Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1645953.1645958acmconferencesArticle/Chapter ViewAbstractPublication PagescikmConference Proceedingsconference-collections
research-article

StereoTrust: a group based personalized trust model

Published: 02 November 2009 Publication History

Abstract

Trust plays important roles in diverse decentralized environments, including our society at large. Computational trust models help to, for instance, guide users' judgements in online auction sites about other users; or determine quality of contributions in web 2.0 sites. Most of the existing trust models, however, require historical information about past behavior of a specific agent being evaluated - information that is not always available. In contrast, in real life interactions among users, in order to make the first guess about the trustworthiness of a stranger, we commonly use our "instinct" - essentially stereotypes developed from our past interactions with "similar" people. We propose StereoTrust, a computational trust model inspired by real life stereotypes. A user forms stereotypes using her previous transactions with other agents. A stereotype contains certain features of agents and an expected outcome of the transaction. These features can be taken from agents' profile information, or agents' observed behavior in the system. When facing a stranger, the stereotypes matching stranger's profile are aggregated to derive his expected trust. Additionally, when some information about stranger's previous transactions is available, StereoTrust uses it to refine the stereotype matching. According to our experiments, StereoTrust compares favorably with existing trust models that use different kind of information and more complete historical information. Moreover, because evaluation is done according to user's personal stereotypes, the system is completely distributed and the result obtained is personalized. StereoTrust can be used as a complimentary mechanism to provide the initial trust value for a stranger, especially when there is no trusted, common third parties.

References

[1]
L. Mui and M. Mohtashemi. A computational model of trust and reputation. In In Proceedings of the 35th HICSS, 2002.
[2]
A. Abdul-Rahman and S. Hailes. A distributed trust model. In NSPW '97: Proceedings of the 1997 workshop on New security paradigms, pages 48--60, New York, NY, USA, 1997. ACM.
[3]
K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In CIKM '01: Proceedings of the tenth international conference on Information and knowledge management, 2001.
[4]
R. Bartoszynski and M. Niewiadomska-Bugaj. Probability and statistical inference. Wiley-Interscience, 2008.
[5]
S. Buchegger and J.-Y. L. Boudec. A robust reputation system for p2p and mobile ad-hoc networks. In Proceedings of P2PEcon, 2004.
[6]
A. Datta, M. Hauswirth, and K. Aberer. Beyond "web of trust": Enabling p2p e-commerce. In Proceedings of the IEEE CEC, pages 24--27, 2003.
[7]
D. Gambetta. Can we trust trust? In D. Gambetta, editor, Trust: Making and Breaking Cooperative Relations. Basil Blackwell, 1988.
[8]
M. Gupta, P. Judge, and M. Ammar. A reputation system for peer-to-peer networks. In Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video, 2003.
[9]
A. J"osang, E. Gray, and M. Kinateder. Analysing topologies of transitive trust. In Proceedings of the Workshop of Formal Aspects of Security and Trust (FAST), page 150, 2003.
[10]
A. J"osang and R. Ismail. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference, June 2002.
[11]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In WWW '03: Proceedings of the 12th international conference on World Wide Web. ACM Press, 2003.
[12]
A. Ravichandran and J. Yoon. Trust management with delegation in grouped peer-to-peer communities. In SACMAT '06: Proceedings of the eleventh ACM symposium on Access control models and technologies, pages 71--80, New York, NY, USA, 2006. ACM.
[13]
J. Sabater and C. Sierra. Regret: reputation in gregarious societies. In AGENTS '01: Proceedings of the fifth international conference on Autonomous agents, pages 194--195, New York, USA, 2001.
[14]
S. Tadelis. Firm reputation with hidden information. Economic Theory, 2003.
[15]
J. Tirole. A theory of collective reputations (with applications to the persistence of corruption and to rm quality). Review of Economic Studies, 1996.
[16]
L. Xiong, L. Liu, and I. C. Society. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16:843--857, 2004.
[17]
Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst., 18(4):460--473, 2007.
[18]
Member-Zhou, Runfang and Fellow-Hwang, Kai.

Cited By

View all
  • (2023)The Role of Trust in Dependence Networks: A Case StudyInformation10.3390/info1412065214:12(652)Online publication date: 7-Dec-2023
  • (2023)Exploiting autonomy in a User-IoT system collaborative trust modelInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2023.2234166(1-13)Online publication date: 24-Jul-2023
  • (2022)Personalized multi-faceted trust modeling to determine trust links in social media and its potential for misinformation managementInternational Journal of Data Science and Analytics10.1007/s41060-021-00294-w13:4(399-425)Online publication date: 22-Jan-2022
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
CIKM '09: Proceedings of the 18th ACM conference on Information and knowledge management
November 2009
2162 pages
ISBN:9781605585123
DOI:10.1145/1645953
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 02 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. group
  2. reputation
  3. stereotypes
  4. trust model

Qualifiers

  • Research-article

Conference

CIKM '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 1,861 of 8,427 submissions, 22%

Upcoming Conference

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)11
  • Downloads (Last 6 weeks)0
Reflects downloads up to 02 Sep 2024

Other Metrics

Citations

Cited By

View all
  • (2023)The Role of Trust in Dependence Networks: A Case StudyInformation10.3390/info1412065214:12(652)Online publication date: 7-Dec-2023
  • (2023)Exploiting autonomy in a User-IoT system collaborative trust modelInternational Journal of Parallel, Emergent and Distributed Systems10.1080/17445760.2023.2234166(1-13)Online publication date: 24-Jul-2023
  • (2022)Personalized multi-faceted trust modeling to determine trust links in social media and its potential for misinformation managementInternational Journal of Data Science and Analytics10.1007/s41060-021-00294-w13:4(399-425)Online publication date: 22-Jan-2022
  • (2020)IoT Sensor Numerical Data Trust Model Using Temporal CorrelationIEEE Internet of Things Journal10.1109/JIOT.2019.29572017:4(2573-2581)Online publication date: Apr-2020
  • (2020)Recommendations In The Virtual Societies: Some Considerations2020 IEEE International Conference on Human-Machine Systems (ICHMS)10.1109/ICHMS49158.2020.9209507(1-4)Online publication date: Sep-2020
  • (2020)Evaluating agents’ trustworthiness within virtual societies in case of no direct experienceCognitive Systems Research10.1016/j.cogsys.2020.08.00564(164-173)Online publication date: Dec-2020
  • (2019)Identifying vulnerabilities in trust and reputation systemsProceedings of the 28th International Joint Conference on Artificial Intelligence10.5555/3367032.3367077(308-314)Online publication date: 10-Aug-2019
  • (2019)Selecting Trustworthy Partners by the Means of Untrustworthy Recommenders in Digitally Empowered SocietiesAdvances in Practical Applications of Survivable Agents and Multi-Agent Systems: The PAAMS Collection10.1007/978-3-030-24209-1_5(55-65)Online publication date: 26-Jun-2019
  • (2018)Addressing Concept Drift in Reputation AssessmentProceedings of the 17th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3237383.3238067(2048-2050)Online publication date: 9-Jul-2018
  • (2018) Sphinx : a Colluder-Resistant Trust Mechanism for Collaborative Intrusion Detection IEEE Access10.1109/ACCESS.2018.28802976(72427-72438)Online publication date: 2018
  • Show More Cited By

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media