Computer Science ›› 2015, Vol. 42 ›› Issue (11): 8-21.doi: 10.11896/j.issn.1002-137X.2015.11.002

Previous Articles     Next Articles

Research on Online Social Network

LI Li-yao, SUN Lu-jing and YANG Jia-hai   

  • Online:2018-11-14 Published:2018-11-14

Abstract: The online social network (OSN) has become the most popular application in the Web2.0 age.Its services have extended from social relationship management to media information,application integration and e-commerce.With its huge amounts of active users,OSN has played a critical role in the academic research area such as online behavior,data security,information diffusion and other interdisciplinary studies.Since the appearance of Facebook,various research works have been emerging,which help us look inside the OSN.We firstly summarized the development of OSN and its challenges.Then we categorized and evaluated the research work in four aspects including measurement technolo-gy,user behaviors analysis,information dissemination and user privacy.Finally,we summarized the problems of current work and the prospects of future research topics.The purpose of this paper is to provide some enlightenment for researches of this field.

Key words: OSN,Data measurement,User behavior analysis,Information dissemination,User privacy

[1] Chau D H,Pandit S,Wang S,et al.Parallel crawling for online social networks[C]∥Proceedings of the 16th International Conference on World Wide Web.ACM,2007:1283-1284
[2] 胡亚楠.社交网络获取技术与实现[D].哈尔滨:哈尔滨工业大学,2011 HuYa-nan.Social network data acquisition technology and implementation[D].Harbin:HIT Unversity,2011
[3] Gjoka M,Butts C T,Kurant M,et al.Multigraph sampling of online social networks[J].IEEE Journal on Selected Areas in Communications,2011,29(9):1893-1905
[4] Jin L,Chen Y,Hui P,et al.Albatross sampling:robust and effective hybrid vertex sampling for social graphs[C]∥Procee-dings of the 3rd ACM International Workshop on MobiArch.ACM,2011:11-16
[5] Ye S,Lang J,Wu F.Crawling online social graphs[C]∥ 2010 12th International Asia-Pacific Web Conference (APWEB).IEEE,2010:236-242
[6] Ribeiro B,Towsley D.Estimating and sampling graphs withmultidimensional random walks[C]∥Proceedings of the 10th ACM SIGCOMM Conference on Internet Measurement.ACM,2010:390-403
[7] Benevenuto F,Rodrigues T,Cha M,et al.Characterizing userbehavior in online social networks[C]∥Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement Conference.ACM,2009:49-62
[8] Schneider F,Feldmann A,Krishnamurthy B,et al.Understan-ding online social network usage from a network perspective[C]∥Proceedings of the 9th ACM SIGCOMM Conference on Internet Measurement.ACM,2009:35-48
[9] Jiang J,Wilson C,Wang X,et al.Understanding latent interactions in online social networks[J].ACM Transactions on the Web (TWEB),2013,7(4):18
[10] Viswanath B,Mislove A,Cha M,et al.On the evolution of user interaction in facebook[C]∥Proceedings of the 2nd ACM Workshop on Online Social Networks.ACM,2009:37-42
[11] Hansen D,Shneiderman B,Smith M A.Analyzing social media networks with NodeXL:Insights from a connected world[M].Morgan Kaufmann,2010
[12] Leskovec J,McGlohon M,Faloutsos C,et al.Patterns of Cascading behavior in large blog graphs[C]∥SDM.2007:551-556
[13] Cha M,Mislove A,Gummadi K P.A measurement-driven analysis of information propagation in the flickr social network[C]∥Proceedings of the 18th International Conference on World Wide Web.ACM,2009:721-730
[14] Galuba W,Aberer K,Chakraborty D,et al.Outtweeting thetwitterers-predicting information cascades in microblogs[C]∥Proceedings of the 3rd Conference on Online Social Networks.2010:3
[15] Leskovec J,McGlohon M,Faloutsos C,et al.Cascading Behavion in Large Blog Graphs Patterns and a Model[R].0704.2803.arxiv,2007
[16] Liu D,Chen X.Rumor propagation in online social networks like twitter--a simulation study[C]∥ 2011 Third International Conference on Multimedia Information Networking and Security (MINES).IEEE,2011:278-282
[17] Krishnamurthy B,Wills C E.Characterizing privacy in online social networks[C]∥Proceedings of the First Workshop on Online Social Networks.ACM,2008:37-42
[18] Mondal M,Viswanath B,Clement A,et al.Limiting large-scale crawls of social networking sites[J].ACM SIGCOMM Computer Communication Review,2011,41(4):398-399
[19] Huber M,Mulazzani M,Weippl E.Social networking sites security:Quo Vadis[C]∥IEEE International Conference on Social Computing/IEEE International Conference on Privacy,Security,Risk and Trust.IEEE,2010:1117-1122
[20] 孙剑,朱晓妍,刘沫盟,等.社交网络中的安全隐私问题研究[J].网络安全技术与应用,2011 (10):76-79 Sun Jian,Zhu X Y,LIU M M ,et al.Privacy Issues of Social Network[J].Network Security Technology &Application ,2011 (10):76-79
[21] Viswanath B,Post A,Gummadi K P,et al.An analysis of social network-based sybil defenses[J].ACM SIGCOMM Computer Communication Review,2011,41(4):363-374
[22] Yang Z,Wilson C,Wang X,et al.Uncovering social network sybils in the wild[J].ACM Transactions on Knowledge Disco-very from Data (TKDD),2014,8(1):2
[23] Baden R,Bender A,Spring N,et al.Persona:an online socialnetwork with user-defined privacy[J].ACM SIGCOMM Computer Communication Review,2009,39(4):135-146
[24] 冯典.面向微博的数据采集和分析系统的设计与实现[D].北京:北京邮电大学,2011 Feng Dian.The design and implementation of the data acquisition and analysis system for micro-blog[D].Beijing:Beijing University of Posts and Telecommunications,2011
[25] CNpameng.Weibo-Crowdsourcing-CNpameng[EB/OL].http://www.cnpameng.com/
[26] Chau D H,Pandit S,Wang S,et al.Parallel crawling for online social networks[C]∥Proceedings of the 16th international conference on World Wide Web.ACM,2007:1283-1284
[27] 程锦佳.基于Hadoop的分布式爬虫及其实现[D].北京:北京邮电大学,2010 Cheng Jin-jia.Research and implementation of distributed web crawl based on Hadoop architecture[D].Beijing:Beijing University of Posts and Telecommunications,2010
[28] 李娜娜.云计算平台下社交网络数据获取技术研究[D].北京:北京邮电大学,2013 Li Na-na.Research on data acquisition technology of social network under cloud computing platform[D].Beijing:Beijing University of Posts and Telecommunications,2013
[29] 袁小节.基于协议驱动与事件驱动的综合聚焦爬虫研究与实现[D].长沙:国防科技大学,2009 Yuan Xiao-Jie.Research and Implementation of a Combined Focused Crawler based on Protocol-Driven and Event-Driven Crawling Techniques[D].Changsha:National Defense Science and Technology University,2009
[30] 曾伟辉.支持AJAX的网络爬虫系统设计与实现[D].合肥:中国科学技术大学,2009 Zeng Wei-hui.Design and Implementation of a Web Crawler System Supported AJAX[D].Hefei:University of Science and Technology of China,2009
[31] 夏天.Ajax站点数据采集研究综述[J].现代图书情报技术,2010(3):52-57 Xia Tian.Overview of Research on Data Collection from Ajax Sites[J].New Technology of Library and Information Service,2010(3):52-57
[32] Mislove A,Marcon M,Gummadi K P,et al.Measurement and analysis of online social networks[C]∥Proceedings of the 7th ACM SIGCOMM conference on Internet measurement.ACM,2007:29-42
[33] Wang D,Li Z,Xie G.Towards unbiased sampling of online social networks[C]∥2011 IEEE International Conference on Communications (ICC).IEEE,2011:1-5
[34] Wang T,Chen Y,Zhang Z,et al.Unbiased sampling in directed social graph[J].ACM SIGCOMM Computer Communication Review,2011,41(4):401-402
[35] Gjoka M,Kurant M,Butts C T,et al.Walking in Facebook:A case study of unbiased sampling of OSNs[C]∥ 2010 Procee-dings IEEE INFOCOM.IEEE,2010:1-9
[36] Chun H,Kwak H,Eom Y H,et al.Comparison of online social relations in volume vs interaction:a case study of cyworld[C]∥Proceedings of the 8th ACM SIGCOMM conference on Internet Measurement.ACM,2008:57-70
[37] Wilson C,Boe B,Sala A,et al.User interactions in social net-works and their implications[C]∥Proceedings of the 4th ACM European conference on Computer systems.ACM,2009:205-218
[38] Guo Z,Li Z,Tu H.Sina microblog:an information-driven online social network[C]∥2011 International Conference on Cyberworlds (CW).IEEE,2011:160-167
[39] Wu X,Wang J.How about micro-blogging service in China:analysis and mining on sina micro-blog[C]∥Proceedings of 1st international symposium on From digital footprints to social and community intelligence.ACM,2011:37-42
[40] Saito K,Kimura M,Ohara K,et al.Selecting information diffusion models over social networks for behavioral analysis[M]∥Machine Learning and Knowledge Discovery in Databases.Springer Berlin Heidelberg,2010:180-195
[41] Yang J,Counts S.Predicting the Speed,Scale,and Range of Information Diffusion in Twitter[J].ICWSM,2010,10:355-358
[42] Guille A,Hacid H.A predictive model for the temporal dynamics of information diffusion in online social networks[C]∥Proceedings of the 21st international conference companion on World Wide Web.ACM,2012:1145-1152
[43] Brin S,Page L.The anatomy of a large-scale hypertextual web search engine,1998[C]∥Proceedings of the Seventh World Wide Web Conference.2007
[44] Weng J,Lim E P,Jiang J,et al.Twitterrank:finding topic-sensitive influential twitterers[C]∥Proceedings of the third ACM international conference on Web search and data mining.ACM,2010:261-270
[45] Saez-Trumper D,Comarela G,Almeida V,et al.Finding trend-setters in information networks[C]∥Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining.ACM,2012:1014-1022
[46] Liu Y,Gummadi K P,Krishnamurthy B,et al.Analyzing facebook privacy settings:user expectations vs.reality[C]∥Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference.ACM,2011:61-70
[47] Joshi P,Kuo C C J.Security and privacy in online social net-works:A survey[C]∥ 2011 IEEE International Conference on Multimedia and Expo (ICME).IEEE,2011:1-6
[48] Yu H,Kaminsky M,Gibbons P B,et al.Sybilguard:defending against sybil attacks via social networks[J].ACM SIGCOMM Computer Communication Review,2006,36(4):267-278
[49] Yu H,Gibbons P B,Kaminsky M,et al.Sybillimit:A near-optimal social network defense against sybil attacks[C]∥ IEEE Symposium on Security and Privacy,2008.IEEE,2008:3-17
[50] Danezis G,Mittal P.SybilInfer:Detecting Sybil Nodes using Social Networks[C]∥NDSS.2009
[51] Tran D N,Min B,Li J,et al.Sybil-Resilient Online Content Vo-ting[J].NSDI.2009,9(1):15-28
[52] Cao Q,Sirivianos M,Yang X,et al.Aiding the detection of fake accounts in large scale social online services[C]∥Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation.USENIX Association,2012:15-18
[53] Conti M,Hasani A,Crispo B.Virtual private social networks[C]∥Proceedings of the first ACM conference on Data and application security and privacy.ACM,2011:39-50
[54] Masoumzadeh A,Joshi J.Osnac:An ontology-based access control model for social networking systems[C]∥ 2010 IEEE Se-cond International Conference on Social Computing (SocialCom).IEEE,2010:751-759
[55] Barbian G.Assessing trust by disclosure in online social net-works[C]∥ 2011 International Conference on Advances in Social Networks Analysis and Mining (ASONAM).IEEE,2011:163-170
[56] 鲍捷,程久军.基于社交网络的群体信任算法[J].计算机科学,2012,39(2):38-41 Bao Jie,Cheng J J.Group Trust Algorithm based on Online Social Network[J].Computer Science,2012 ,39(2):38-41
[57] 乔秀全,杨春,李晓峰,等.社交网络服务中一种基于用户上下文的信任度计算方法[J].计算机学报,2011,34(12):2403-2413 Qiao X Q,Yang Chun,Li X F,et al.Trust Model based on user context in Online Socail Network[J].Chinese Journal of Computers,2011,34(12):2403-2413
[58] Nazir A,Raza S,Gupta D,et al.Network level footprints of facebook applications[C]∥Proceedings of the 9th ACM SIGCOMM conference on Internet measurement.ACM,2009:63-75
[59] Nazir A,Raza S,Chuah C N.Unveiling facebook:a measurement study of social network based applications[C]∥Proceedings of the 8th ACM SIGCOMM conference on Internet measurement.ACM,2008:43-56
[60] Gjoka M,Sirivianos M,Markopoulou A,et al.Poking facebook:characterization of osn applications[C]∥Proceedings of the first workshop on Online social networks.ACM,2008:31-36
[61] 张晨逸,孙建伶,丁轶群.基于 MB-LDA 模型的微博主题挖掘[J].计算机研究与发展,2011,48(10):1795-1802 Zhang C Y,Sun J L,Ding Y Q.TopicMining of WeiBo Based on MB-LDA Model[J].Journal of Computer Research and Deve-lopment,2011,8(10):1795-1802
[62] Mao H,Counts S,Bollen J.Predicting financial markets:Comparing survey,news,twitter and search engine data[J].arXiv preprint arXiv:1112.1051,2011
[63] Bhat S Y,Abulaish M.A density-based approach for mining overlapping communities from social network interactions[C]∥Proceedings of the 2nd International Conference on Web Intelligence,Mining and Semantics.ACM,2012:9
[64] Sachan M,Contractor D,Faruquie T A,et al.Using content and interactions for discovering communities in social networks[C]∥Proceedings of the 21st international conference on World Wide Web.ACM,2012:331-340
[65] Sharma R,Datta A.Supernova:Super-peers based architecture for decentralized online social networks[C]∥ 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS).IEEE,2012:1-10
[66] Ye S,Wu S F.Estimating the size of online social networks[J].International Journal of Social Computing and Cyber-Physical Systems,2011,1(2):160-179
[67] Kurant M,Markopoulou A,Thiran P.On the bias of bfs(breadth first search)[C]∥ 2010 22nd International Teletraffic Congress (ITC).IEEE,2010:1-8
[68] Bonneau J,Anderson J,Danezis G.Prying data out of a social network[C]∥ International Conference on Advances in Social Network Analysis and Mining,2009(ASONAM’09).IEEE,2009:249-254
[69] Kurant M,Gjoka M,Butts C T,et al.Walking on a graph with a magnifying glass:stratified sampling via weighted random walks[C]∥Proceedings of the ACM SIGMETRICS joint international conference on Measurement and modeling of computer systems.ACM,2011:281-292
[70] Valafar M,Rejaie R,Willinger W.Beyond friendship graphs:a study of user interactions in Flickr[C]∥Proceedings of the 2nd ACM workshop on Online social networks.ACM,2009:25-30
[71] Yang J,Leskovec J.Modeling information diffusion in implicit networks[C]∥ 2010 IEEE 10th International Conference on Data Mining (ICDM).IEEE,2010:599-608
[72] Bakshy E,Rosenn I,Marlow C,et al.The role of social networks in information diffusion[C]∥Proceedings of the 21st international conference on World Wide Web.ACM,2012:519-528
[73] Tang S,Yuan J,Mao X,et al.Relationship classification in large scale online social networks and its impact on information propagation[C]∥ 2011 Proceedings IEEE INFOCOM.IEEE,2011:2291-2299
[74] Hansen D L,Johnson C.Veiled viral marketing:disseminating information on stigmatized illnesses via social networking sites[C]∥Proceedings of the 2nd ACM SIGHIT International Health Informatics Symposium.ACM,2012:247-254
[75] Alahakoon T,Tripathi R,Kourtellis N,et al.K-path centrality:A new centrality measure in social networks[C]∥Proceedings of the 4th Workshop on Social Network Systems.ACM,2011:1-6
[76] Burke M,Kraut R,Marlow C.Social capital on Facebook:Diffe-rentiating uses and users[C]∥Proceedings of the SIGCHI Conference on Human Factors in Computing Systems.ACM,2011:571-580
[77] 张彦超,刘云,张海峰,等.基于在线社交网络的信息传播模型[J].物理学报,2011,60(5):60-66 Zhang Y C,Liu Yun,Zhang H F ,et al.Information diffusion Model based on Online Social Network[J].Acta Phys.Sin,2011,60(5):60-66
[78] Mohaisen A,Yun A,Kim Y.Measuring the mixing time of social graphs[C]∥Proceedings of the 10th ACM SIGCOMM Confe-rence on Internet Measurement.ACM,2010:383-389
[79] Squicciarini A C,Shehab M,Paci F.Collective privacy management in social networks[C]∥Proceedings of the 18th International Conference on World Wide Web.ACM,2009:521-530
[80] 徐婕,康慕宁,董谷音.基于社交网络的实时搜索引擎的排序算法研究[J].科学技术与工程,2011,11(28):6879-6882 Xu Jie,Kang M N,Dong G Y.Sequencing Algorithm Based on the Social Network Real-time Search Engine[J].Science Technology and Engineering,2011,11(28):6879-6882

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!