究院 北京100084;清华大学清华信息科学与技术国家实验室 北京100084
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家重点基础研究发展计划(2012CB315806),国家自然科学基金(61170211,6,61161140454),博士点基金(20110002110056,8),福建省教育厅科技项目(JA12352)资助

Research on Online Social Network

LI Li-yao, SUN Lu-jing and YANG Jia-hai   

  • Online:2018-11-14 Published:2018-11-14

摘要: 社交网络已成为Web2.0时代最流行的应用,其服务范围已逐步从社交关系管理扩展到媒体信息、应用集成、电子商务等领域。社交网络中大量的活跃用户为研究网络行为、数据安全、信息传播以及其他跨学科问题提供了宝贵的数据和场景。自Facebook出现以来,研究者先后从不同的角度对社交网络进行了大量的研究,这些研究对人们认识社交网络内部规律、促进ICP服务改进具有重大意义。首先对社交网络的发展进行了简单的回顾;然后从社交网络的数据采集技术、社交网络用户行为分析、社交网络中的信息传播及社交网络中的用户隐私4个方面对已有的研究工作进行总结评价;最后,总结了当前研究中出现的问题并对未来研究发展趋势进行了展望。希望能为该领域的研究者提供一些有益的启示。

关键词: 社交网络,数据测量,用户行为分析,信息传播,用户隐私

Abstract: The online social network (OSN) has become the most popular application in the Web2.0 age.Its services have extended from social relationship management to media information,application integration and e-commerce.With its huge amounts of active users,OSN has played a critical role in the academic research area such as online behavior,data security,information diffusion and other interdisciplinary studies.Since the appearance of Facebook,various research works have been emerging,which help us look inside the OSN.We firstly summarized the development of OSN and its challenges.Then we categorized and evaluated the research work in four aspects including measurement technolo-gy,user behaviors analysis,information dissemination and user privacy.Finally,we summarized the problems of current work and the prospects of future research topics.The purpose of this paper is to provide some enlightenment for researches of this field.

Key words: OSN,Data measurement,User behavior analysis,Information dissemination,User privacy

[1] Chau D H,Pandit S,Wang S,et al.Parallel crawling for online social networks[C]∥Proceedings of the 16th International Conference on World Wide Web.ACM,2007:1283-1284
[2] 胡亚楠.社交网络获取技术与实现[D].哈尔滨:哈尔滨工业大学,2011 HuYa-nan.Social network data acquisition technology and implementation[D].Harbin:HIT Unversity,2011
[3] Gjoka M,Butts C T,Kurant M,et al.Multigraph sampling of online social networks[J].IEEE Journal on Selected Areas in Communications,2011,29(9):1893-1905
[4] Jin L,Chen Y,Hui P,et al.Albatross sampling:robust and effective hybrid vertex sampling for social graphs[C]∥Procee-dings of the 3rd ACM International Workshop on MobiArch.ACM,2011:11-16
[5] Ye S,Lang J,Wu F.Crawling online social graphs[C]∥ 2010 12th International Asia-Pacific Web Conference (APWEB).IEEE,2010:236-242
[6] Ribeiro B,Towsley D.Estimating and sampling graphs withmultidimensional random walks[C]∥Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement.ACM,2010:390-403
[7] Benevenuto F,Rodrigues T,Cha M,et al.Characterizing userbehavior in online social networks[C]∥Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference.ACM,2009:49-62
[8] Schneider F,Feldmann A,Krishnamurthy B,et al.Understan-ding online social network usage from a network perspective[C]∥Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement.ACM,2009:35-48
[9] Jiang J,Wilson C,Wang X,et al.Understanding latent interactions in online social networks[J].ACM Transactions on the Web (TWEB),2013,7(4):18
[10] Viswanath B,Mislove A,Cha M,et al.On the evolution of user interaction in facebook[C]∥Proceedings of the 2nd ACM Workshop on Online Social Networks.ACM,2009:37-42
[11] Hansen D,Shneiderman B,Smith M A.Analyzing social media networks with NodeXL:Insights from a connected world[M].Morgan Kaufmann,2010
[12] Leskovec J,McGlohon M,Faloutsos C,et al.Patterns of Cascading behavior in large blog graphs[C]∥SDM.2007:551-556
[13] Cha M,Mislove A,Gummadi K P.A measurement-driven analysis of information propagation in the flickr social network[C]∥Proceedings of the 18th International Conference on World Wide Web.ACM,2009:721-730
[14] Galuba W,Aberer K,Chakraborty D,et al.Outtweeting thetwitterers-predicting information cascades in microblogs[C]∥Proceedings of the 3rd Conference on Online Social Networks.2010:3
[15] Leskovec J,McGlohon M,Faloutsos C,et al.Cascading Behavion in Large Blog Graphs Patterns and a Model[R].0704.2803.arxiv,2007
[16] Liu D,Chen X.Rumor propagation in online social networks like twitter--a simulation study[C]∥ 2011 Third International Conference on Multimedia Information Networking and Security (MINES).IEEE,2011:278-282
[17] Krishnamurthy B,Wills C E.Characterizing privacy in online social networks[C]∥Proceedings of the First Workshop on Online Social Networks.ACM,2008:37-42
[18] Mondal M,Viswanath B,Clement A,et al.Limiting large-scale crawls of social networking sites[J].ACM SIGCOMM Computer Communication Review,2011,41(4):398-399
[19] Huber M,Mulazzani M,Weippl E.Social networking sites security:Quo Vadis[C]∥IEEE International Conference on Social Computing/IEEE International Conference on Privacy,Security,Risk and Trust.IEEE,2010:1117-1122
[20] 孙剑,朱晓妍,刘沫盟,等.社交网络中的安全隐私问题研究[J].网络安全技术与应用,2011 (10):76-79 Sun Jian,Zhu X Y,LIU M M ,et al.Privacy Issues of Social Network[J].Network Security Technology &Application ,2011 (10):76-79
[21] Viswanath B,Post A,Gummadi K P,et al.An analysis of social network-based sybil defenses[J].ACM SIGCOMM Computer Communication Review,2011,41(4):363-374
[22] Yang Z,Wilson C,Wang X,et al.Uncovering social network sybils in the wild[J].ACM Transactions on Knowledge Disco-very from Data (TKDD),2014,8(1):2
[23] Baden R,Bender A,Spring N,et al.Persona:an online socialnetwork with user-defined privacy[J].ACM SIGCOMM Computer Communication Review,2009,39(4):135-146
[24] 冯典.面向微博的数据采集和分析系统的设计与实现[D].北京:北京邮电大学,2011 Feng Dian.The design and implementation of the data acquisition and analysis system for micro-blog[D].Beijing:Beijing University of Posts and Telecommunications,2011
[25] CNpameng.Weibo-Crowdsourcing-CNpameng[EB/OL].http://www.cnpameng.com/
[26] Chau D H,Pandit S,Wang S,et al.Parallel crawling for online social networks[C]∥Proceedings of the 16th international conference on World Wide Web.ACM,2007:1283-1284
[27] 程锦佳.基于Hadoop的分布式爬虫及其实现[D].北京:北京邮电大学,2010 Cheng Jin-jia.Research and implementation of distributed web crawl based on Hadoop architecture[D].Beijing:Beijing University of Posts and Telecommunications,2010
[28] 李娜娜.云计算平台下社交网络数据获取技术研究[D].北京:北京邮电大学,2013 Li Na-na.Research on data acquisition technology of social network under cloud computing platform[D].Beijing:Beijing University of Posts and Telecommunications,2013
[29] 袁小节.基于协议驱动与事件驱动的综合聚焦爬虫研究与实现[D].长沙:国防科技大学,2009 Yuan Xiao-Jie.Research and Implementation of a Combined Focused Crawler based on Protocol-Driven and Event-Driven Crawling Techniques[D].Changsha:National Defense Science and Technology University,2009
[30] 曾伟辉.支持AJAX的网络爬虫系统设计与实现[D].合肥:中国科学技术大学,2009 Zeng Wei-hui.Design and Implementation of a Web Crawler System Supported AJAX[D].Hefei:University of Science and Technology of China,2009
[31] 夏天.Ajax站点数据采集研究综述[J].现代图书情报技术,2010(3):52-57 Xia Tian.Overview of Research on Data Collection from Ajax Sites[J].New Technology of Library and Information Service,2010(3):52-57
[32] Mislove A,Marcon M,Gummadi K P,et al.Measurement and analysis of online social networks[C]∥Proceedings of the 7th ACM SIGCOMM conference on Internet measurement.ACM,2007:29-42
[33] Wang D,Li Z,Xie G.Towards unbiased sampling of online social networks[C]∥2011 IEEE International Conference on Communications (ICC).IEEE,2011:1-5
[34] Wang T,Chen Y,Zhang Z,et al.Unbiased sampling in directed social graph[J].ACM SIGCOMM Computer Communication Review,2011,41(4):401-402
[35] Gjoka M,Kurant M,Butts C T,et al.Walking in Facebook:A case study of unbiased sampling of OSNs[C]∥ 2010 Procee-dings IEEE INFOCOM.IEEE,2010:1-9
[36] Chun H,Kwak H,Eom Y H,et al.Comparison of online social relations in volume vs interaction:a case study of cyworld[C]∥Proceedings of the 8th ACM SIGCOMM conference on Internet Measurement.ACM,2008:57-70
[37] Wilson C,Boe B,Sala A,et al.User interactions in social net-works and their implications[C]∥Proceedings of the 4th ACM European conference on Computer systems.ACM,2009:205-218
[38] Guo Z,Li Z,Tu H.Sina microblog:an information-driven online social network[C]∥2011 International Conference on Cyberworlds (CW).IEEE,2011:160-167
[39] Wu X,Wang J.How about micro-blogging service in China:analysis and mining on sina micro-blog[C]∥Proceedings of 1st international symposium on From digital footprints to social and community intelligence.ACM,2011:37-42
[40] Saito K,Kimura M,Ohara K,et al.Selecting information diffusion models over social networks for behavioral analysis[M]∥Machine Learning and Knowledge Discovery in Databases.Springer Berlin Heidelberg,2010:180-195
[41] Yang J,Counts S.Predicting the Speed,Scale,and Range of Information Diffusion in Twitter[J].ICWSM,2010,10:355-358
[42] Guille A,Hacid H.A predictive model for the temporal dynamics of information diffusion in online social networks[C]∥Proceedings of the 21st international conference companion on World Wide Web.ACM,2012:1145-1152
[43] Brin S,Page L.The anatomy of a large-scale hypertextual web search engine,1998[C]∥Proceedings of the Seventh World Wide Web Conference.2007
[44] Weng J,Lim E P,Jiang J,et al.Twitterrank:finding topic-sensitive influential twitterers[C]∥Proceedings of the third ACM international conference on Web search and data mining.ACM,2010:261-270
[45] Saez-Trumper D,Comarela G,Almeida V,et al.Finding trend-setters in information networks[C]∥Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining.ACM,2012:1014-1022
[46] Liu Y,Gummadi K P,Krishnamurthy B,et al.Analyzing facebook privacy settings:user expectations vs.reality[C]∥Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference.ACM,2011:61-70
[47] Joshi P,Kuo C C J.Security and privacy in online social net-works:A survey[C]∥ 2011 IEEE International Conference on Multimedia and Expo (ICME).IEEE,2011:1-6
[48] Yu H,Kaminsky M,Gibbons P B,et al.Sybilguard:defending against sybil attacks via social networks[J].ACM SIGCOMM Computer Communication Review,2006,36(4):267-278
[49] Yu H,Gibbons P B,Kaminsky M,et al.Sybillimit:A near-optimal social network defense against sybil attacks[C]∥ IEEE Symposium on Security and Privacy,2008.IEEE,2008:3-17
[50] Danezis G,Mittal P.SybilInfer:Detecting Sybil Nodes using Social Networks[C]∥NDSS.2009
[51] Tran D N,Min B,Li J,et al.Sybil-Resilient Online Content Vo-ting[J].NSDI.2009,9(1):15-28
[52] Cao Q,Sirivianos M,Yang X,et al.Aiding the detection of fake accounts in large scale social online services[C]∥Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation.USENIX Association,2012:15-18
[53] Conti M,Hasani A,Crispo B.Virtual private social networks[C]∥Proceedings of the first ACM conference on Data and application security and privacy.ACM,2011:39-50
[54] Masoumzadeh A,Joshi J.Osnac:An ontology-based access control model for social networking systems[C]∥ 2010 IEEE Se-cond International Conference on Social Computing (SocialCom).IEEE,2010:751-759
[55] Barbian G.Assessing trust by disclosure in online social net-works[C]∥ 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM).IEEE,2011:163-170
[56] 鲍捷,程久军.基于社交网络的群体信任算法[J].计算机科学,2012,39(2):38-41 Bao Jie,Cheng J J.Group Trust Algorithm based on Online Social Network[J].Computer Science,2012 ,39(2):38-41
[57] 乔秀全,杨春,李晓峰,等.社交网络服务中一种基于用户上下文的信任度计算方法[J].计算机学报,2011,34(12):2403-2413 Qiao X Q,Yang Chun,Li X F,et al.Trust Model based on user context in Online Socail Network[J].Chinese Journal of Computers,2011,34(12):2403-2413
[58] Nazir A,Raza S,Gupta D,et al.Network level footprints of facebook applications[C]∥Proceedings of the 9th ACM SIGCOMM conference on Internet measurement.ACM,2009:63-75
[59] Nazir A,Raza S,Chuah C N.Unveiling facebook:a measurement study of social network based applications[C]∥Proceedings of the 8th ACM SIGCOMM conference on Internet measurement.ACM,2008:43-56
[60] Gjoka M,Sirivianos M,Markopoulou A,et al.Poking facebook:characterization of osn applications[C]∥Proceedings of the first workshop on Online social networks.ACM,2008:31-36
[61] 张晨逸,孙建伶,丁轶群.基于 MB-LDA 模型的微博主题挖掘[J].计算机研究与发展,2011,48(10):1795-1802 Zhang C Y,Sun J L,Ding Y Q.TopicMining of WeiBo Based on MB-LDA Model[J].Journal of Computer Research and Deve-lopment,2011,8(10):1795-1802
[62] Mao H,Counts S,Bollen J.Predicting financial markets:Comparing survey,news,twitter and search engine data[J].arXiv preprint arXiv:1112.1051,2011
[63] Bhat S Y,Abulaish M.A density-based approach for mining overlapping communities from social network interactions[C]∥Proceedings of the 2nd International Conference on Web Intelligence,Mining and Semantics.ACM,2012:9
[64] Sachan M,Contractor D,Faruquie T A,et al.Using content and interactions for discovering communities in social networks[C]∥Proceedings of the 21st international conference on World Wide Web.ACM,2012:331-340
[65] Sharma R,Datta A.Supernova:Super-peers based architecture for decentralized online social networks[C]∥ 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS).IEEE,2012:1-10
[66] Ye S,Wu S F.Estimating the size of online social networks[J].International Journal of Social Computing and Cyber-Physical Systems,2011,1(2):160-179
[67] Kurant M,Markopoulou A,Thiran P.On the bias of bfs(breadth first search)[C]∥ 2010 22nd International Teletraffic Congress (ITC).IEEE,2010:1-8
[68] Bonneau J,Anderson J,Danezis G.Prying data out of a social network[C]∥ International Conference on Advances in Social Network Analysis and Mining,2009(ASONAM’09).IEEE,2009:249-254
[69] Kurant M,Gjoka M,Butts C T,et al.Walking on a graph with a magnifying glass:stratified sampling via weighted random walks[C]∥Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems.ACM,2011:281-292
[70] Valafar M,Rejaie R,Willinger W.Beyond friendship graphs:a study of user interactions in Flickr[C]∥Proceedings of the 2nd ACM workshop on Online social networks.ACM,2009:25-30
[71] Yang J,Leskovec J.Modeling information diffusion in implicit networks[C]∥ 2010 IEEE 10th International Conference on Data Mining (ICDM).IEEE,2010:599-608
[72] Bakshy E,Rosenn I,Marlow C,et al.The role of social networks in information diffusion[C]∥Proceedings of the 21st international conference on World Wide Web.ACM,2012:519-528
[73] Tang S,Yuan J,Mao X,et al.Relationship classification in large scale online social networks and its impact on information propagation[C]∥ 2011 Proceedings IEEE INFOCOM.IEEE,2011:2291-2299
[74] Hansen D L,Johnson C.Veiled viral marketing:disseminating information on stigmatized illnesses via social networking sites[C]∥Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium.ACM,2012:247-254
[75] Alahakoon T,Tripathi R,Kourtellis N,et al.K-path centrality:A new centrality measure in social networks[C]∥Proceedings of the 4th Workshop on Social Network Systems.ACM,2011:1-6
[76] Burke M,Kraut R,Marlow C.Social capital on Facebook:Diffe-rentiating uses and users[C]∥Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM,2011:571-580
[77] 张彦超,刘云,张海峰,等.基于在线社交网络的信息传播模型[J].物理学报,2011,60(5):60-66 Zhang Y C,Liu Yun,Zhang H F ,et al.Information diffusion Model based on Online Social Network[J].Acta Phys.Sin,2011,60(5):60-66
[78] Mohaisen A,Yun A,Kim Y.Measuring the mixing time of social graphs[C]∥Proceedings of the 10th ACM SIGCOMM Confe-rence on Internet Measurement.ACM,2010:383-389
[79] Squicciarini A C,Shehab M,Paci F.Collective privacy management in social networks[C]∥Proceedings of the 18th International Conference on World Wide Web.ACM,2009:521-530
[80] 徐婕,康慕宁,董谷音.基于社交网络的实时搜索引擎的排序算法研究[J].科学技术与工程,2011,11(28):6879-6882 Xu Jie,Kang M N,Dong G Y.Sequencing Algorithm Based on the Social Network Real-time Search Engine[J].Science Technology and Engineering,2011,11(28):6879-6882

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!