Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

On Selecting Recommenders for Trust Evaluation in Online Social Networks

Published: 26 November 2015 Publication History

Abstract

Trust is a central component of social interactions among humans. Many applications motivate the consideration of trust evaluation in online social networks (OSNs). Some work has been proposed based on a trusted graph. However, it is still an open challenge to construct a trusted graph, especially in terms of selecting proper recommenders, which can be used to predict the trustworthiness of an unknown target efficiently and effectively. Based on the intuition that people who are close to and influential to us can make more proper and acceptable recommendations, we present the idea of recommendation-aware trust evaluation (RATE). We further model the recommender selection problem as an optimization problem, with the objectives of higher accuracy, lower risk (uncertainty), and lower cost. Four metrics: trustworthiness, expertise, uncertainty, and cost, are identified to measure and adjust the quality of recommenders. We focus on a 1-hop recommender selection, for which we propose the FluidTrust model to better illustrate the trust--decision making process of a user. We also discuss the extension of multihop scenarios and multitarget scenarios. Experimental results, with the real social network datasets of Epinions and Advogato, validate the effectiveness of RATE: it can predict trust with higher accuracy (it gains about 20% higher accuracy in Epinions), lower risk, and less cost (about a 30% improvement).

References

[1]
C. Cao, J. She, Y. Tong, and L. Chen. 2012. Whom to ask? Jury selection for decision making tasks on micro-blog services. Proceedings of VLDB 5, 11, 1495--1506.
[2]
R. I. M. Dunbar. 1992. Neocortex size as a constraint on group size in primates. Journal of Human Evolution 20, 469--493.
[3]
A. Etuk, T. J. Norman, M. Sensoy, C. Bisdikian, and M. Srivatsa. 2013. TIDY: A trust-based approach to information fusion through diversity. In Proceedings of the 16th International Conference on Information Fusion (FUSION). 1188--1195.
[4]
J. Golbeck. 2005. Computing and Applying Trust in Web-Based Social Networks. Ph.D. dissertation. University of Maryland, College Park, MD.
[5]
J. M. Jaffe. 1984. Algorithms for finding paths with multiple constraints. Networks 14, 95--116.
[6]
W. Jiang, G. Wang, and J. Wu. 2014. Generating trusted graphs for trust evaluation in online social networks. Future Generation Computer Systems 31, 48--58.
[7]
W. Jiang, J. Wu, F. Li, G. Wang, and H. Zheng. 2015. Trust evaluation in online social networks using generalized flow. IEEE Transactions on Computers (TC).
[8]
W. Jiang, J. Wu, and G. Wang. 2013. RATE: Recommendation-aware trust evaluation in online social networks. Proceedings of IEEE NCA. 149--152.
[9]
W. Jiang, J. Wu, G. Wang, and H. Zheng. 2014. FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics. Proceedings of IEEE INFOCOM. 1707--1715.
[10]
W. Jiang, J. Wu, G. Wang, and H. Zheng. 2015. Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics. IEEE Transactions on Computers (TC).
[11]
A. Jøsang, R. Hayward, and S. Pope. 2006. Trust network analysis with subjective logic. Proceedings of ACSC. 85--94.
[12]
J. Kleinberg. 2000. The small-world phenomenon: An algorithmic perspective. Proceedings of the 32nd ACM Symposium on Theory of Computing.
[13]
T. Korkmaz and M. Krunz. 2001. Multi-constrained optimal path selection. Proceedings of IEEE INFOCOM. 834--843.
[14]
Z. Liang and W. Shi. 2008. Analysis of ratings on trust inference in open environments. Performance Evaluation 65, 2, 99--128.
[15]
G. Liu, Y. Wang, M. A. Orgun, and E. Lim. 2010. A heuristic algorithm for trust-oriented service provider selection in complex social networks. In Proceedings of IEEE SCC. 130--137.
[16]
G. Liu, Y. Wang, M. A. Orgun, and E. Lim. 2013. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing 6. 2, 152--167.
[17]
G. Liu, Q. Yang, H. Wang, X. Lin, and M. Wittie. 2014. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. Proceedings of IEEE INFOCOM.
[18]
P. Massa and P. Avesani. 2007a. Trust-aware recommender systems. In Proceedings of ACM RecSys. 17--24.
[19]
P. Massa and P. Avesani. 2007b. Trust metrics on controversial users: Balancing between tyranny of the majority and echo chambers. International Journal on Semantic Web and Information Systems 3, 39--64.
[20]
M. Newman. 2010. Networks: An Introduction. Oxford University Press, New York, NY.
[21]
S. Pushpa, K. S. Easwarakumar, S. Elias, and Z. Maamar. 2010. Referral based expertise search system in a time evolving social network. In Proc. Compute.
[22]
M. Richardson, R. Agrawal, and P. Domingos. 2003. Trust management for the semantic web. Proceedings of ISWC 2870, 351--368.
[23]
S. Schechter, S. Egelman, and R. W. Reeder. 2009. It's Not What You Know, but Who You Know: A Social Approach to Last-resort Authentication. In Proceedings of ACM SIGCHI. 1983--1992.
[24]
M. Taherian, M. Amini, and R. Jalili. 2008. Trust inference in web-based social networks using resistive networks. Proceedings of ICIW 233--238.
[25]
J. Tang, H. Gao, H. Liu, and A. D. Sarma. 2012. eTrust: Understanding trust evolution in an online world. In Proceedings of ACM KDD.
[26]
G. Wang, W. Jiang, J. Wu, and Z. Xiong. 2014. Fine-grained feature-based social influence evaluation in online social networks. IEEE Transactions on Parallel and Distributed Systems 25(9) (2014), 2286--2296.
[27]
G. Wang and J. Wu. 2011. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Generation Computer Systems 27, 5, 529--538.
[28]
D. J. Watts. 1999. Small worlds: The dynamics of networks between order and randomness. Princeton University Press, Princeton, NJ.
[29]
Wikipedia. 2015. Torricelli’s law. Retrieved October 21, 2015 from http://en.wikipedia.org/wiki/Torricelli's_law.
[30]
P. Yolum and M. P. Singh. 2003. Emergent properties of referral systems. In Proceedings of AAMAS. ACM, New York, NY, 592--599.
[31]
P. Yolum and M. P. Singh. 2005. Engineering self-organizing referral networks for trustworthy service selection. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 35, 3, 396--407.
[32]
W. Yuan, D. Guan, and Y. Lee. 2010. Improved trust-aware recommender system using small-worldness of trust networks. Knowledge-Based Systems 23, 232--238.

Cited By

View all
  • (2024)Exploring security and trust mechanisms in online social networks: An extensive reviewComputers & Security10.1016/j.cose.2024.103790140(103790)Online publication date: May-2024
  • (2022)A novel trust prediction approach for online social networks based on multifaceted feature similarityCluster Computing10.1007/s10586-022-03617-z25:6(3829-3843)Online publication date: 1-Dec-2022
  • (2021)Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect LevelACM Transactions on Knowledge Discovery from Data10.1145/344145115:4(1-29)Online publication date: 18-Apr-2021
  • Show More Cited By

Index Terms

  1. On Selecting Recommenders for Trust Evaluation in Online Social Networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Transactions on Internet Technology
    ACM Transactions on Internet Technology  Volume 15, Issue 4
    Special Issue on Trust in Social Networks and Systems
    December 2015
    88 pages
    ISSN:1533-5399
    EISSN:1557-6051
    DOI:10.1145/2851090
    • Editor:
    • Munindar P. Singh
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 26 November 2015
    Accepted: 01 July 2015
    Revised: 01 July 2015
    Received: 01 July 2014
    Published in TOIT Volume 15, Issue 4

    Permissions

    Request permissions for this article.

    Check for updates

    Author Tags

    1. Online social networks (OSNs)
    2. recommendation-aware
    3. recommender selection
    4. trust evaluation

    Qualifiers

    • Research-article
    • Research
    • Refereed

    Funding Sources

    • NSF
    • Chinese Fundamental Research Funds for the Central Universities
    • NSFC
    • ISTCP

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)23
    • Downloads (Last 6 weeks)4
    Reflects downloads up to 04 Oct 2024

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)Exploring security and trust mechanisms in online social networks: An extensive reviewComputers & Security10.1016/j.cose.2024.103790140(103790)Online publication date: May-2024
    • (2022)A novel trust prediction approach for online social networks based on multifaceted feature similarityCluster Computing10.1007/s10586-022-03617-z25:6(3829-3843)Online publication date: 1-Dec-2022
    • (2021)Exploiting Temporal Dynamics in Product Reviews for Dynamic Sentiment Prediction at the Aspect LevelACM Transactions on Knowledge Discovery from Data10.1145/344145115:4(1-29)Online publication date: 18-Apr-2021
    • (2021)GCNs-Based Context-Aware Short Text Similarity Model2020 25th International Conference on Pattern Recognition (ICPR)10.1109/ICPR48806.2021.9412460(1329-1335)Online publication date: 10-Jan-2021
    • (2020)Personalized Review Recommendation based on Users’ Aspect SentimentACM Transactions on Internet Technology10.1145/341484120:4(1-26)Online publication date: 6-Oct-2020
    • (2020)SSL-SVDACM Transactions on Internet Technology10.1145/336939020:1(1-20)Online publication date: 29-Jan-2020
    • (2020)Directional and Explainable Serendipity RecommendationProceedings of The Web Conference 202010.1145/3366423.3380100(122-132)Online publication date: 20-Apr-2020
    • (2020)Decentralized Trust ManagementACM Computing Surveys10.1145/336216853:1(1-33)Online publication date: 6-Feb-2020
    • (2020)Joint Route Selection and Charging Discharging Scheduling of EVs in V2G Energy NetworkIEEE Transactions on Vehicular Technology10.1109/TVT.2020.301811469:10(10630-10641)Online publication date: Oct-2020
    • (2020)Trust Evaluation Model Based on Statistical Tests in Social Network2020 International Conference on Advanced Science and Engineering (ICOASE)10.1109/ICOASE51841.2020.9436543(1-5)Online publication date: 23-Dec-2020
    • Show More Cited By

    View Options

    Get Access

    Login options

    Full Access

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media