A Decentralised Semantic Architecture for Social Networking Platforms

Total Page:16

File Type:pdf, Size:1020Kb

A Decentralised Semantic Architecture for Social Networking Platforms A Decentralised Semantic Architecture for Social Networking Platforms A thesis submitted for the degree of Doctor of philosophy By Yasir Iqbal Brunel Business School Brunel University London October 2018 A Decentralised Semantic Architecture for Social Networking Platforms Abstract Social networking platforms (SNPs) are complex distributed software applications exhibiting many challenges related to data portability. Since existing platforms are propriety in design, users cannot easily share their data with other SNPs, however decentralisation of social networking platforms can provide a solution to this problem. There is a difference of opinion, the way the research and developer communities have pursued this issue. Existing approaches used in decentralisation provide limited structural detail and lack in providing a systematic framework of design activities. There is a need for an architectural framework based on standardised software architectural principles and technologies to guide the design and development of decentralised social networking platforms in order to improve the level of both data portability and interoperability. The main aim of this research is to develop an architectural solution to achieve data portability among SNPs via decentralisation. Existing proposed decentralised platforms are based on a distributed structure and are mainly for a specific aspect such as access control or security and privacy. In addition to this, existing approaches lack in practicality due to underdeveloped and non-standardised design. To solve these issues a new architectural framework is needed, which can provide design and development guidelines for the decentralised social networking platform. The goal of this thesis is to study, design and develop an architectural framework for social networking platforms that can incorporate the requirements of the decentralisation, to make portability possible. The synergies between the software engineering principles and social web technologies are investigated to create a standard approach. The proposed architecture is based on component-based software development (CBSD) and aspect-oriented software development (AOSD), a unified approach known as CAM (Component Aspect Model). The foundations of the proposed architecture are based on decentralised social networking architecture (DSNA), architectural style which is derived from CAM. Components and aspects are the building blocks of the proposed decentralised social networking platform architecture. From a development perspective, each component represents a social network functionality and aspects represent the properties and preferences that are used to decentralise the functionality. The model for the component composition is a major challenge because the use of CAM for social networks has not been attempted before. 2 A Decentralised Semantic Architecture for Social Networking Platforms The proposed architecture comprehensively integrates the DSNA architectural style into each architectural component. Portability among SNPs by means of decentralisation can be summarised into three steps. (1) Definition of the architectural style, (2) implementation of the architectural style into components and (3) integration of the component composition. To date component composition approaches have not been used for social networks as a way to develop social network functionality. The concept of middleware has been adapted to achieve the composition feature of the architecture. In the architecture Social Network Support Layer (SNSL) functions as middleware to facilitate component composition. Existing middleware solutions still lack integration of CBSD and AOSD concepts. This limitation is characterised by, a lack of explicit guidelines for composition, a lack of declarative specification and definition model to express component composition and a lack of support for role allocation. This research overcome these limitations. The application of the architecture is based on the W3C SWAT (Social Web Acid Test) scenario. A Messaging application is developed to evaluate the scenario based on the Design Science Research Methodology. The architectural style is defined in the first stage of design followed by the component-based architecture. The architectural style is defined to guide the architecture and the component composition model. In the second stage, the design and implementation of composition technology (that is SNSL) are developed with architectural style and the rules defined in the first stage. The refined version of the architecture is evaluated in the third stage, according to WC3 SWAT test. The definitive version of the proposed architecture with the benchmarked result can be used to design and build social networking platforms, allowing users to share and collaborate information across the different social networking platforms. 3 A Decentralised Semantic Architecture for Social Networking Platforms Table of Contents Abstract .............................................................................................................................................. 2 Table of Contents ............................................................................................................................. 4 List of Figures ................................................................................................................................... 9 List Of Tables .................................................................................................................................. 11 Dedication ........................................................................................................................................ 12 Acknowledgement .......................................................................................................................... 13 List of Acronyms ............................................................................................................................. 14 Chapter 1 - Introduction ..................................................................................................................... 15 1. Chapter Introduction .................................................................................................................. 15 1.1. Conceptual foundations ..................................................................................................... 15 1.1.1. Personal Information Space ..................................................................................... 15 1.1.2. Collaborative Knowledge Space .............................................................................. 16 1.1.3. Social Web Networks ................................................................................................. 17 1.1.4. The Social and Semantic Web ................................................................................. 18 1.1.5. Data Portability and Interoperability ........................................................................ 19 1.1.6. What is Decentralisation ............................................................................................ 20 1.2. Research Motivation .......................................................................................................... 21 1.3. Problem Definition .............................................................................................................. 23 1.4. Research Aim and Objectives .......................................................................................... 24 1.4.1. Aim ................................................................................................................................ 24 1.4.2. Objectives .................................................................................................................... 25 1.5. Research Methods ............................................................................................................. 26 1.6. Thesis Structure ................................................................................................................. 28 1.7. Chapter Conclusion ........................................................................................................... 32 Chapter 2 - A Literature Review on the Decentralised Social Web, An Architectural Perspective .......................................................................................................................................... 33 2. Chapter Introduction .......................................................................................................... 33 2.1. Literature Review Methodology........................................................................................ 33 2.2. Background ......................................................................................................................... 35 2.2.1. Concept of Abstraction and Software Architecture ............................................... 35 2.2.2. Architectures styles and views ................................................................................. 37 2.2.3. View, View Types and View Points ......................................................................... 39 2.3. Software Architecture Engineering (SAE) and Distributed Applications .................... 41 2.3.1. Component Based Software Development (CBSD) ............................................. 41 2.3.2. Aspect Oriented Software Development (AOSD) ................................................. 42 4 A Decentralised Semantic Architecture
Recommended publications
  • Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation
    Seamless Interoperability and Data Portability in the Social Web for Facilitating an Open and Heterogeneous Online Social Network Federation vorgelegt von Dipl.-Inform. Sebastian Jürg Göndör geb. in Duisburg von der Fakultät IV – Elektrotechnik und Informatik der Technischen Universität Berlin zur Erlangung des akademischen Grades Doktor der Ingenieurwissenschaften - Dr.-Ing. - genehmigte Dissertation Promotionsausschuss: Vorsitzender: Prof. Dr. Thomas Magedanz Gutachter: Prof. Dr. Axel Küpper Gutachter: Prof. Dr. Ulrik Schroeder Gutachter: Prof. Dr. Maurizio Marchese Tag der wissenschaftlichen Aussprache: 6. Juni 2018 Berlin 2018 iii A Bill of Rights for Users of the Social Web Authored by Joseph Smarr, Marc Canter, Robert Scoble, and Michael Arrington1 September 4, 2007 Preamble: There are already many who support the ideas laid out in this Bill of Rights, but we are actively seeking to grow the roster of those publicly backing the principles and approaches it outlines. That said, this Bill of Rights is not a document “carved in stone” (or written on paper). It is a blog post, and it is intended to spur conversation and debate, which will naturally lead to tweaks of the language. So, let’s get the dialogue going and get as many of the major stakeholders on board as we can! A Bill of Rights for Users of the Social Web We publicly assert that all users of the social web are entitled to certain fundamental rights, specifically: Ownership of their own personal information, including: • their own profile data • the list of people they are connected to • the activity stream of content they create; • Control of whether and how such personal information is shared with others; and • Freedom to grant persistent access to their personal information to trusted external sites.
    [Show full text]
  • The Impact of Data Access Regimes on Artificial Intelligence and Machine Learning
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Martens, Bertin Working Paper The impact of data access regimes on artificial intelligence and machine learning JRC Digital Economy Working Paper, No. 2018-09 Provided in Cooperation with: Joint Research Centre (JRC), European Commission Suggested Citation: Martens, Bertin (2018) : The impact of data access regimes on artificial intelligence and machine learning, JRC Digital Economy Working Paper, No. 2018-09, European Commission, Joint Research Centre (JRC), Seville This Version is available at: http://hdl.handle.net/10419/202237 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte. may exercise further usage rights as specified in the indicated licence. www.econstor.eu JRC Digital Economy Working Paper 2018-09 The impact of data access regimes on artificial intelligence and machine learning Bertin Martens December 2018 This publication is a Working Paper by the Joint Research Centre, the European Commission’s in-house science service.
    [Show full text]
  • Data Portability and Privacy
    SEPTEMBER 2019 CHARTING A WAY FORWARD Data Portability and Privacy Erin Egan VICE PRESIDENT AND CHIEF PRIVACY OFFICER, POLICY CHARTING A WAY FORWARD 1 Table of Contents 03 I. Intro 06 II. The Challenge 09 III. Five Questions About Portability and Responsibility 09 QUESTION 1 What is “data portability”? 13 QUESTION 2 Which data should be portable? 14 QUESTION 3 Whose data should be portable? 15 QUESTION 4 How should we protect privacy while enabling portability? 20 QUESTION 5 After people’s data is transferred, who is responsible if the data is misused or otherwise improperly protected? 24 IV. What’s Next? 25 End Notes CHARTING A WAY FORWARD 2 Data Portability and Privacy 01 There’s growing agreement among policymakers around the world that data portability—the principle that you should be able to take the data you share with one service and move it to another—can help promote competition online and encourage the emergence of new services. Competition and data protection experts agree that, although there are complicated issues involved, portability helps people control their data and can make it easier for them to choose among online service providers. The benefits of data portability to people and markets are clear, which is why our CEO, Mark Zuckerberg, recently called for laws that guarantee portability.1 But to build portability tools people can trust and use effectively, we should develop clear rules about what kinds of data should be portable and who is responsible for protecting that data as it moves to different providers.2 The purpose of this paper is to advance the conversation about what those rules should be.
    [Show full text]
  • Mastodon.Py Documentation Release 1.5.1
    Mastodon.py Documentation Release 1.5.1 Lorenz Diener Mar 14, 2020 Contents 1 A note about rate limits 3 2 A note about pagination 5 3 Two notes about IDs 7 3.1 ID unpacking...............................................7 4 Error handling 9 5 A brief note on block lists 11 6 Return values 13 6.1 User dicts................................................. 13 6.2 Toot dicts................................................. 14 6.3 Mention dicts............................................... 15 6.4 Scheduled toot dicts........................................... 15 6.5 Poll dicts................................................. 16 6.6 Conversation dicts............................................ 16 6.7 Hashtag dicts............................................... 16 6.8 Hashtag usage history dicts....................................... 17 6.9 Emoji dicts................................................ 17 6.10 Application dicts............................................. 17 6.11 Relationship dicts............................................ 17 6.12 Filter dicts................................................ 18 6.13 Notification dicts............................................. 18 6.14 Context dicts............................................... 18 6.15 List dicts................................................. 19 6.16 Media dicts................................................ 19 6.17 Card dicts................................................. 20 6.18 Search result dicts............................................ 20 6.19 Instance dicts..............................................
    [Show full text]
  • Data Transfer Project
    Data Transfer Project August 20, 2018 Federal Trade Commission 600 Pennsylvania Ave NW Washington, DC 20580 To Whom It May Concern: Thank you for the opportunity to provide comment on the Federal Trade Commission’s Hearings on Competition and Consumer Protection in the 21st Century. As you may know, Google, Microsoft, Twitter, and Facebook recently announced the Data Transfer Project (datatransferproject.dev). We are excited to share our work on this project, including the thinking ​ ​ behind it, in response to your questions. Data portability is critical for user control and competition. Not only is this project relevant to the questions you raised in your request for comment on these topics, but we also encourage the Commission to consider the importance of portability throughout your process. The mission of the Data Transfer Project is to support direct, service-to-service portability. This will ultimately enable users to transfer data between two authenticated accounts behind the scenes, without having to download the data and relocate it themselves. This is an open-source project that will make it easier for people to switch services, or try new and innovative products, by improving the ease and speed of data portability. We have attached a detailed white paper that describes the technical foundations of the project and explains how our principles guided us toward this approach. The paper also includes detailed descriptions of the security and privacy considerations that are built into the project. Please let us know if you have any additional questions. Thanks, Keith Enright Julie Brill Damien Kieran Erin M. Egan Chief Privacy Officer Corporate Vice Data Protection Officer Vice President & Chief Google LLC President & Deputy Twitter, Inc Privacy Officer General Counsel Facebook, Inc.
    [Show full text]
  • Challenges in the Decentralised Web: the Mastodon Case∗
    Challenges in the Decentralised Web: The Mastodon Case∗ Aravindh Raman1, Sagar Joglekar1, Emiliano De Cristofaro2;3, Nishanth Sastry1, and Gareth Tyson3;4 1King’s College London, 2University College London, 3Alan Turing Institute, 4Queen Mary University of London faravindh.raman,sagar.joglekar,[email protected], [email protected], [email protected] Abstract cols to let instances interact and aggregate their users to offer a globally integrated service. The Decentralised Web (DW) has recently seen a renewed mo- DW platforms intend to offer a number of benefits. For ex- mentum, with a number of DW platforms like Mastodon, Peer- ample, data is spread among many independent instances, thus Tube, and Hubzilla gaining increasing traction. These offer al- possibly making privacy-intrusive data mining more difficult. ternatives to traditional social networks like Twitter, YouTube, Data ownership is more transparent, and the lack of centralisa- and Facebook, by enabling the operation of web infrastruc- tion could make the overall system more robust against techni- ture and services without centralised ownership or control. cal, legal or regulatory attacks. Although their services differ greatly, modern DW platforms mostly rely on two key innovations: first, their open source However, these properties may also bring inherent chal- software allows anybody to setup independent servers (“in- lenges that are difficult to avoid, particularly when consid- stances”) that people can sign-up to and use within a local ering the natural pressures towards centralisation in both so- community; and second, they build on top of federation pro- cial [12, 49] and economic [42] systems.
    [Show full text]
  • Decentralized Social Networking Platforms: Current Status and Trends Protocols Used by Existing DOSN Platforms Taxonomy by Proto
    Decentralized Social Networking Platforms: Current Status and Trends Andres Ledesma, George Pallis and Marios Dikaiakos Laboratory for Internet Computing (LInC), Department of computer Science, University of Cyprus. {aledesma, gpallis, mdd}@cs.ucy.ac.cy Protocols Used by Existing DOSN Platforms DOSN Platforms Trendy … Trendiest! Open Graph Activity Protocol XOXO + 400 k Stream users *Document Representation Collaboration Tent *Partial Connection to other OSN XRI OExchange *Desktop (e.g. Facebook) Content PubSubHubbub Peer-to-Peer *Project Fork pump.io Identification Exchange LAMP node.js (e.g. identi.ca) OEmbed Salmon RSS / Atom Taxonomy by Protocols and Release Stage Content protocols identify, represent and exchange social content (e.g. posts, likes The three circles represent the release stage of the platform (i.e. the maturity and comments) in DOSNs. of the platform). Libertree Thimbl PGP Protocols used: newebe Cunity Duuit! XMPP pump.io XMPP + Others buddycloud Security and DSNP OpenSSL OpenPGP All Lipsync.it Friendica Tent encryption XMPP + Ostatus Retroshare OpenLink Data Spaces Ostatus + Others Kune Diaspora* DOSN rely on protocols to make the communication as private and secure as possible. Partial Ostatus + Others Ostatus Jappix Lorea StatusNet Others stable WebID Authentication OpenID beta Salut à Toi alpha User Layered Overview OAuth Identification WebFinger Activity Streams hCard Social Content RSS/Atom User Protocols deal with authentication and identification. User authentication across PuHubSubbub Salmon services is an essential part of DOSNs. User identification provides limited and OStatus Comet XMPP Mr. Privacy Psyc controlled user data to service and application without giving up privacy. HTTP SMTP, IMAP P2P TCP/IP Social FOAF XFN Representation Food for thought… Social representation refers to protocols that express the social graph.
    [Show full text]
  • Personal Data Processing Policy
    PERSONAL DATA PROCESSING POLICY (website, customers and prospects) Cisbio Bioassays is a business-to-business (B2B) company and in most cases, the information we process concerns legal entities and not individuals. Nevertheless, behind the companies, there are men and women. Respect for your privacy and the protection of your personal data is a priority and constant concern for Cisbio Bioassays, who have adopted a "privacy by design" approach. This notably implies that your personal data is protected by default both in terms of the system design and Cisbio Bioassays internal practices. Everyone in our company that is required to view or use personal data has been trained to respect the applicable law and the issues of confidentiality. Data processing is performed transparently within the rights granted to you by the laws and regulations, but also by this personal data processing policy. The protection of your privacy is ensured from end to end, from the design of the application to the erasure of your data. Cisbio Bioassays ensures a high level of protection in accordance with the European standards for the protection of personal data to all its customers and users, whatever their country of origin and, subject to legal and regulatory obligations, regardless of where they access the services. OUR PRINCIPLES, OUR ETHICS Our ethics on privacy protection and personal data is based on the following principles: • Transparency and loyalty: you know what information is collected, by whom, by what means and for which use. At any moment you can also request details on the processing implemented by contacting our services.
    [Show full text]
  • Consumer Data Rights and Competition - Background Note by the Secretariat
    Organisation for Economic Co-operation and Development DAF/COMP(2020)1 Unclassified English - Or. English 29 April 2020 DIRECTORATE FOR FINANCIAL AND ENTERPRISE AFFAIRS COMPETITION COMMITTEE Consumer Data Rights and Competition - Background note by the Secretariat 10-12 June 2020 This document was prepared by the OECD Secretariat to serve as background material for the meeting of the Competition Committee on 12 June 2020. The opinions expressed and arguments employed herein do not necessarily reflect the official views of the Organisation or of the governments of its member countries. More documentation related to this discussion can be found at: http://www.oecd.org/daf/competition/consumer-data-rights-and-competition.htm. Please contact Mr. Antonio Capobianco if you have any questions about this document [E-mail: [email protected]] JT03461266 OFDE This document, as well as any data and map included herein, are without prejudice to the status of or sovereignty over any territory, to the delimitation of international frontiers and boundaries and to the name of any territory, city or area. 2 DAF/COMP(2020)1 Consumer Data Rights and Competition By the Secretariat* Consumer data rights are gaining more attention across the globe as more consumers come to rely on data-driven services in the digital economy. Consumer data rights can include fundamental rights to privacy, as well as a range of measures, such as data portability, that aim to provide consumers with greater control over their data. This paper looks at the role for competition policy and enforcement in driving competitive outcomes in markets involving consumer data.
    [Show full text]
  • Workshop on Digital Move Empowering Families to Move Freely Online: Harnessing the Full Potential of the Internet Through Genuine Data Portability
    Workshop on Digital move Empowering families to move freely online: harnessing the full potential of the internet through genuine data portability Families on the Move conference www.coface-eu.org/consumers/families-on-the-move With the support of: Reality check and State of play The Internet has become an integral part of redirected instead of being stopped. Think the lives of families all across the world, yet about it as a spider web: if you need to go few reflect on its governance, a key aspect from one point to another in a spider web, to secure certain elementary freedoms like even if one thread of the spider web snaps, the freedom of movement. Moving freely there are many other possible routes you online doesn’t just mean being able to can take. consult any website you want, but also being able to consult them in similar With regards to the content/services side, conditions (the debate about “net we have seen a growing concentration in neutrality”) or being able to switch online the hands of a few companies: Google, services at any time which is what the Facebook and Amazon. This concentration workshops on “digital move” focused on. is detrimental for many reasons. For instance, a successful cyberattack on Just like any service, the Internet is prone to Amazon cloud services could take down centralization and lock in: huge parts of the Web (the web pages centralization as in the concentration would no longer be available). Another and control of a major part of its reason is the user experience: by reaching infrastructure and/or content in the near monopolistic positions, these giants hands of one or a few major players; can impose abusive access conditions and “lock in” meaning the difficulty of users unfair business models.
    [Show full text]
  • Functional Breakdown of Decentralised Social Networks
    University of Amsterdam Master System and Network Engineering Research Project 2 Functional breakdown of decentralised social networks Student: Supervisor: Wouter Miltenburg Michiel Leenaars [email protected] [email protected] July 6, 2015 Abstract Current centralised social networks are used by a huge number of users for a variety of reasons. With Facebook, Google+, LinkedIn, or Twitter, users are not in control of their own data and access control is centralised and proprietary. Decentralised social networks could be a solution to these problems and gives the control of the data back to users. This research is focused on the question which of the decentralised social networks is currently most suited to be provided as a service by hosting providers. This paper will therefore provide information about the current implementations, the protocols used by the various implementations, and will give a functional breakdown of the various decentralised social networks. Various implementations have been analysed, namely diaspora*, Friendica, GNU social, pump.io, and RedMatrix. The paper also describes the set of standards and protocols used by the various implementations. As most implementations use their own protocol, or implement the standards slightly differently, there is no interoperability without the use of extra plugins or enabling certain features. While there are a lot of standards for facilitating the message exchange, there are however standards missing that would make interoperability possible, which is described in this paper as well. RedMatrix is currently most suited to be provided as an alternative to the current centralised social networks and that can be provided as a service by hosting providers.
    [Show full text]
  • Comments to the Federal Trade Commission on Data Portability
    Comments to the Federal Trade Commission on Data Portability AUGUST 21, 2020 1 Table of Contents INTRODUCTION ................................................................................................................................. 2 FACEBOOK’S DATA PORTABILITY PRODUCTS ......................................................................... 3 DOWNLOAD YOUR INFORMATION / DOWNLOAD YOUR DATA .......................................................... 3 “TRANSFER A COPY OF YOUR PHOTOS AND VIDEOS” ...................................................................... 4 The Data Transfer Project .......................................................................................................... 4 Deploying the Data Transfer Project at Facebook ................................................................. 5 GETTING DATA PORTABILITY RIGHT ........................................................................................... 8 EXISTING PORTABILITY RIGHTS & OBLIGATIONS .............................................................................. 8 QUESTIONS ABOUT DATA PORTABILITY & PRIVACY ......................................................................... 9 1. What is data portability? ..................................................................................................... 9 2. Which data should be portable? ...................................................................................... 12 3. Whose data should be portable? ....................................................................................
    [Show full text]