Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article

TISoN: Trust Inference in Trust-Oriented Social Networks

Published: 26 April 2016 Publication History

Abstract

Trust systems represent a significant trend in decision support for social networks’ service provision. The basic idea is to allow users to rate each other even without being direct neighbours. In this case, the purpose is to derive a trust score for a given user, which could be of help to decide whether to trust other users or not. In this article, we investigate the properties of trust propagation within social networks, based on the notion of transitivity, and we introduce the TISoN model to generate and evaluate Trust Inference within online Social Networks. To do so, (i) we develop a novel TPS algorithm for Trust Path Searching where we define neighbours’ priority based on their direct trust degrees, and then select trusted paths while controlling the path length; and, (ii) we develop different TIM algorithms for Trust Inference Measuring and build a trust network. In addition, we analyse existing algorithms and we demonstrate that our proposed model better computes transitive trust values than do the existing models. We conduct extensive experiments on a real online social network dataset, Advogato. Experimental results show that our work is scalable and generates better results than do the pioneering approaches of the literature.

References

[1]
Samah Al-Oufi, Heung-Nam Kim, and Abdulmotaleb El-Saddik. 2012. A group trust metric for identifying people of trust in online social networks. Expert Systems with Applications 39, 18 (2012), 13173--13181.
[2]
Bruce Christianson and William S. Harbison. 1997. Why isn’t trust transitive? In Proceedings of the International Workshop on Security Protocols. Springer-Verlag, London, UK, 171--176.
[3]
Pranav Dandekar. 2010. Analysis and generative model for trust networks. Technique Report (2010), 1--5.
[4]
Jennifer Ann Golbeck. 2005. Computing and Applying Trust in Web-Based Social Networks. Ph.D. Dissertation. College Park, MD. AAI3178583.
[5]
Sana Hamdi, Alda Lopes Gançarski, Amel Bouzeghoub, and Sadok BenYahia. 2012. IRIS: A novel method of direct trust computation for generating trusted social networks. In Proceedings of the 11th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’12). 616--623.
[6]
Russel Hardin. 2004. Trust and Trustworthiness. Russell Sage Foundation.
[7]
Wenjun Jiang and Guojun Wang. 2011. SWTrust: Generating trusted graph for trust evaluation in online social networks. In Proceedings of the 10th IEEE International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom’11). IEEE Computer Society, 320--327.
[8]
Wenjun Jiang, Guojun Wang, and Jie Wu. 2014. Generating trusted graphs for trust evaluation in online social networks. Future Generation Computer Systems, 31 (2014), 48--58.
[9]
Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems Journal 43, 2 (2007), 618--644.
[10]
Audun Jøsang, Stephen Marsh, and Simon Pope. May 16-19, 2006. Exploring different types of trust propagation. In Proceedings of the 4th International Conference of Trust Management (iTrust’06). 179--192.
[11]
Audun Jøsang and Simon Pope. 2003. Analysing topologies of transitive trust. In Proceedings of the 2nd Usenixl Conference on File and Storage Technologies (FAST’03).
[12]
Audun Jøsang and Simon Pope. 2005. Semantic constraints for trust transitivity. In Proceedings of the Second Asia-Pacific Conferences on Conceptual Modelling, APCCM 2005, January 30 - February 4, 2005, Newcastle, Australia (CRPIT), Sven Hartmann and Markus Stumptner (Eds.), Vol. 43. Australian Computer Society, 59--68.
[13]
Mohsen Lesani and Niloufar Montazeri. 2009. Fuzzy trust aggregation and personalized trust inference in virtual social networks. Computational Intelligence Journal 25, 2 (2009), 51--83.
[14]
Guanfeng Liu. 2013. Trust Management in Online Social Networks. PhD Thesis, Department of Computing, Faculty of Science, Macquarie University, Sydney, Australia.
[15]
Paolo Massa and Paolo Avesani. 2005. Controversial users demand local trust metrics: An experimental study on epinions.com community. In Proceedings of the 20th National Conference on Artificial Intelligence and the 17th Innovative Applications of Artificial Intelligence Conference (AAAI’05). 121--126.
[16]
Paolo Massa and Kasper Souren. 2008. Trustlet, open research on trust metrics. In BIS 2008 Workshop Proceedings, Dominik Flejter, Sawomir Grzonkowski, Tomasz Kaczmarek, Marek Kowalkiewicz, Tadhg Nagle, and Jonny Parkes (Eds.). 31--43.
[17]
Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Reputation systems. Commun. ACM 43, 12 (Dec. 2000), 45--48.
[18]
Sini Ruohomaa, Lea Kutvonen, and Eleni Koutrouli. 2007. Reputation management survey. In Proceedings of the 2nd International Conference on Availability, Reliability and Security (ARES’07). 103--111.
[19]
Alessandra Sala, Lili Cao, Christo Wilson, Robert Zablit, Haitao Zheng, and Ben Y. Zhao. 2010. Measurement-calibrated graph models for social network experiments. In Proceedings of the 19th International Conference on World Wide Web (WWW’10). ACM, New York, NY, 861--870.
[20]
Saeedeh Shekarpour and S. D. Katebi. 2010. Modeling and evaluation of trust with an extension in semantic web. Journal of Web Semantics 8, 1 (2010), 26--36.
[21]
Mohsen Taherian, Morteza Amini, and Rasool Jalili. 2008. Trust inference in web-based social networks using resistive networks. In Proceedings of the 3rd International Conference on Internet and Web Applications and Services (ICIW’08). 233--238.
[22]
Chunqi Tian and Baijian Yang. 2011. R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks. Future Generation Computer Systems 27, 8 (2011), 1135--1141.
[23]
Guojun Wang and Jie Wu. 2011. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Generation Computer Systems 27, 5 (2011), 529--538.
[24]
Cai-Nicolas Ziegler and Jennifer Golbeck. 2007. Investigating interactions of trust and interest similarity. Decision Support Systems Journal 43, 2 (2007), 460--475.

Cited By

View all
  • (2024)A Consequence of Social Entrepreneurial Intent: The Good LifeThe Journal of Entrepreneurship10.1177/0971355724125540333:2(330-364)Online publication date: 11-Jun-2024
  • (2024)Exploring security and trust mechanisms in online social networks: An extensive reviewComputers & Security10.1016/j.cose.2024.103790140(103790)Online publication date: May-2024
  • (2023)VANET Secure Reputation Evaluation & Management Model Based on Double Layer BlockchainApplied Sciences10.3390/app1309573313:9(5733)Online publication date: 6-May-2023
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Information Systems
ACM Transactions on Information Systems  Volume 34, Issue 3
Special Issue on Trust and Veracity of Information in Social Media
May 2016
110 pages
ISSN:1046-8188
EISSN:1558-2868
DOI:10.1145/2915200
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 26 April 2016
Accepted: 01 December 2015
Revised: 01 November 2015
Received: 01 March 2015
Published in TOIS Volume 34, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Indirect trust
  2. transitivity
  3. trust paths

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)24
  • Downloads (Last 6 weeks)0
Reflects downloads up to 30 Aug 2024

Other Metrics

Citations

Cited By

View all
  • (2024)A Consequence of Social Entrepreneurial Intent: The Good LifeThe Journal of Entrepreneurship10.1177/0971355724125540333:2(330-364)Online publication date: 11-Jun-2024
  • (2024)Exploring security and trust mechanisms in online social networks: An extensive reviewComputers & Security10.1016/j.cose.2024.103790140(103790)Online publication date: May-2024
  • (2023)VANET Secure Reputation Evaluation & Management Model Based on Double Layer BlockchainApplied Sciences10.3390/app1309573313:9(5733)Online publication date: 6-May-2023
  • (2023)Domain Adaptation Approach for Arabic Sarcasm Detection in Hotel Reviews based on Hybrid LearningProcedia Computer Science10.1016/j.procs.2023.10.385225(3898-3908)Online publication date: 2023
  • (2022)A hybrid trust model based on communication and social trust for vehicular social networksInternational Journal of Distributed Sensor Networks10.1177/1550132922109758818:5(155013292210975)Online publication date: 13-May-2022
  • (2022)A fuzzy trust measurement method considering patients' trust opinions in Internet plus HealthcareProcedia Computer Science10.1016/j.procs.2022.09.407207(3488-3498)Online publication date: 2022
  • (2022)A novel trust prediction approach for online social networks based on multifaceted feature similarityCluster Computing10.1007/s10586-022-03617-z25:6(3829-3843)Online publication date: 1-Dec-2022
  • (2021)ML-ELM-NeuralWalk: Trust Evaluation for Online Social NetworksComputer Science and Application10.12677/CSA.2021.11202711:02(266-276)Online publication date: 2021
  • (2021)Trust Prediction for Online Social Networks with Integrated Time-Aware SimilarityACM Transactions on Knowledge Discovery from Data10.1145/344768215:6(1-30)Online publication date: 19-May-2021
  • (2021)How Much I Can Rely on You: Measuring Trustworthiness of a Twitter UserIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2019.292978218:2(949-966)Online publication date: 1-Mar-2021
  • Show More Cited By

View Options

Get Access

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media