{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:18Z","timestamp":1763468238226,"version":"3.41.0"},"reference-count":52,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2015,3,12]],"date-time":"2015-03-12T00:00:00Z","timestamp":1426118400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Internet Technol."],"published-print":{"date-parts":[[2015,3,12]]},"abstract":"<jats:p>An unprecedented information wealth produced by online social networks, further augmented by location\/collocation data, is currently fragmented across different proprietary services. Combined, it can accurately represent the social world and enable novel socially aware applications. We present Prometheus, a socially aware peer-to-peer service that collects social information from multiple sources into a multigraph managed in a decentralized fashion on user-contributed nodes, and exposes it through an interface implementing nontrivial social inferences while complying with user-defined access policies. Simulations and experiments on PlanetLab with emulated application workloads show the system exhibits good end-to-end response time, low communication overhead, and resilience to malicious attacks.<\/jats:p>","DOI":"10.1145\/2700057","type":"journal-article","created":{"date-parts":[[2015,3,17]],"date-time":"2015-03-17T12:34:23Z","timestamp":1426595663000},"page":"1-26","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Special Issue on Foundations of Social Computing"],"prefix":"10.1145","volume":"15","author":[{"given":"Nicolas","family":"Kourtellis","sequence":"first","affiliation":[{"name":"University of South Florida"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4223-1304","authenticated-orcid":false,"given":"Jeremy","family":"Blackburn","sequence":"additional","affiliation":[{"name":"University of South Florida"}]},{"given":"Cristian","family":"Borcea","sequence":"additional","affiliation":[{"name":"New Jersey Institute of Technology"}]},{"given":"Adriana","family":"Iamnitchi","sequence":"additional","affiliation":[{"name":"University of South Florida"}]}],"member":"320","published-online":{"date-parts":[[2015,3,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2010.12.006"},{"volume-title":"GeoS: A service for the management of geo-social information in a distributed system. Master\u2019s thesis","author":"Anderson P.","key":"e_1_2_1_2_1","unstructured":"Anderson , P. 2010. GeoS: A service for the management of geo-social information in a distributed system. Master\u2019s thesis , University of South Florida . http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=2560&context=etd. Anderson, P. 2010. GeoS: A service for the management of geo-social information in a distributed system. Master\u2019s thesis, University of South Florida. http:\/\/scholarcommons.usf.edu\/cgi\/viewcontent.cgi?article=2560&context=etd."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1852658.1852665"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644900"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989663"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1088\/1742-5468\/2008\/10\/P10008"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076732.2076746"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1578002.1578010"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2002.803069"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14282-6_7"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00779-005-0046-3"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1093\/sf\/62.1.54"},{"volume-title":"Proceedings of the 3rd USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201906)","author":"Garriss S.","key":"e_1_2_1_13_1","unstructured":"Garriss , S. , Kaminsky , M. , Freedman , M. J. , Karp , B. , Mazieres , D. , and Yu , H . 2006. RE: Reliable email . In Proceedings of the 3rd USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201906) . 297--310. Garriss, S., Kaminsky, M., Freedman, M. J., Karp, B., Mazieres, D., and Yu, H. 2006. RE: Reliable email. In Proceedings of the 3rd USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201906). 297--310."},{"key":"e_1_2_1_14_1","unstructured":"Gellman B. and Poitras L. 2013. U.S. British intelligence mining data from nine U.S. Internet companies in broad secret program. http:\/\/www.washingtonpost.com\/investigations\/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program\/2013\/06\/06\/3a0c0da8-cebf-11e2-8845-d970ccb04497story.html.  Gellman B. and Poitras L. 2013. U.S. British intelligence mining data from nine U.S. Internet companies in broad secret program. http:\/\/www.washingtonpost.com\/investigations\/us-intelligence-mining-data-from-nine-us-internet-companies-in-broad-secret-program\/2013\/06\/06\/3a0c0da8-cebf-11e2-8845-d970ccb04497story.html."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.122653799"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5210\/fm.v12i11.2023"},{"volume-title":"Proceedings of the 3rd International Conference on Communities and Technologies (CandT\u201907)","author":"Golder S. A.","key":"e_1_2_1_17_1","unstructured":"Golder , S. A. , Wilkinson , D. , and Huberman , B. A . 2007. Rhythms of social interaction: Messaging within a massive online network . In Proceedings of the 3rd International Conference on Communities and Technologies (CandT\u201907) . Golder, S. A., Wilkinson, D., and Huberman, B. A. 2007. Rhythms of social interaction: Messaging within a massive online network. In Proceedings of the 3rd International Conference on Communities and Technologies (CandT\u201907)."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1367497.1367585"},{"volume-title":"Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC\u201911)","author":"Graffi K.","key":"e_1_2_1_19_1","unstructured":"Graffi , K. , Gross , C. , Stingl , D. , Hartung , D. , Kovacevic , A. , and Steinmetz , R . 2011. LifeSocial.KOM: A secure and P2P-based solution for online social networks . In Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC\u201911) . 554--558. Graffi, K., Gross, C., Stingl, D., Hartung, D., Kovacevic, A., and Steinmetz, R. 2011. LifeSocial.KOM: A secure and P2P-based solution for online social networks. In Proceedings of the IEEE Consumer Communications and Networking Conference (CCNC\u201911). 554--558."},{"volume-title":"Proceedings of the 5th ACM Internet Measurement Conference (IMC\u201905)","author":"Guo L.","key":"e_1_2_1_20_1","unstructured":"Guo , L. , Chen , S. , Xiao , Z. , Tan , E. , Ding , X. , and Zhang , X . 2005. Measurements, analysis, and modeling of BitTorrent-like systems . In Proceedings of the 5th ACM Internet Measurement Conference (IMC\u201905) . 35--48. Guo, L., Chen, S., Xiao, Z., Tan, E., Ding, X., and Zhang, X. 2005. Measurements, analysis, and modeling of BitTorrent-like systems. In Proceedings of the 5th ACM Internet Measurement Conference (IMC\u201905). 35--48."},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MIC.2012.42"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879190"},{"volume-title":"Proceedings of the 11th International Conference on Ubiquitous Computing (Ubicomp\u201909)","author":"King Z.","key":"e_1_2_1_23_1","unstructured":"King , Z. , Blackburn , J. , and Iamnitchi , A . 2009. BatTorrent: A battery-aware BitTorrent for mobile devices . In Proceedings of the 11th International Conference on Ubiquitous Computing (Ubicomp\u201909) . King, Z., Blackburn, J., and Iamnitchi, A. 2009. BatTorrent: A battery-aware BitTorrent for mobile devices. In Proceedings of the 11th International Conference on Ubiquitous Computing (Ubicomp\u201909)."},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2006.257"},{"volume-title":"Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201910)","author":"Kourtellis N.","key":"e_1_2_1_26_1","unstructured":"Kourtellis , N. , Finnis , J. , Anderson , P. , Blackburn , J. , and Iamnitchi , A . 2010a. Prometheus: Distributed management of geo-social data . In Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201910) . Kourtellis, N., Finnis, J., Anderson, P., Blackburn, J., and Iamnitchi, A. 2010a. Prometheus: Distributed management of geo-social data. In Proceedings of the 7th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201910)."},{"volume-title":"Proceedings of the 11th ACM\/IFIP\/USENIX International Middleware Conference (Middleware\u201910)","author":"Kourtellis N.","key":"e_1_2_1_27_1","unstructured":"Kourtellis , N. , Finnis , J. , Anderson , P. , Blackburn , J. , Borcea , C. , and Iamnitchi , A . 2010b. Prometheus: User-controlled P2P social data management for socially-aware applications . In Proceedings of the 11th ACM\/IFIP\/USENIX International Middleware Conference (Middleware\u201910) . Kourtellis, N., Finnis, J., Anderson, P., Blackburn, J., Borcea, C., and Iamnitchi, A. 2010b. Prometheus: User-controlled P2P social data management for socially-aware applications. In Proceedings of the 11th ACM\/IFIP\/USENIX International Middleware Conference (Middleware\u201910)."},{"volume-title":"Proceedings of the 11th IEEE International Conference on Peer-to-Peer Computing (P2P\u201911)","author":"Kourtellis N.","key":"e_1_2_1_28_1","unstructured":"Kourtellis , N. and Iamnitchi , A . 2011. Inferring peer centrality in socially-informed peer-to-peer systems . In Proceedings of the 11th IEEE International Conference on Peer-to-Peer Computing (P2P\u201911) . 318--327. Kourtellis, N. and Iamnitchi, A. 2011. Inferring peer centrality in socially-informed peer-to-peer systems. In Proceedings of the 11th IEEE International Conference on Peer-to-Peer Computing (P2P\u201911). 318--327."},{"key":"e_1_2_1_29_1","first-page":"9","article-title":"Leveraging peer centrality in the design of socially-informed P2P systems","volume":"25","author":"Kourtellis N.","year":"2013","unstructured":"Kourtellis , N. and Iamnitchi , A. 2013 . Leveraging peer centrality in the design of socially-informed P2P systems . IEEE Trans. Parallel Distrib. Syst. 25 , 9 . Kourtellis, N. and Iamnitchi, A. 2013. Leveraging peer centrality in the design of socially-informed P2P systems. IEEE Trans. Parallel Distrib. Syst. 25, 9.","journal-title":"IEEE Trans. Parallel Distrib. Syst."},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1397735.1397741"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2009.10129177"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.socnet.2008.07.002"},{"volume-title":"Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS\u201906)","author":"Li J.","key":"e_1_2_1_33_1","unstructured":"Li , J. and Dabek , F . 2006. F2F: Reliable storage in open networks . In Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS\u201906) . Li, J. and Dabek, F. 2006. F2F: Reliable storage in open networks. In Proceedings of the 5th International Workshop on Peer-to-Peer Systems (IPTPS\u201906)."},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135837"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1657127.1657130"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435497.1435504"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592678"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/4236.978369"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.evolhumbehav.2010.08.005"},{"volume-title":"Proceedings of the 1st ACM\/IFIP\/USENIX International Middleware Conference (Middleware\u201901)","author":"Rowstron A.","key":"e_1_2_1_40_1","unstructured":"Rowstron , A. and Druschel , P . 2001a. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems . In Proceedings of the 1st ACM\/IFIP\/USENIX International Middleware Conference (Middleware\u201901) . 329--350. Rowstron, A. and Druschel, P. 2001a. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proceedings of the 1st ACM\/IFIP\/USENIX International Middleware Conference (Middleware\u201901). 329--350."},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502053"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772778"},{"volume-title":"Proceedings of the 26th International Conference on Data Engineering (ICDE\u201910)","author":"Sarigol E.","key":"e_1_2_1_43_1","unstructured":"Sarigol , E. , Riva , O. , and Alonso , G . 2010. A tuple space for social networking on mobile phones . In Proceedings of the 26th International Conference on Data Engineering (ICDE\u201910) . 988--991. Sarigol, E., Riva, O., and Alonso, G. 2010. A tuple space for social networking on mobile phones. In Proceedings of the 26th International Conference on Data Engineering (ICDE\u201910). 988--991."},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592665.1592669"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1379092.1379108"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989656.1989664"},{"key":"e_1_2_1_47_1","unstructured":"The Guardian. 2014. The NSA files. (2014). http:\/\/www.theguardian.com\/us-news\/the-nsa-files.  The Guardian. 2014. The NSA files. (2014). http:\/\/www.theguardian.com\/us-news\/the-nsa-files."},{"volume-title":"6th Conference on Advances in Grid and Pervasive Computing (May). Finland, 209--220","author":"Toninelli A.","key":"e_1_2_1_48_1","unstructured":"Toninelli , A. , Pathak , A. , and Issarny , V . 2011. Yarta: A middleware for managing mobile social ecosystems . In 6th Conference on Advances in Grid and Pervasive Computing (May). Finland, 209--220 . Toninelli, A., Pathak, A., and Issarny, V. 2011. Yarta: A middleware for managing mobile social ecosystems. In 6th Conference on Advances in Grid and Pervasive Computing (May). Finland, 209--220."},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883615"},{"volume-title":"Social Structures: A Network Approach","author":"Wellman B.","key":"e_1_2_1_50_1","unstructured":"Wellman , B. 1988. Structural analysis: From method and metaphor to theory and substance . In Social Structures: A Network Approach . Cambridge University Press , 19--61. Wellman, B. 1988. Structural analysis: From method and metaphor to theory and substance. In Social Structures: A Network Approach. Cambridge University Press, 19--61."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519089"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772790"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.13"}],"container-title":["ACM Transactions on Internet Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2700057","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2700057","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:59Z","timestamp":1750227419000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2700057"}},"subtitle":["Enabling Social Applications via Decentralized Social Data Management"],"short-title":[],"issued":{"date-parts":[[2015,3,12]]},"references-count":52,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2015,3,12]]}},"alternative-id":["10.1145\/2700057"],"URL":"https:\/\/doi.org\/10.1145\/2700057","relation":{},"ISSN":["1533-5399","1557-6051"],"issn-type":[{"type":"print","value":"1533-5399"},{"type":"electronic","value":"1557-6051"}],"subject":[],"published":{"date-parts":[[2015,3,12]]},"assertion":[{"value":"2013-05-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-03-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}