SlideShare a Scribd company logo
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 50
INTEGRATED HETEROGENEOUS SOCIAL NETWORKING SITES
Kirti Jadhav1
, Kiran Esave2
, Bhakti Gholap3
, M. G. Devikar4
1
Student, MESCOE – Pune, State-Maharashtra, Country-India
2
Student, MESCOE – Pune, State-Maharashtra, Country-India
3
Student, MESCOE – Pune, State-Maharashtra, Country-India
4
Professor, MESCOE – Pune, State-Maharashtra, Country-India
Abstract
The growth of Social Network Sites (SNSs) have opened the opportunity for researchers to explore a large amount of social and
behavioral data. The heterogeneity of SNSs offer more seamless services across SNSs and also offers integrated SNSs. The aim of
the system is to integrate the heterogeneous SNSs. The P2P-iSN allows users from heterogeneous SNSs to communicate without
involving the SNS they have registered with. In proposed system architecture, Global Relationship Model (GRM) is used to
capture the relationship strength, and i-Search, to find the optimal social path with less time between any two users who are
meaningfully connected in heterogeneous SNSs. With the P2P-iSN, SNS developers can design more effective user-centric SNS
application. All SNS user uses different services of different SNS on a single platform, and maintain relationship globally.
Keywords—SNS , GRM , OpenID , GlobalID, i-search
--------------------------------------------------------------------***------------------------------------------------------------------
1. INTRODUCTION
Today Social Networking Sites (SNS) have become a part of
our day to day life. They helped us to make the world
smaller and integrated with each other. There are many SNS
available today and many more are piling each day [2]. Thus
users use many SNSs to share data with friends and family.
As a result, a user may register with multiple SNSs for
different social network applications, carry multiple SNS
accounts, interact with contacts from different SNSs, publish
and access different web contents, and share contents within
each SNS community. While SNSs offer different services,
one key feature shared among SNSs is how they are built
around users and users’ existing social networks [3], [4]. Yet
each SNS is isolated, so users manage their profiles and
build relationship separately on different SNSs. The content
for the same user in different SNSs may overlap, so it
becomes a burden for users to manage contents across
different SNSs.
With growing influence and complexity of SNSs,
researchers have been developing methods to connect users
and aggregating data across SNSs so that each SNS no
longer stands alone. Here, we propose system architecture to
integrate heterogeneous SNSs and maintain the social
relationships among a large number of users across
heterogeneous SNSs. For example, imagine that within an
SNS user b is in user a’s friend list. There is a directional
social link denoted by “a → b” from user a to user b. When
there exists a social path between two users in an SNS, then
there is a “relationship” between these two users. We say
that there is a “global relationship” from user a and user b if
there is a social path from a to b over heterogeneous SNSs.
By identifying “global relationship” among users over
heterogeneous SNSs, the system allows different SNSs to
interconnect with various networks. Integrated
heterogeneous SNSs provide different services of different
SNSs over a single platform and establishes path between
two users with less time.
Fig .1 System architecture of the proposed P2P-iSN.
In above figure the operations over P2P-iSN. When a peer
node is turned on, it reports to the index peer node the online
status, which consists of its ID and IP address of the peer
node. Upon receiving the online status, the index peer node
updates the online status for the peer node.
If a user a of the peer node na and a user b of the peer node
nb are on each other’s friend list in a SNS, and na and nb
are turned on, these two online peer nodes can communicate
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 51
with each other by using the corresponding IP addresses
queried from the index peer node. The peer nodes can
establish social paths among users from different SNSs and
build the so-defined “global relationship.”
With the peer-to-peer network architecture, P2P-iSN allows
users from heterogeneous SNSs to communicate without
involving any specific SNS, and the integration is
independent of any specific SNS. By applying P2P-iSN, we
develop a Global Relationship Model to assess the strength
of the global relationship between two users from
heterogeneous SNSs. Based on the global relationship
model, we propose a searching mechanism, namely i-
Search, to find the social path between two users from
heterogeneous SNSs.
2. P2P-iSN
In this section, we propose a peer-to-peer architecture,
namely P2P-iSN, to integrate heterogeneous SNSs. P2P-iSN
consists of two kinds of nodes: peer nodes and index peer
nodes.
2.1 Peer Node
A peer node is installed on an end device for a user to access
SNSs, and its main functionality is to integrate
heterogeneous SNSs. The user of a peer node may register
to one or more SNSs on his end-device, and possibly login
to one or more SNSs at the same time. To associate these
different accounts of the same user from heterogeneous
SNSs, a unique user ID may be required. The concept
known as OpenID [6] can serve this purpose although any
other uniquely identifiable ID can be used. A unique user ID
can be some kind of authenticated information like user’s
cell phone number or verifiable email address. The main
functionality of a peer node is to integrate the heterogeneous
SNSs through the Friend List maintenance. Peer nodes
communicate with each other directly and form a peer-to-
peer network. The phone book in a peer node (e.g., Jenny’s
end device) is used as the base to integrate heterogeneous
SNSs. Take Fig. 2a as an example. Jenny has a friend John
with phone number “0910456.”
A database, friend list, is maintained to store the information
about a user’s friends. Figure 2b shows the format of a
friend list. The friend list consists of three kinds of
information: personal information, social network
information, and address information.
Personal information field stores the IDs of the user’s
friends, including the ID in SNS, phone number, and email
address. In different SNSs, users may use different IDs. As
shown in Fig. 2b, for example, Jenny’s friend, John, uses the
ID, “John_f”, on Facebook™ and use the ID, “John_t”, on
Twitter™). The phone number associates the entry in the
phone book with the entry in the friend list. An entry in the
phone book may be mapped to multiple entries in the friend
list.
Social Network Information field consists of four
subfields, including SN Type, T Value, Timestamp, and
Online. The SNS Type indicates which SNS the friend has
registered. For example, in Figure 2b, Jenny’s friend, John,
registered to Facebook™ using ID “John_f.” The T Value
stores the result calculated by using Eq. 1 in the global
relationship model that will be elaborated later, indicating
the frequency that a user performs some kind of social
activities on his friend (e.g., Jenny posts a comment, click a
“Like”, or send a message on John’s wall in Facebook™).
Fig.2 An example of friend list; a)Jenny’s phone book; b)
Jenny’s friend list
For example, in (1) in Figure 2b, the T Value for Jenny
←John on Facebook™ is 0.9. The Timestamp field stores
the time when the T Value was calculated. The Online
indicates that whether the friend is on the SNS now or not
and when John logins to the Facebook™ last time. If the
value of Online is “On” (“Off”), the time is when John
logins (logouts) Facebook™. For example, in Figure 2b,
“On_12’0215_1430” implies that John_f logins Facebook™
at 14:00 on Feb. 15, 2012, and is now on Facebook™.
Address Information field stores the IP address and the
port number of the friend’s end-device. This information is
valid when the peer node of the friend is turned on.
2.2 Index Peer Node
The index peer node is responsible for maintaining the status
(i.e., online or off-line) and the routing information (i.e., IP
address) of each peer node. When a peer node is turned on,
it reports to the index peer node the online status, which
consists of its ID and IP address of the peer node. Upon
receiving the online status, the index peer node updates the
online status for the peer node.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 52
Fig.3 An example of Global ID list
An index peer node is a database that maintains the
GlobalID list as shown in figure .For each online peer node,
an entry is created in the GlobalID List for the peer node.
Similar to the Friend List, the GlobalID List consists of
three kinds of information: Personal Information, Social
Network Information, and Address Information for an
online user.
Turning on Peer Node. This section describes the execution
of a peer node. When a user turns on the peer node on his
end device, the Login procedure is executed. Figure shown
below illustrates the message flow for the Login procedure
with the following steps:
Step 1. When a user turns on the peer node, then function is
executed to authenticate the user in an SNS.
Step 2. If the authentication is successful, the SNS responds
with the user SNS ID.
Step 3. The peer node creates send a message (i.e., the
User_Online_Message message) carrying the user’s ID,
Phone No., Email, IP address, port number, and SN Type, to
the index peer node. The index peer node creates an entry
for the user in the global ID list.
Fig. 4 The message flow for login procedure
Steps 4 and 5. The peer node sends a request or response
(i.e., the FriendList_Request and FriendList_Response
message pair) to get the IDs of the user’s friends from the
SNSs, and creates an entry for each friend in the Friend List.
Steps 6 and 7. The peer node send a message (i.e., the
Friends_OnlineStatus_Request and Friends_OnlineStatus_
Response message pair) to the index peer node to query the
online friends of the user.
Steps 8 and 9. The peer node collect the social activity
information to calculate the T value from the SNS by
exchanging the T Value_Parameter_Request and the T
Value_Parameter_Response message pair.
3. GRM (GLOBAL RELATIONSHIP MODEL)
This model is used to identify global relationship between
two users across heterogeneous SNSs. It is tool to measure
the Global relationship strength between two users. A
directional social link a → b is associated with frequency,
which is denoted by f(a,b), to capture how often a user a
performs some kind of social activities with user b (e.g., a
posts a comment on b’s wall, click a “Like”, send a
message, or makes a call to b). Consider there are C kinds of
social activities. For 1 ≤ i ≤ C, let λi denote the frequency
that a user a performs the ith kind of activity with user b.
We define f(a, b) by
(1)
where wi is the weight for the ith kind of activity, 0 ≤ wi ≤ 1
for 1 ≤ i ≤ C, and ∑c
i=1 wi = 1. Note that in eq (1) the weight
wi is a fine-tuning tool to reflect different degrees of
interactions in relationship.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 53
An interaction factor exists between user a and user b if a →
b and b → a exist, and the value F(a, b) for an interaction
factor is defined by
(2)
A larger F(a, b) means more interactions between user a and
user b, and refer to “(2)” , we have 0 ≥ F(a, b) ≤ 1 and
F(a,b) =F(b, a).
In propose system a function Z(P) to measure the strength of
the global relationship between u1 and uL+1, which is
defined by
(3)
A larger Z(P) implies stronger global relationship. The
strength Z(P) is a powerful tool that can provide more
precise friend recommendation and trust/reputation metrics,
and also serve as a basis for content sharing across SNSs.
4. i-Search ALGORITHM
In this section, we propose i-Search mechanism to find a
directional social path between two peer nodes in P2P-iSN.
The i-Search mechanism establishes social paths link by
link. When a link is added into a path, global relationship
strength is calculated for the new path using the Z(.)
function in Eq. 3. If the global relationship strength for the
new path is below a threshold ∆, the social path search
stops. Note that ∆ is used to guarantee that the global
relationship strength for the constructed path is strong
enough so that users are motivated to use the global social
relationship for further SNS applications.
The past social network research findings in the sociology
indicated that [11] F(a, b) = 0.5. However this may not be
true anymore for online social networks. In online social
networks, F(a, b) would be much high than 0.5. In this
study, for demonstration purpose, we set up ∆ based on the
research findings in the sociology (i.e., the interaction factor
for link
a →b is F(a, b) = 0.5). If we consider a path P with length
|P| = 4, then using the Z(.) function using (3), the global
relationship strength for the path is Z(P) = 0.54
= 0.0625,
which is considered very weak relationship. Therefore we
set D = 0.53
= 0.125.
Details of the i-Search mechanism are given below: The
index peer node maintains the online status (including the
ID and IP address of the peer node) for the online peer
nodes. A friend list is maintained in the peer node, which
stores the online information for all friends of the peer node.
To simplify our description, we use “the friend b of a peer
node a” to imply that the social link a→b exists. When a
peer node is turned on, it reports its online status to the
index peer node, and receives the latest online status for his
friends from the index peer node. With the latest online
information, the peer node can determine whether his friend
is online (i.e., a peer node is turned on). A online peer node
can communicate with his online friends directly. We run a
recursive algorithm, iSearch, in the peer node (Algorithm 1).
In this algorithm, the set G is the friend list of a peer node.
The input parameter s stores the ID of the peer node who
calls Algorithm 1, and r is the ID of the peer node to be
searched. Initially, we set P←ø .
Algorithm 1:
Input: s, r, P, Z(P)
Output: Pnew, Z(Pnew)
1. foreach v: v G - P do
2. if v = r then
3. Pnew←P {s→ v};
4. Z(Pnew) ←Z(P)F(s,v);
5. return;
6. else if v is online ,and Z(P)F(s,v) >∆ then
7. v.i-search(v,r,P {s→ v}, Z(P)F(s,v));
8. else if v is offline, or Z(P)F(s,v) ≤ ∆ then
9. quit;
10. end
11. End
Consider the scenario where user a register on index peer
node after registration peer node shows his friend’s status
(Online/Offline) then user can directly access his own SNS
without login overhead. For direct communication between
peer node a and peer node b both user a and b should
registered on index peer node. A user a can “request” his
friend b to execute the iSearch algorithm (i.e.,iSearch() in
Algorithm 1) through the direct communication if b is
online. That is, the directional social path P is established
among the peer nodes. Note that the i-Search mechanism
may find multiple global social relationships between two
peer nodes. For the peer node who triggers the i-Search
mechanism, he can use the one with the largest global social
relationship strength. Furthermore, we can speed up the
execution of the i-Search mechanism by caching the
searching results on the peer nodes.
5. CONCLUSION
In this paper, we propose P2P-iSN, a peer-to-peer network
architecture to integrate multiple SNSs without incurring
excessive overhead to the SNSs. With integrated model, we
could develop an effective approach, a Global Relationship
Model, to evaluate the global relationship strength between
two users with more precision. With P2P-iSN and the
Global Relationship Model as the foundation, we propose
the i-Search mechanism to find the social path with certain
level of social relationship strength in a P2P social network.
Our proposed approach can find the desired social path with
high probability comparing to traditional approach and can
effectively establish global social relationship for users from
heterogeneous SNSs.
IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308
_______________________________________________________________________________________
Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 54
REFERENCES
[1] P2P-iSN: A Peer-to-Peer Architecture for
Heterogeneous Social Networks Phone Lin and Pai-
Chun Chung, National Taiwan University Yuguang
Fang, University of Florida.
[2] C. Zhang, “Privacy and Security for Online Social
Networks: Challenges and Opportunities,” IEEE
Network, vol. 24, no. 4, July/Aug. 2010, pp. 13–18.
[3] A. Mislove , “Measurement and Analysis of Online
Social Networks,” Proc. 7th ACM SIGCOMM Conf.
Internet Measurement, 2007,pp.29–42.
[4] N. Ellison and D. Boyd, “Social Network Sites:
Definition, History, and Scholarship,” J. Computer-
Mediated Communication, vol. 13, no. 1, Oct.
[5] M. N. Ko , “Social-Networks Connect Services,”
Computer, vol. 43, no. 8, Aug. 2010, pp. 37–43.
[6] http://openid.net.

More Related Content

PDF
Journeying themes of data mining in felon and law enforcement agency profiling
PDF
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
PDF
Vol 7 No 1 - November 2013
PDF
IRJET- Fake Profile Identification using Machine Learning
PPTX
Seminar on detecting fake accounts in social media using machine learning
PPTX
Political prediction analysis using text mining and deep learning
PDF
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
PDF
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK
Journeying themes of data mining in felon and law enforcement agency profiling
DETECTION OF FAKE ACCOUNTS IN INSTAGRAM USING MACHINE LEARNING
Vol 7 No 1 - November 2013
IRJET- Fake Profile Identification using Machine Learning
Seminar on detecting fake accounts in social media using machine learning
Political prediction analysis using text mining and deep learning
IRJET - Real-Time Cyberbullying Analysis on Social Media using Machine Learni...
MALICIOUS URL DETECTION USING CONVOLUTIONAL NEURAL NETWORK

What's hot (20)

PDF
32 99-1-pb
PDF
IRJET- Detecting Criminal Method using Data Mining
PDF
IRJET- Identification of Clone Attacks in Social Networking Sites
PDF
Automatic Hate Speech Detection: A Literature Review
PDF
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
PDF
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
PDF
Social networks protection against fake profiles and social bots attacks
PDF
E017433538
PDF
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
PDF
Learning to detect phishing ur ls
PDF
IRJET- Detecting Fake News
DOCX
DOCX
COMPUTER BASICS
PDF
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
PDF
F017433947
PDF
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
PPTX
A Comparative Analysis of Different Feature Set on the Performance of Differe...
DOCX
Spammer detection and fake user Identification on Social Networks
PDF
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
PDF
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
32 99-1-pb
IRJET- Detecting Criminal Method using Data Mining
IRJET- Identification of Clone Attacks in Social Networking Sites
Automatic Hate Speech Detection: A Literature Review
IRJET- Monitoring Suspicious Discussions on Online Forums using Data Mining
IRJET- Improved Real-Time Twitter Sentiment Analysis using ML & Word2Vec
Social networks protection against fake profiles and social bots attacks
E017433538
IRJET- Effective Countering of Communal Hatred During Disaster Events in Soci...
Learning to detect phishing ur ls
IRJET- Detecting Fake News
COMPUTER BASICS
IRJET - An Automated System for Detection of Social Engineering Phishing Atta...
F017433947
Detection and Analysis of Twitter Trending Topics via Link-Anomaly Detection
A Comparative Analysis of Different Feature Set on the Performance of Differe...
Spammer detection and fake user Identification on Social Networks
IRJET- Milestones and Challenges of Fake News Detection using Digital Forensi...
A Deep Learning Technique for Web Phishing Detection Combined URL Features an...
Ad

Viewers also liked (17)

PDF
Mprovement of telugu ocr by segmentation of touching characters
PDF
A review on distributed beam forming techniques an approach in wireless rela...
PDF
An improved luo converter for high power applications
PDF
Heat transfer enhancement and friction factor analysis in tube using conical ...
PDF
Study the effect of using ultrasonic membrane anaerobic system in treating su...
PDF
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
PDF
Communication synchronization in cluster based wireless sensor network a re...
PDF
Parallel knn on gpu architecture using opencl
PDF
And energies of linear semigraph
PDF
Survey of local binary pattern for fire & smoke using wavelet decomposition
PDF
A novel approach for teaching system software by integrating with other courses
PDF
Redundancy removal of rules with reordering them to increase the firewall opt...
PDF
Groundwater analysis in the vicinity of nag river
PDF
Hexagonal carpet antenna for wlan wimax & bluetooth applications
PDF
Fabrication and evaluation of nano carbon reinforced polymer composites
PDF
Implementation of 16 x16 bit multiplication algorithm by using vedic mathemat...
PDF
Experimental study on mechanical properties of m30 concrete with partial repl...
Mprovement of telugu ocr by segmentation of touching characters
A review on distributed beam forming techniques an approach in wireless rela...
An improved luo converter for high power applications
Heat transfer enhancement and friction factor analysis in tube using conical ...
Study the effect of using ultrasonic membrane anaerobic system in treating su...
Alleviate exposed node issues in wireless mesh network (wmn) using a novel ap...
Communication synchronization in cluster based wireless sensor network a re...
Parallel knn on gpu architecture using opencl
And energies of linear semigraph
Survey of local binary pattern for fire & smoke using wavelet decomposition
A novel approach for teaching system software by integrating with other courses
Redundancy removal of rules with reordering them to increase the firewall opt...
Groundwater analysis in the vicinity of nag river
Hexagonal carpet antenna for wlan wimax & bluetooth applications
Fabrication and evaluation of nano carbon reinforced polymer composites
Implementation of 16 x16 bit multiplication algorithm by using vedic mathemat...
Experimental study on mechanical properties of m30 concrete with partial repl...
Ad

Similar to Integrated heterogeneous social networking sites (20)

PDF
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
PPT
Proposal Defence
PDF
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
PDF
Socio Media Connect: A Social Profile based P2P Network
PDF
K017266167
PDF
Semantic web approach towards interoperability and privacy issues in social n...
PDF
Internet based Social Networking Services
PDF
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
PDF
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
PDF
The anatomy of the Facebook social graph
PDF
2_Doc5_2.pdf
PDF
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
ODP
Building Secure Open & Distributed Social Networks
PPT
The Future of Social Networks: The Need for Semantics
PDF
Presentacion
PDF
The Social Semantic Web
PDF
A closer look at Online Social Networks (OSNs)
PPT
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
PPTX
2013 passbac-marc smith-node xl-sna-social media-formatted
PDF
Evolution of social developer network in oss survey
SOCIAL NETWORKING SITES COMMUNICATE USING HETEROGENEOUS SCHEMA
Proposal Defence
Cross-Site Bonding of Anonymous Users in Multiple Social Media Networks
Socio Media Connect: A Social Profile based P2P Network
K017266167
Semantic web approach towards interoperability and privacy issues in social n...
Internet based Social Networking Services
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
SEMANTIC WEB APPROACH TOWARDS INTEROPERABILITY AND PRIVACY ISSUES IN SOCIAL N...
The anatomy of the Facebook social graph
2_Doc5_2.pdf
Multi-Mode Conceptual Clustering Algorithm Based Social Group Identification ...
Building Secure Open & Distributed Social Networks
The Future of Social Networks: The Need for Semantics
Presentacion
The Social Semantic Web
A closer look at Online Social Networks (OSNs)
IEEE CCNC 2011: Kalman Graffi - LifeSocial.KOM: A Secure and P2P-based Soluti...
2013 passbac-marc smith-node xl-sna-social media-formatted
Evolution of social developer network in oss survey

More from eSAT Journals (20)

PDF
Mechanical properties of hybrid fiber reinforced concrete for pavements
PDF
Material management in construction – a case study
PDF
Managing drought short term strategies in semi arid regions a case study
PDF
Life cycle cost analysis of overlay for an urban road in bangalore
PDF
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
PDF
Laboratory investigation of expansive soil stabilized with natural inorganic ...
PDF
Influence of reinforcement on the behavior of hollow concrete block masonry p...
PDF
Influence of compaction energy on soil stabilized with chemical stabilizer
PDF
Geographical information system (gis) for water resources management
PDF
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
PDF
Factors influencing compressive strength of geopolymer concrete
PDF
Experimental investigation on circular hollow steel columns in filled with li...
PDF
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
PDF
Evaluation of punching shear in flat slabs
PDF
Evaluation of performance of intake tower dam for recent earthquake in india
PDF
Evaluation of operational efficiency of urban road network using travel time ...
PDF
Estimation of surface runoff in nallur amanikere watershed using scs cn method
PDF
Estimation of morphometric parameters and runoff using rs & gis techniques
PDF
Effect of variation of plastic hinge length on the results of non linear anal...
PDF
Effect of use of recycled materials on indirect tensile strength of asphalt c...
Mechanical properties of hybrid fiber reinforced concrete for pavements
Material management in construction – a case study
Managing drought short term strategies in semi arid regions a case study
Life cycle cost analysis of overlay for an urban road in bangalore
Laboratory studies of dense bituminous mixes ii with reclaimed asphalt materials
Laboratory investigation of expansive soil stabilized with natural inorganic ...
Influence of reinforcement on the behavior of hollow concrete block masonry p...
Influence of compaction energy on soil stabilized with chemical stabilizer
Geographical information system (gis) for water resources management
Forest type mapping of bidar forest division, karnataka using geoinformatics ...
Factors influencing compressive strength of geopolymer concrete
Experimental investigation on circular hollow steel columns in filled with li...
Experimental behavior of circular hsscfrc filled steel tubular columns under ...
Evaluation of punching shear in flat slabs
Evaluation of performance of intake tower dam for recent earthquake in india
Evaluation of operational efficiency of urban road network using travel time ...
Estimation of surface runoff in nallur amanikere watershed using scs cn method
Estimation of morphometric parameters and runoff using rs & gis techniques
Effect of variation of plastic hinge length on the results of non linear anal...
Effect of use of recycled materials on indirect tensile strength of asphalt c...

Recently uploaded (20)

PDF
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
PPTX
UNIT 4 Total Quality Management .pptx
PDF
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PPTX
communication and presentation skills 01
PDF
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
PPT
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
PPTX
introduction to high performance computing
PDF
Abrasive, erosive and cavitation wear.pdf
PDF
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PDF
Categorization of Factors Affecting Classification Algorithms Selection
PDF
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
PDF
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
PDF
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
PPTX
UNIT - 3 Total quality Management .pptx
PDF
III.4.1.2_The_Space_Environment.p pdffdf
PPTX
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
PDF
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
PPTX
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx
COURSE DESCRIPTOR OF SURVEYING R24 SYLLABUS
UNIT 4 Total Quality Management .pptx
SMART SIGNAL TIMING FOR URBAN INTERSECTIONS USING REAL-TIME VEHICLE DETECTI...
R24 SURVEYING LAB MANUAL for civil enggi
communication and presentation skills 01
A SYSTEMATIC REVIEW OF APPLICATIONS IN FRAUD DETECTION
INTRODUCTION -Data Warehousing and Mining-M.Tech- VTU.ppt
introduction to high performance computing
Abrasive, erosive and cavitation wear.pdf
BIO-INSPIRED HORMONAL MODULATION AND ADAPTIVE ORCHESTRATION IN S-AI-GPT
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Categorization of Factors Affecting Classification Algorithms Selection
PREDICTION OF DIABETES FROM ELECTRONIC HEALTH RECORDS
EXPLORING LEARNING ENGAGEMENT FACTORS INFLUENCING BEHAVIORAL, COGNITIVE, AND ...
UNIT no 1 INTRODUCTION TO DBMS NOTES.pdf
UNIT - 3 Total quality Management .pptx
III.4.1.2_The_Space_Environment.p pdffdf
CURRICULAM DESIGN engineering FOR CSE 2025.pptx
Integrating Fractal Dimension and Time Series Analysis for Optimized Hyperspe...
6ME3A-Unit-II-Sensors and Actuators_Handouts.pptx

Integrated heterogeneous social networking sites

  • 1. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 50 INTEGRATED HETEROGENEOUS SOCIAL NETWORKING SITES Kirti Jadhav1 , Kiran Esave2 , Bhakti Gholap3 , M. G. Devikar4 1 Student, MESCOE – Pune, State-Maharashtra, Country-India 2 Student, MESCOE – Pune, State-Maharashtra, Country-India 3 Student, MESCOE – Pune, State-Maharashtra, Country-India 4 Professor, MESCOE – Pune, State-Maharashtra, Country-India Abstract The growth of Social Network Sites (SNSs) have opened the opportunity for researchers to explore a large amount of social and behavioral data. The heterogeneity of SNSs offer more seamless services across SNSs and also offers integrated SNSs. The aim of the system is to integrate the heterogeneous SNSs. The P2P-iSN allows users from heterogeneous SNSs to communicate without involving the SNS they have registered with. In proposed system architecture, Global Relationship Model (GRM) is used to capture the relationship strength, and i-Search, to find the optimal social path with less time between any two users who are meaningfully connected in heterogeneous SNSs. With the P2P-iSN, SNS developers can design more effective user-centric SNS application. All SNS user uses different services of different SNS on a single platform, and maintain relationship globally. Keywords—SNS , GRM , OpenID , GlobalID, i-search --------------------------------------------------------------------***------------------------------------------------------------------ 1. INTRODUCTION Today Social Networking Sites (SNS) have become a part of our day to day life. They helped us to make the world smaller and integrated with each other. There are many SNS available today and many more are piling each day [2]. Thus users use many SNSs to share data with friends and family. As a result, a user may register with multiple SNSs for different social network applications, carry multiple SNS accounts, interact with contacts from different SNSs, publish and access different web contents, and share contents within each SNS community. While SNSs offer different services, one key feature shared among SNSs is how they are built around users and users’ existing social networks [3], [4]. Yet each SNS is isolated, so users manage their profiles and build relationship separately on different SNSs. The content for the same user in different SNSs may overlap, so it becomes a burden for users to manage contents across different SNSs. With growing influence and complexity of SNSs, researchers have been developing methods to connect users and aggregating data across SNSs so that each SNS no longer stands alone. Here, we propose system architecture to integrate heterogeneous SNSs and maintain the social relationships among a large number of users across heterogeneous SNSs. For example, imagine that within an SNS user b is in user a’s friend list. There is a directional social link denoted by “a → b” from user a to user b. When there exists a social path between two users in an SNS, then there is a “relationship” between these two users. We say that there is a “global relationship” from user a and user b if there is a social path from a to b over heterogeneous SNSs. By identifying “global relationship” among users over heterogeneous SNSs, the system allows different SNSs to interconnect with various networks. Integrated heterogeneous SNSs provide different services of different SNSs over a single platform and establishes path between two users with less time. Fig .1 System architecture of the proposed P2P-iSN. In above figure the operations over P2P-iSN. When a peer node is turned on, it reports to the index peer node the online status, which consists of its ID and IP address of the peer node. Upon receiving the online status, the index peer node updates the online status for the peer node. If a user a of the peer node na and a user b of the peer node nb are on each other’s friend list in a SNS, and na and nb are turned on, these two online peer nodes can communicate
  • 2. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 51 with each other by using the corresponding IP addresses queried from the index peer node. The peer nodes can establish social paths among users from different SNSs and build the so-defined “global relationship.” With the peer-to-peer network architecture, P2P-iSN allows users from heterogeneous SNSs to communicate without involving any specific SNS, and the integration is independent of any specific SNS. By applying P2P-iSN, we develop a Global Relationship Model to assess the strength of the global relationship between two users from heterogeneous SNSs. Based on the global relationship model, we propose a searching mechanism, namely i- Search, to find the social path between two users from heterogeneous SNSs. 2. P2P-iSN In this section, we propose a peer-to-peer architecture, namely P2P-iSN, to integrate heterogeneous SNSs. P2P-iSN consists of two kinds of nodes: peer nodes and index peer nodes. 2.1 Peer Node A peer node is installed on an end device for a user to access SNSs, and its main functionality is to integrate heterogeneous SNSs. The user of a peer node may register to one or more SNSs on his end-device, and possibly login to one or more SNSs at the same time. To associate these different accounts of the same user from heterogeneous SNSs, a unique user ID may be required. The concept known as OpenID [6] can serve this purpose although any other uniquely identifiable ID can be used. A unique user ID can be some kind of authenticated information like user’s cell phone number or verifiable email address. The main functionality of a peer node is to integrate the heterogeneous SNSs through the Friend List maintenance. Peer nodes communicate with each other directly and form a peer-to- peer network. The phone book in a peer node (e.g., Jenny’s end device) is used as the base to integrate heterogeneous SNSs. Take Fig. 2a as an example. Jenny has a friend John with phone number “0910456.” A database, friend list, is maintained to store the information about a user’s friends. Figure 2b shows the format of a friend list. The friend list consists of three kinds of information: personal information, social network information, and address information. Personal information field stores the IDs of the user’s friends, including the ID in SNS, phone number, and email address. In different SNSs, users may use different IDs. As shown in Fig. 2b, for example, Jenny’s friend, John, uses the ID, “John_f”, on Facebook™ and use the ID, “John_t”, on Twitter™). The phone number associates the entry in the phone book with the entry in the friend list. An entry in the phone book may be mapped to multiple entries in the friend list. Social Network Information field consists of four subfields, including SN Type, T Value, Timestamp, and Online. The SNS Type indicates which SNS the friend has registered. For example, in Figure 2b, Jenny’s friend, John, registered to Facebook™ using ID “John_f.” The T Value stores the result calculated by using Eq. 1 in the global relationship model that will be elaborated later, indicating the frequency that a user performs some kind of social activities on his friend (e.g., Jenny posts a comment, click a “Like”, or send a message on John’s wall in Facebook™). Fig.2 An example of friend list; a)Jenny’s phone book; b) Jenny’s friend list For example, in (1) in Figure 2b, the T Value for Jenny ←John on Facebook™ is 0.9. The Timestamp field stores the time when the T Value was calculated. The Online indicates that whether the friend is on the SNS now or not and when John logins to the Facebook™ last time. If the value of Online is “On” (“Off”), the time is when John logins (logouts) Facebook™. For example, in Figure 2b, “On_12’0215_1430” implies that John_f logins Facebook™ at 14:00 on Feb. 15, 2012, and is now on Facebook™. Address Information field stores the IP address and the port number of the friend’s end-device. This information is valid when the peer node of the friend is turned on. 2.2 Index Peer Node The index peer node is responsible for maintaining the status (i.e., online or off-line) and the routing information (i.e., IP address) of each peer node. When a peer node is turned on, it reports to the index peer node the online status, which consists of its ID and IP address of the peer node. Upon receiving the online status, the index peer node updates the online status for the peer node.
  • 3. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 52 Fig.3 An example of Global ID list An index peer node is a database that maintains the GlobalID list as shown in figure .For each online peer node, an entry is created in the GlobalID List for the peer node. Similar to the Friend List, the GlobalID List consists of three kinds of information: Personal Information, Social Network Information, and Address Information for an online user. Turning on Peer Node. This section describes the execution of a peer node. When a user turns on the peer node on his end device, the Login procedure is executed. Figure shown below illustrates the message flow for the Login procedure with the following steps: Step 1. When a user turns on the peer node, then function is executed to authenticate the user in an SNS. Step 2. If the authentication is successful, the SNS responds with the user SNS ID. Step 3. The peer node creates send a message (i.e., the User_Online_Message message) carrying the user’s ID, Phone No., Email, IP address, port number, and SN Type, to the index peer node. The index peer node creates an entry for the user in the global ID list. Fig. 4 The message flow for login procedure Steps 4 and 5. The peer node sends a request or response (i.e., the FriendList_Request and FriendList_Response message pair) to get the IDs of the user’s friends from the SNSs, and creates an entry for each friend in the Friend List. Steps 6 and 7. The peer node send a message (i.e., the Friends_OnlineStatus_Request and Friends_OnlineStatus_ Response message pair) to the index peer node to query the online friends of the user. Steps 8 and 9. The peer node collect the social activity information to calculate the T value from the SNS by exchanging the T Value_Parameter_Request and the T Value_Parameter_Response message pair. 3. GRM (GLOBAL RELATIONSHIP MODEL) This model is used to identify global relationship between two users across heterogeneous SNSs. It is tool to measure the Global relationship strength between two users. A directional social link a → b is associated with frequency, which is denoted by f(a,b), to capture how often a user a performs some kind of social activities with user b (e.g., a posts a comment on b’s wall, click a “Like”, send a message, or makes a call to b). Consider there are C kinds of social activities. For 1 ≤ i ≤ C, let λi denote the frequency that a user a performs the ith kind of activity with user b. We define f(a, b) by (1) where wi is the weight for the ith kind of activity, 0 ≤ wi ≤ 1 for 1 ≤ i ≤ C, and ∑c i=1 wi = 1. Note that in eq (1) the weight wi is a fine-tuning tool to reflect different degrees of interactions in relationship.
  • 4. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 53 An interaction factor exists between user a and user b if a → b and b → a exist, and the value F(a, b) for an interaction factor is defined by (2) A larger F(a, b) means more interactions between user a and user b, and refer to “(2)” , we have 0 ≥ F(a, b) ≤ 1 and F(a,b) =F(b, a). In propose system a function Z(P) to measure the strength of the global relationship between u1 and uL+1, which is defined by (3) A larger Z(P) implies stronger global relationship. The strength Z(P) is a powerful tool that can provide more precise friend recommendation and trust/reputation metrics, and also serve as a basis for content sharing across SNSs. 4. i-Search ALGORITHM In this section, we propose i-Search mechanism to find a directional social path between two peer nodes in P2P-iSN. The i-Search mechanism establishes social paths link by link. When a link is added into a path, global relationship strength is calculated for the new path using the Z(.) function in Eq. 3. If the global relationship strength for the new path is below a threshold ∆, the social path search stops. Note that ∆ is used to guarantee that the global relationship strength for the constructed path is strong enough so that users are motivated to use the global social relationship for further SNS applications. The past social network research findings in the sociology indicated that [11] F(a, b) = 0.5. However this may not be true anymore for online social networks. In online social networks, F(a, b) would be much high than 0.5. In this study, for demonstration purpose, we set up ∆ based on the research findings in the sociology (i.e., the interaction factor for link a →b is F(a, b) = 0.5). If we consider a path P with length |P| = 4, then using the Z(.) function using (3), the global relationship strength for the path is Z(P) = 0.54 = 0.0625, which is considered very weak relationship. Therefore we set D = 0.53 = 0.125. Details of the i-Search mechanism are given below: The index peer node maintains the online status (including the ID and IP address of the peer node) for the online peer nodes. A friend list is maintained in the peer node, which stores the online information for all friends of the peer node. To simplify our description, we use “the friend b of a peer node a” to imply that the social link a→b exists. When a peer node is turned on, it reports its online status to the index peer node, and receives the latest online status for his friends from the index peer node. With the latest online information, the peer node can determine whether his friend is online (i.e., a peer node is turned on). A online peer node can communicate with his online friends directly. We run a recursive algorithm, iSearch, in the peer node (Algorithm 1). In this algorithm, the set G is the friend list of a peer node. The input parameter s stores the ID of the peer node who calls Algorithm 1, and r is the ID of the peer node to be searched. Initially, we set P←ø . Algorithm 1: Input: s, r, P, Z(P) Output: Pnew, Z(Pnew) 1. foreach v: v G - P do 2. if v = r then 3. Pnew←P {s→ v}; 4. Z(Pnew) ←Z(P)F(s,v); 5. return; 6. else if v is online ,and Z(P)F(s,v) >∆ then 7. v.i-search(v,r,P {s→ v}, Z(P)F(s,v)); 8. else if v is offline, or Z(P)F(s,v) ≤ ∆ then 9. quit; 10. end 11. End Consider the scenario where user a register on index peer node after registration peer node shows his friend’s status (Online/Offline) then user can directly access his own SNS without login overhead. For direct communication between peer node a and peer node b both user a and b should registered on index peer node. A user a can “request” his friend b to execute the iSearch algorithm (i.e.,iSearch() in Algorithm 1) through the direct communication if b is online. That is, the directional social path P is established among the peer nodes. Note that the i-Search mechanism may find multiple global social relationships between two peer nodes. For the peer node who triggers the i-Search mechanism, he can use the one with the largest global social relationship strength. Furthermore, we can speed up the execution of the i-Search mechanism by caching the searching results on the peer nodes. 5. CONCLUSION In this paper, we propose P2P-iSN, a peer-to-peer network architecture to integrate multiple SNSs without incurring excessive overhead to the SNSs. With integrated model, we could develop an effective approach, a Global Relationship Model, to evaluate the global relationship strength between two users with more precision. With P2P-iSN and the Global Relationship Model as the foundation, we propose the i-Search mechanism to find the social path with certain level of social relationship strength in a P2P social network. Our proposed approach can find the desired social path with high probability comparing to traditional approach and can effectively establish global social relationship for users from heterogeneous SNSs.
  • 5. IJRET: International Journal of Research in Engineering and Technology eISSN: 2319-1163 | pISSN: 2321-7308 _______________________________________________________________________________________ Volume: 04 Issue: 05 | May-2015, Available @ http://www.ijret.org 54 REFERENCES [1] P2P-iSN: A Peer-to-Peer Architecture for Heterogeneous Social Networks Phone Lin and Pai- Chun Chung, National Taiwan University Yuguang Fang, University of Florida. [2] C. Zhang, “Privacy and Security for Online Social Networks: Challenges and Opportunities,” IEEE Network, vol. 24, no. 4, July/Aug. 2010, pp. 13–18. [3] A. Mislove , “Measurement and Analysis of Online Social Networks,” Proc. 7th ACM SIGCOMM Conf. Internet Measurement, 2007,pp.29–42. [4] N. Ellison and D. Boyd, “Social Network Sites: Definition, History, and Scholarship,” J. Computer- Mediated Communication, vol. 13, no. 1, Oct. [5] M. N. Ko , “Social-Networks Connect Services,” Computer, vol. 43, no. 8, Aug. 2010, pp. 37–43. [6] http://openid.net.