Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
survey
Public Access

Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges

Published: 23 May 2016 Publication History

Abstract

Online Social Networks (OSNs) are becoming a popular method of meeting people and keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to improve service quality and enhance user experiences. Much research has been done to evaluate trust and predict the trustworthiness of a target, usually from the view of a source. Graph-based approaches make up a major portion of the existing works, in which the trust value is calculated through a trusted graph (or trusted network, web of trust, or multiple trust chains). In this article, we focus on graph-based trust evaluation models in OSNs, particularly in the computer science literature. We first summarize the features of OSNs and the properties of trust. Then we comparatively review two categories of graph-simplification-based and graph-analogy-based approaches and discuss their individual problems and challenges. We also analyze the common challenges of all graph-based models. To provide an integrated view of trust evaluation, we conduct a brief review of its pre- and postprocesses (i.e., the preparation and validation of trust models, including information collection, performance evaluation, and related applications). Finally, we identify some open challenges that all trust models are facing.

References

[1]
R. K. Ahuja, T. L. Magnanti, and J. B. Orlin. 1993. Network Flows: Theory, Algorithms, and applications. Prentice Hall (1993).
[2]
A. Altman and M. Tennenholtz. 2005. On the axiomatic foundations of ranking systems. In Proceedings of International Joint Conference in Artificial Intelligence (IJCAI). 917--922.
[3]
X. Amatriain. 2012. Mining large streams of user data for personalized recommendations. SIGKDD Explorations 14, 2 (2012), 37--48.
[4]
R. Andersen, C. Borgs, J. Chayes, U. Feige, A. Flaxman, A. Kalai, V. Mirrokni, and M. Tennenholtz. 2008. Trust-based recommendation systems: An axiomatic approach. In Proceedings of the 17th ACM International Conference on World Wide Web (WWW) (2008), 199--208.
[5]
T. Antal, P. L. Krapivsky, and S. Redner. 2006. Social balance on networks: The dynamics of friendship and enmity. Physica D: Nonlinear Phenomena 224 (2006), 130--136.
[6]
E. Bakshy, I. Rosenn, C. Marlow, and L. Adamic. 2012. The role of social networks in information diffusion. In Proceedings of the 21st ACM International Conference on World Wide Web (WWW). 519--528.
[7]
M. Blaze, J. Feigenbaum, J. Ioannidis, and A. D. Keromytis. 1999. The role of trust management in distributed systems security. Secure Internet Programming (1999), 185--210.
[8]
J. Caverleea, L. Liu, and S. Web. 2010. The socialtrust framework for trusted social information management: Architecture and algorithms. Information Sciences 180(1) (January 2010), 95--112.
[9]
S. Chen, G. Wang, and W. Jia. 2014. k-FuzzyTrust: An efficient trust computation for large-scale mobile social networks using fuzzy implicit social graph. Elsevier: Information Sciences. DOI information:10.1016/j.ins.2014.09.058 (2014).
[10]
W. Chen, A. Collins, R. Cummings, T. Ke, Z. Liu, D. Rincon, X. Sun, Y. Wang, W. Wei, and Y. Yuan. 2011. Influence maximization in social networks when negative opinions may emerge and propagate. In Proceedings of the 11th SIAM International Conference on Data Mining (SDM). 379--390.
[11]
W. Chen, C. Wang, and Y. Wang. 2010. Scalable influence maximization for prevalent viral marketing in large-scale social networks. In Proceedings of the 16th ACM International Conference on Knowledge Discovery and Data Mining (KDD). 1029--1038.
[12]
W. Chen, Y. Wang, and S. Yang. 2009. Efficient influence maximization in social networks. In Proceedings of the 15th ACM International Conference on Knowledge Discovery and Data Mining (KDD). 199--208.
[13]
J. Cho, K. Chan, and S. Adali. 2015. A survey on trust modeling. ACM Computing Surveys (CSUR) 48, 2 (2015), 28.
[14]
J. Cho, A. Swami, and I. Chen. 2011. A survey on trust management for mobile ad hoc networks. IEEE Communications Surveys Tutorials 13, 4 (2011), 562--583.
[15]
J. Cho, A. Swami, and I. Chen. 2012. Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. Journal of Network and Computer Applications 35(3) (2012), 1001--1012.
[16]
B. Cialdini and R. Trost. 1998. Social Influence: Social Norms, Conformity and Compliance. The handbook of social psychology, Vol. 1 and 2 (4th ed.). McGraw-Hill.
[17]
M. Ciglan, M. Laclavik, and K. Norvag. 2013. On community detection in real-world networks and the importance of degree assortativity. In Proceedings of the 19th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 1007--1015.
[18]
Clever. 2014. Homepage. Retrieved from http://www.research.ibm.com/topics/popups/innovate/hci/html/chow.html.
[19]
S. Cook, T. Yamagishi, C. Cheshire, R. Cooper, M. Matsuda, and R. Mashima. 2005. Trust building via risk taking: A cross-societal experiment. Social Psychology Quarterly 68, 2 (June 2005), 121--142.
[20]
D. Crandall, D. Cosley, D. Huttenlocher, J. Kleinberg, and S. Suri. 2008. Feedback effects between similarity and social influence in online communities. In Proceedings of the 14th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. 160--168. http://doi.acm.org/10.1145/1401890.1401914
[21]
G. Danezis and P. Mittal. 2009. SybilInfer: Detecting sybil nodes using social networks. In Proceedings of the 2009 Network and Distributed System Security Symposium (NDSS).
[22]
A. Das, S. Gollapudi, R. Panigrahy, and M. Salek. 2013. Debiasing social wisdom. In Proceedings of the 19th ACM International Conference on Knowledge Discovery and Data Mining (KDD). 500--508.
[23]
A. Dempster. 1967. Upper and lower probabilities induced by a multivalued mapping. Annals of Mathematical Statistics 38, 2 (1967), 325--339.
[24]
J. Douceur. 2002. The sybil attack. In Revised Papers from the First International Workshop on Peer-to-Peer Systems(IPTPS’01). 251--260.
[25]
E. ElSalamouny, K. Krukow, and V. Sassone. 2009. An analysis of the exponential decay principle in probabilistic trust models. Theoretical Computer Science 410, 41 (2009), 4067--4084.
[26]
E. ElSalamouny, V. Sassone, and M. Nielsen. 2010. HMM-based trust model. Formal Aspects in Security and Trust, Springer Berlin (2010), 21--35.
[27]
L. Ford and R. Fulkerson. 1962. Flows in Networks. Princeton University Press, Princeton, NJ (1962).
[28]
D. Gefen. 2002. Reflections on the dimensions of trust and trustworthiness among online consumers. SIGMIS Database 33, 3 (2002), 38--53. http://doi.acm.org/10.1145/569905.569910
[29]
D. Gefen and P. A. Pavlou. 2012. The boundaries of trust and risk: The quadratic moderating role of institutional structures. Information Systems Research 23, 3-part-2 (2012), 940--959.
[30]
S. Goel, W. Mason, and D. J. Watts. 2010. Real and perceived attitude agreement in social networks. Journal of Personality and Social Psychology 99(4) (2010), 611--621.
[31]
J. Golbeck. 2005. Computing and applying trust in web-based social networks. PhD Dissertation, University of Maryland (2005).
[32]
J. Golbeck and J. Hendler. 2006. Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology (TOIT) 6, 4 (2006), 497--529.
[33]
J. Goldstein, A. Kwasinksi, P. Kingsbury, R. Sabin, and A. McDowell. 2006. Annotating subsets of the Enron email corpus. In Proceedings of the 3rd Conference on Email and Anti-Spam (CEAS).
[34]
D. Good. 1988. Individuals, interpersonal relations and trust. In Trust: Making and Breaking Cooperative Relations, D. Gambetta (Ed.). chapter 3 (1988), 31--48, NewYork: Basil Black.
[35]
T. Grandison and M. Sloman. 2000. A survey of trust in internet applications. IEEE Communications Surveys and Tutorials 3, 4 (Oct. 2000), 2--16.
[36]
M. Granovetter. 1983. The strength of weak ties: A network theory revisited. Sociological Theory 1 (1983), 201--233.
[37]
R. Guha. 2003. Open Rating Systems. Technical Report. Stanford Knowledge Systems Laboratory, Stanford, CA.
[38]
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the 13th ACM International Conference on World Wide Web (WWW). 403--412.
[39]
Z. Gyöngyi, H. Garcia-Molina, and J. Pedersen. 2004. Combating web spam with trustrank. In Proceedings of the 30th International Conference on Very Large Data Bases (VLDB). 576--587.
[40]
C. Hang, Z. Zhang, and M. P. Singh. 2013. Shin: Generalized trust propagation with limited evidence. Computer 46, 3 (2013), 78--85.
[41]
S. Hauke, S. Biedermanny, M. Muhlhauser, and D. Heider. 2013. On the application of supervised machine learning to trustworthiness assessment. In Proceedings of the 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom) (2013), 525--534.
[42]
C. Heinrich. 2011. Pretty good privacy (PGP). In Encyclopedia of Cryptography and Security (2nd Ed.), T. Van, C. A. Henk, and S. Jajodia (Eds.). Springer, 955--958.
[43]
K. Hoffman, D. Zage, and C. Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. Computer Surveys 42, 1 (2009), 1--31.
[44]
D. Houser and J. Wooders. 2006. Reputation in auctions: Theory and evidence from eBay. Journal of Economics & Management Strategy 15, 2 (2006), 353--369.
[45]
F. Huang. 2007. Building social trust: A human-capital approach. Journal of Institutional and Theoretical Economics (JITE) 163, 4 (2007), 552--573.
[46]
T. D. Huynh. 2009. A personalized framework for trust assessment. In Proceedings of the 2009 ACM Symposium on Applied Computing (SAC) (2009), 1302--1307.
[47]
W. Jiang and G. Wang. 2011. SWTrust: Generating trusted graph for trust evaluation in online social networks. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom). 320--327.
[48]
W. Jiang, G. Wang, and J. Wu. 2014. Generating trusted graphs for trust evaluation in online social networks. Future Generation Computer Systems 31 (2014), 48--58.
[49]
W. Jiang and J. Wu. 2014. Trust models in wireless sensor networks and online social networks: A comparative study. In Proceedings of the 11th IEEE International Conference on Mobile Ad Hoc and Sensor Systems (MASS). 612--617.
[50]
W. Jiang, J. Wu, F. Li, G. Wang, and H. Zheng. 2016. Trust evaluation in online social networks using generalized flow. IEEE Transactions on Computers 65(3) (2016), 952--963.
[51]
W. Jiang, J. Wu, and G. Wang. 2013. RATE: Recommendation-aware trust evaluation in online social networks. In Proceedings of the 12th IEEE International Symposium on Network Computing and Applications (NCA). 149--152.
[52]
W. Jiang, J. Wu, and G. Wang. 2015. On selecting recommenders for trust evaluation in online social networks. ACM Transactions on Internet Technology (TOIT) 15(4) (2015), Article 14.
[53]
W. Jiang, J. Wu, G. Wang, and H. Zheng. 2014. FluidRating: A time-evolving rating prediction in trust-based recommendation systems using fluid dynamics. In Proceedings of the 33rd IEEE International Conference on Computer Communications (INFOCOM) (2014), 1707--1715.
[54]
W. Jiang, J. Wu, G. Wang, and H. Zheng. 2016. Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics. IEEE Transactions on Computers 65, 4 (2016), 1211--1224.
[55]
A. Jøsang. 1999. An algebra for assessing trust in certification chains. In Proceedings of the Network and Distributed Systems Security Symposium (NDSS).
[56]
A. Jøsang, U. G. Center, and T. Bhuiyan. 2008. Optimal trust network analysis with subjective logic. In Proceedings of the Second International Conference on Emerging Security Information, Systems and Technologies (2008), 179--184.
[57]
A. Jøsang, E. Gray, and M. Kinateder. 2006a. Simplification and analysis of transitive trust networks. Web Intelligence and Agent System 4 (2) (2006), 139--161.
[58]
A. Jøsang, R. Hayward, and S. Pope. 2006b. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference (ACSC). 85--94.
[59]
A. Jøsang, R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (2007), 618--644.
[60]
A. Jøsang and S. Pope. 2012. Dempster’s rule as seen by little colored balls. Computational Intelligence 28, 4 (2012), 453--474.
[61]
B. R. Julian. 1967. A new scale for the measurement of interpersonal trust. Journal of Personality 4 (1967), 651--665.
[62]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th ACM International Conference on World Wide Web (WWW). 640--651.
[63]
D. Kempe, J. Kleinberg, and É. Tardos. 2003. Maximizing the spread of influence through a social network. In Proceedings of the 9th ACM International Conference on Knowledge Discovery and Data Mining (KDD). 137--146.
[64]
Y. A. Kim and H. S. Song. 2011. Strategies for predicting local trust based on trust propagation in social networks. Knowledge-Based Systems 24(8) (2011), 1360--1371.
[65]
J. M. Kleinberg. 1999. Hubs, authorities, and communities. Computer Surveys 31, 4es, Article 5 (1999).
[66]
U. Kuter and J. Golbeck. 2007. Sunny: A new algorithm for trust inference in social networks using probabilistic confidence models. In Proceedings of the 22nd National Conference on Artificial Intelligence (2007), 1377--1382.
[67]
P. M. Lee. 2012. Bayesian Statistics: An Introduction. John Wiley & Sons (2012).
[68]
M. Lesani and N. Montazeri. 2009. Fuzzy trust aggregation and personalized trust inference in virtual social networks. Computational Intelligence 25 (2) (2009), 51--83.
[69]
J. Leskovec, D. Huttenlocher, and J. Kleinberg. 2010a. Predicting positive and negative links in online social networks. In Proceedings of the 19th ACM International Conference on World Wide Web. 641--650.
[70]
J. Leskovec, D. Huttenlocher, and J. Kleinberg. 2010b. Signed networks in social media. In Proceedings of the ACM SIGCHI Conference on Human Factors in Computing Systems. 1361--1370.
[71]
J. Leskovec and A. Krevl. 2014. SNAP: {Stanford} Large Network Dataset Collection. https://snap.stanford.edu/data/soc-Epinions1.html. (2014).
[72]
R. Levien. 2003. Attack resistant trust metrics. PhD thesis, UC Berkeley, Berkeley, CA. (2003).
[73]
R. Levien and A. Aiken. 1998. Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium (1998), 229--242.
[74]
F. Li and J. Wu. 2010. Uncertainty modeling and reduction in MANETs. IEEE Transactions on Mobile Computing 9, 7 (2010), 1035--1048.
[75]
Y. Li. 1998. Toward a qualitative search engine. IEEE Internet Computing 2, 4 (1998), 24--29.
[76]
C. Lin, N. Cao, S. Liuand S. Papadimitriou, J. Sun, and X. Yan. 2009a. Smallblue: Social network analysis for expertise search and collective intelligence. In Proceedings of the 25th International Conference on Data Engineering (ICDE). 1483--1486.
[77]
H. Lin, X. Wu, and H. Lin. 2009b. Hierarchical fuzzy trust management for peer-to-peer network. In ISECS International Colloquium on Computing, Communication, Control, and Management (CCCM), Vol. 4. 377--380.
[78]
G. Liu, Y. Wang, M. A. Orgun, and E. Lim. 2013b. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing 6(2) (2013), 152--167.
[79]
G. Liu, Q. Yang, H. Wang, X. Lin, and M. Wittie. 2014. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. In Proceedings of the 33rd IEEE International Conference on Computer Communications (INFOCOM). 1698--1706.
[80]
X. Liu, A. Datta, and E. Lim (Eds.). 2014. Computational Trust Models and Machine Learning. Chapman and Hall/CRC.
[81]
X. Liu, G. Tredan, and A. Datta. 2013a. A generic trust framework for large-scale open systems using machine learning. Computational Intelligence (2013).
[82]
H. Ma, H. Yang, M. R. Lyu, and I. King. 2008. Mining social networks using heat diffusion processes for marketing candidates selection. In Proceedings of the 17th ACM Conference on Information and Knowledge Management (CIKM). 233--242.
[83]
T. Ma, J. Zhou, M. Tang, Y. Tian, A. Al-Dhelaan, M. Al-Rodhaan, and S. Lee. 2015. Social network and tag sources based augmenting collaborative recommender system. IEICE Transactions on Information and Systems E98-D, 4, 902--910.
[84]
A. Machanavajjhala, A. Korolova, and A. Sarma. 2011. Personalized social recommendations: Accurate or private. In Proceedings of the 37th International Conference on Very Large Data Bases (VLDB). 440--450.
[85]
M. Maghami and G. Sukthankar. 2013. Hierarchical influence maximization for advertising in multi-agent markets. In Proceedings of the IEEE/ACM International Conference on Advances in Social Networks Analysis and Mining. 21--27.
[86]
G. Mahoney, W. Myrvold, and G. C. Shoja. 2005. Generic reliability trust model. In Proceedings of the 3rd Annual Conference on Privacy, Security and Trust (PST) (2005), 113--120.
[87]
F. G. Marmol and G. M. Perez. 2010. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Computer Standards and Interfaces 32 (2010), 185--196.
[88]
S. Marsh. 1994. Formalising trust as a computational concept. PhD Thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK (1994).
[89]
S. Marti and H. Garcia-Molina. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Computer Networks 50(4) (March 2006), 472--484.
[90]
P. Massa and P Avesani. 2006. Trust-aware bootstrapping of recommender systems. In Proceedings of the ECAI Workshop on Recommender Systems (2006), 29--33.
[91]
P. Massa and P. Avesani. 2007a. Trust-aware recommender systems. In Proceedings of the 2007 ACM Conference on Recommender Systems (RecSys). 17--24.
[92]
P. Massa and P. Avesani. 2007b. Trust metrics on controversial users: Balancing between tyranny of the majority and echo chambers. International Journal on Semantic Web and Information Systems 3 (2007), 39--64.
[93]
P. Massa, P. Avesani, and R. Tiella. 2005. A trust-enhanced recommender system application: Moleskiing. In Proceedings of the 2005 ACM Symposium on Applied Computing (SAC). 1589--1593.
[94]
P. Massa and B. Bhattacharjee. 2004. Using trust in recommender systems: An experimental analysis. In Trust Management. Vol. 2995. 221--235.
[95]
A. Mislove, M. Marcon, K. Gummadi, P. Druschel, and B. Bhattacharjee. 2007. Measurement and analysis of online social networks. In Proceedings of the 5th ACM/Usenix Internet Measurement Conference (IMC) (2007), 29--42.
[96]
A. Mislove, A. Post, P. Druschel, and K. Gummadi. 2008. Ostra: Leveraging trust to thwart unwanted communication. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI). USENIX Association, Berkeley, CA, 15--30.
[97]
A. Molavi Kakhki, C. Kliman-Silver, and A. Mislove. 2013. Iolaus: Securing online content rating systems. In Proceedings of the 22nd International Conference on World Wide Web (WWW ). 919--930.
[98]
G. Möllering. 2001. The nature of trust: From Georg Simmel to a theory of expectation, interpretation and suspension. Sociology 35, 2 (2001), 403--420.
[99]
L. Mui, M. Mohtashemi, and A. Halberstadt. 2002. A computational model of trust and reputation for e-businesses. In Proceedings of the 35th Annual Hawaii International Conference on System Sciences (HICSS). 2431--2439.
[100]
K. Newton. 2001. Trust, social capital, civil society, and democracy. International Political Science Review 22, 2 (2001), 201--214.
[101]
D. Q. Nguyen, T. Kunz, and L. Lamont. 2012. Impact of mobility on trust decay rate. In Proceedings of the 2012 IEEE Wireless Communications and Networking Conference (WCNC) (2012), 2852--2857.
[102]
M. Nielsen, K. Krukow, and V. Sassone. 2007. A Bayesian model for event-based trust. Festschrift in Hounour of Gordon Plotkin. Electronic Notes in Theoretical Computer Science (2007).
[103]
T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu. 2013. Trust management of services in cloud environments: Obstacles and solutions. Computer Surveys 46(1), 4 (2013), 12:1--12:30.
[104]
Z. Noorian and M. Ulieru. 2010. The state of the art in trust and reputation systems: A framework for comparison. Journal of Theoretical and Applied Electronic Commerce Research 5, 2 (Aug. 2010), 97--117.
[105]
L. Page, S. Brin, R. Motwani, and T. Winograd. 1999. The PageRank Citation Ranking: Bringing Order to the Web. Technical Report 1999-66. Stanford InfoLab.
[106]
J. Pearl. 1999. Reasoning with cause and effect. In Proceedings of International Joint Conference in Artificial Intelligence (IJCAI). 1437--1449.
[107]
S. Peng, W. Jia, G. Wang, J. Wu, and M. Guo. 2010. Trusted routing based on dynamic trust mechanism in mobile ad-hoc networks. IEICE Transactions on Information and Systems 93-D (2010), 510--517.
[108]
S. Peng, A. Yang, H. Zhong, and Z. Feng. 2013. A dynamic trust updating model based on multiple constraints in wireless mesh networks. International Conference on Information Science and Technology (ICIST) (2013), 815--819.
[109]
I. Pinyol and J. Sabater-Mir. 2013. Computational trust and reputation models for open multi-agent systems: A review. Artificial Intelligence Review 40, 1 (2013), 1--25.
[110]
G. Qi, C. Aggarwal, and T. Huang. 2012. Community detection with edge content in social media networks. In Proceedings of the IEEE 28th International Conference on Data Engineering (ICDE). 534--545.
[111]
H. Quan, J. Wu, and Y. Shi. 2011. Online social networks and social network services: A technical survey. Handbook of Pervasive Communication, M. Ilyas and H. Mouftah (Eds.). CRC Press.
[112]
L. Rashotte. 2007. Social influence. A. S. R. Manstead, M. Hewstone (Eds.), The Blackwell Encyclopedia of Social Psychology, Blackwell Publishing, 562--563.
[113]
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. 2000. Reputation systems. Communications of the ACM 43, 12 (2000), 45--48.
[114]
P. Resnick and R. Zeckhauser. 2002. Trust among strangers in internet transactions: Empirical analysis of eBay’s reputation system. In The Economics of the Internet and E-Commerce, M. R. Baye (Ed.). Vol. 11. JAI Press Inc., 127--157.
[115]
M. Richardson, R. Agrawal, and P. Domingos. 2003. Trust management for the semantic web. In Proceedings of the 2nd International Semantic Web Conference (ISWC). 351--368.
[116]
S. Ruohomaa and L. Kutvonen. 2005. Trust management survey. In Proceedings of the 3rd International Conference on Trust Management (2005), 77--92.
[117]
J. Sabater and C. Sierra. 2002. Reputation and social network analysis in multi-agent systems. In Proceedings of the 1st International Joint Conference on Autonomous Agents and Multiagent Systems (AAMAS). (2002), 475--482.
[118]
J. Sabater and C. Sierra. 2005. Review on computational trust and reputation models. Artificial Intelligence Review 24(1) (2005), 33--60.
[119]
M. M. Sathik, K. S. Kannan, and A. Rasheed. 2011. Comparative analysis of community discovery methods in social networks. International Journal of Computer Applications 14(8) (2011), 27--31.
[120]
G. Shafer. 1976. A Mathematical Theory of Evidence. Princeton University Press, Princeton.
[121]
W. Sherchan, S. Nepal, and C. Paris. 2013. A survey of trust in social networks. Computer Surveys 45, 4 (2013), 47:1--47:33.
[122]
A. Singh and L. Liu. 2003. TrustMe: Anonymous management of trust relationships in decentralized P2P systems. In Proceedings of the 3rd IEEE International Conference on P2P Computing. 142--149.
[123]
A. Srinivasan, J. Teitelbaum, H. Liang, J. Wu, and M. Cardei. 2008. Reputation and trust-based systems for ad hoc and sensor networks. Algorithms and Protocols for Wireless, Mobile Ad Hoc Networks, A. Boukerche (Ed.), Wiley, ISBN: 978-0-470-38358-2 (2008).
[124]
G. Stringhini, C. Kruegel, and G. Vigna. 2010. Detecting spammers on social networks. In Proceedings of the 26th Annual Computer Security Applications Conference (ACSAC). 1--9.
[125]
Y. Sun, W. Yu, Z. Han, and K. Liu. 2006b. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications 24, 2 (2006), 305--317.
[126]
Y. L. Sun, Z. Han, W. Yu, and K. J. R. Liu. 2006a. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of IEEE INFOCOM (2006), 1--13.
[127]
M. Taherian, M. Amini, and R. Jalili. 2008. Trust inference in web-based social networks using resistive networks. In Proceedings of the 3rd International Conference on Internet and Web Applications and Services (ICIW). 233--238.
[128]
J. Tang. 2012. Product Review Datasets: Epinions and Ciao. http://www.public.asu.edu/∼jtang20/datasetcode/truststudy.htm.
[129]
J. Tang, H. gao, H. Liu, and A. Das Sarma. 2012. eTrust: Understanding trust evolution in an online world. In Proceedings of the 18th ACM International Conference on Knowledge Discovery and Data Mining (KDD). 253--261.
[130]
J. Tang, S. Chang, C. Aggarwal, and H. Liu. 2015. Negative link prediction in social media. In Proceedings of the Eighth ACM International Conference on Web Search and Data Mining (WSDM). 87--96.
[131]
L. Terveen and W. Hill. 2001. Beyond recommender systems: Helping people help each other. In HCI in the New Millennium. 487--509.
[132]
G. Theodorakopoulos and J. S. Baras. 2006. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications 24 (2006), 318--328.
[133]
D. N. Tran, B. Min, J. Li, and L. Subramanian. 2009. Sybil-resilient online content voting. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI), Vol. 9. 15--28.
[134]
Trustlet. 2012. Extended Epinions Trust Network Dataset: http://www.trustlet.org/extended_epinions.html. (2012).
[135]
Trustlet. 2014. Index of Advogato Dataset: http://www.trustlet.org/datasets/advogato/. (2014).
[136]
B. Viswanath, A. Post, K. P. Gummadi, and A. Mislove. 2011. An analysis of social network-based sybil defenses. ACM SIGCOMM Computer Communication Review 41, 4 (2011), 363--374.
[137]
G. Wang, W. Jiang, J. Wu, and Z. Xiong. 2014. Fine-grained feature-based social influence evaluation in online social networks. IEEE Transactions on Parallel and Distributed Systems 25, 9 (2014), 2286--2296.
[138]
G. Wang and J. Wu. 2011a. FlowTrust: Trust inference with network flows. Frontiers of Computer Science in China 5(2) (2011), 181--194.
[139]
G. Wang and J. Wu. 2011b. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Generation Computer Systems (Elsevier) 27(5) (2011), 529--538.
[140]
X. Wang, W. Cheng, P. Mohapatra, and T. Abdelzaher. 2013. ARTSense: Anonymous reputation and trust in participatory sensing. In Proceedings of the 32nd IEEE International Conference on Computer Communications (INFOCOM). 2517--2525.
[141]
D. J. Watts. 1999. Small Worlds: The Dynamics of Networks Between Order and Randomness. Princeton University Press (1999).
[142]
J. Wu. 2009. Trust mechanisms and their applications in MANETs. Keynote speech in IEEE TrustCom’09.
[143]
H. Xia, Z. Jia, L. Ju, X. Li, and Y. Zhu. 2011. A subjective trust management model with multiple decision factors for MANET based on AHP and fuzzy logic rules. In Proceedings of the 2011 IEEE/ACM International Conference on Green Computing and Communications (GreenCom). 124--130.
[144]
H. Yang, I. King, and M. Lyu. 2007. DiffusionRank: A possible penicillin for web spamming. In Proceedings of the 30th Annual International ACM SIGIR Conference on Research and Development in Information Retrieval (SIGIR). 431--438.
[145]
S. Yang, B. Long, A. Smola, N. Sadagopan, Z. Zheng, and H. Zha. 2011a. Like like alike: Joint friendship and interest propagation in social networks. In Proceedings of the 20th ACM International Conference on World Wide Web (WWW). 537--546.
[146]
S. Yang, B. Long, A. Smola, H. Zha, and Z. Zheng. 2011b. Collaborative competitive filtering: Learning recommender using context of user choice. In Proceedings of the 34th International ACM Conference on Research and Development in Information Retrieval (SIGIR). 295--304.
[147]
X. Yang, H. Steck, and Y. Liu. 2012. Circle-based recommendation in online social networks. In Proceedings of the 18th ACM International Conference on Knowledge Discovery and Data Mining (KDD). 1267--1275.
[148]
Y. Yao, S. Ruohomaa, and F. Xu. 2012a. Addressing common vulnerabilities of reputation systems for electronic commerce. Journal of Theoretical and Applied Electronic Commerce Research 7, 1 (April 2012), 1--20.
[149]
Y. Yao, H. Tong, F. Xu, and J. Lu. 2012b. Subgraph extraction for trust inference in social networks. In ASONAM. IEEE Computer Society, 163--170.
[150]
Y. Yao, H. Tong, X. Yan, F. Xu, and J. Lu. 2013. MATRI: A multi-aspect and transitive trust inference model. In Proceedings of the 22nd ACM International Conference on World Wide Web (WWW). 1467--1476.
[151]
J. S. Yedidia, W. T. Freeman, and Y. Weiss. 2001. Generalized belief propagation. Advances in Neural Information Processing Systems 13, eds. T. K. Leen, T. G. Dietterich, and V. Tresp, MIT Press (2001).
[152]
J. S. Yedidia, W. T. Freeman, and Y. Weiss. 2002. Understanding Belief Propagation and its Generalizations. Technical Report. Mitsubishi Electric Research Laboratories. 239--269.
[153]
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. 2008. Sybillimit: A near-optimal social network defense against sybil attacks. In Proceedings of the IEEE Symposium on Security and Privacy (S&P). 3--17.
[154]
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. 2006. SybilGuard: Defending against sybil attacks via social networks. In Proceedings of the 2006 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM). 267--278.
[155]
H. Yu, Z. Shen, C. Miao, C. Leung, and D. Niyato. 2010. A survey of trust and reputation management systems in wireless communications. Proceedings of the IEEE 98(10) (2010), 1755--1772.
[156]
Y. Yu, K. Li, W. Zhou, and P. Li. 2012. Trust mechanisms in wireless sensor networks: Attack analysis and countermeasures. Journal of Network and Computer Applications 35, 3 (2012), 867--880. Special Issue on Trusted Computing and Communications.
[157]
W. Yuan, D. Guan, and Y.-K. Lee. April 2010. Improved trust-aware recommender system using small-worldness of trust networks. Knowledge-Based Systems 23 (April 2010), 232--238.
[158]
H. Zhang, T. N. Dinh, and M. T. Thai. 2013. Maximizing the spread of positive influence in online social networks. In Proceedings of the 33rd IEEE International Conference on Distributed Computing Systems (ICDCS). 317--326.
[159]
H. Zhu, B. A. Huberman, and Y. Luon. 2012. To switch or not to switch: Understanding social influence in online choices. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2257--2266.
[160]
C. Ziegler and G. Lausen. 2005. Propagation models for trust and distrust in social networks. Information Systems Frontiers 7, 4--5 (2005), 337--358.
[161]
Y. Zuo, W.-C. Hu, and T. O’Keefe. 2009. Trust computing for social networking. In Proceedings of the 6th International Conference on Information Technology: New Generations (ITNG). 1534--1539.

Cited By

View all
  • (2024)TrustGNN: Graph Neural Network-Based Trust Evaluation via Learnable Propagative and Composable NatureIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2023.327563435:10(14205-14217)Online publication date: Oct-2024
  • (2024)An Adaptive and Modular Blockchain Enabled Architecture for a Decentralized MetaverseIEEE Journal on Selected Areas in Communications10.1109/JSAC.2023.334543242:4(893-904)Online publication date: Apr-2024
  • (2024)Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever‐evolving relationshipsIET Communications10.1049/cmu2.1280718:17(1018-1048)Online publication date: 13-Oct-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 49, Issue 1
March 2017
705 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/2911992
  • Editor:
  • Sartaj Sahni
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 23 May 2016
Accepted: 01 February 2016
Revised: 01 November 2015
Received: 01 December 2014
Published in CSUR Volume 49, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Trusted graph
  2. analogy
  3. online social networks (OSNs)
  4. simplification
  5. trust evaluation
  6. trust models

Qualifiers

  • Survey
  • Research
  • Refereed

Funding Sources

  • Chinese Fundamental Research Funds for the Central Universities
  • ISTCP
  • NSFC
  • NSF

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)342
  • Downloads (Last 6 weeks)32
Reflects downloads up to 17 Oct 2024

Other Metrics

Citations

Cited By

View all
  • (2024)TrustGNN: Graph Neural Network-Based Trust Evaluation via Learnable Propagative and Composable NatureIEEE Transactions on Neural Networks and Learning Systems10.1109/TNNLS.2023.327563435:10(14205-14217)Online publication date: Oct-2024
  • (2024)An Adaptive and Modular Blockchain Enabled Architecture for a Decentralized MetaverseIEEE Journal on Selected Areas in Communications10.1109/JSAC.2023.334543242:4(893-904)Online publication date: Apr-2024
  • (2024)Dynamic Twitter friend grouping based on similarity, interaction, and trust to account for ever‐evolving relationshipsIET Communications10.1049/cmu2.1280718:17(1018-1048)Online publication date: 13-Oct-2024
  • (2024)Accident reduction through a privacy-preserving method on top of a novel ontology for autonomous vehicles with the support of modular arithmeticVehicular Communications10.1016/j.vehcom.2024.10073246(100732)Online publication date: Apr-2024
  • (2024)Exploring security and trust mechanisms in online social networks: An extensive reviewComputers & Security10.1016/j.cose.2024.103790140(103790)Online publication date: May-2024
  • (2024)Blockchain solutions for trustworthy decentralization in social networksComputer Networks10.1016/j.comnet.2024.110336244(110336)Online publication date: May-2024
  • (2024)Trustworthy decentralization based on blockchain tools for social network architecturesSocial Network Analysis and Mining10.1007/s13278-024-01252-714:1Online publication date: 10-May-2024
  • (2024)Popularity Prediction of Online Social Media Content: A Bibliometric AnalysisProceedings of the 12th International Conference on Soft Computing for Problem Solving10.1007/978-981-97-3180-0_20(311-325)Online publication date: 23-Jul-2024
  • (2024)An Overview of Graph Data Missing Value ImputationData Science and Information Security10.1007/978-981-97-1280-9_20(256-270)Online publication date: 3-Apr-2024
  • (2024)Influence Based Group Recommendation System in Personality and Dynamic TrustHCI International 2024 Posters10.1007/978-3-031-61966-3_6(50-57)Online publication date: 1-Jun-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media