Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
research-article
Public Access

Measurement Theory-Based Trust Management Framework for Online Social Communities

Published: 24 March 2017 Publication History

Abstract

We propose a trust management framework based on measurement theory to infer indirect trust in online social communities using trust’s transitivity property. Inspired by the similarities between human trust and measurement, we propose a new trust metric, composed of impression and confidence, which captures both trust level and its certainty. Furthermore, based on error propagation theory, we propose a method to compute indirect confidence according to different trust transitivity and aggregation operators. We perform experiments on two real data sets, Epinions.com and Twitter, to validate our framework. Also, we show that inferring indirect trust can connect more pairs of users.

References

[1]
A. Abdul-Rahman and S. Hailes. 2000. Supporting trust in virtual communities. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences, 2000. Vol. 1.
[2]
Sibel Adali, Fred Sisenda, and Malik Magdon-Ismail. 2012. Actions speak as loud as words: Predicting relationships from social behavior data. In Proceedings of the 21st International Conference on World Wide Web. ACM, 689--698.
[3]
Abdullah Almaatouq, Ahmad Alabdulkareem, Mariam Nouh, Erez Shmueli, Mansour Alsaleh, Vivek K. Singh, Abdulrahman Alarifi, Anas Alfaris, and Alex (Sandy) Pentland. 2014. Twitter: Who gets caught? observed trends in social micro-blogging spam. In Proceedings of the 2014 ACM Conference on Web Science (WebSci’14). 33--41.
[4]
Herman J. C. Berendsen. 2011. A Student’s Guide to Data and Error Analysis. Vol. 1. Cambridge University Press Cambridge, Cambridge.
[5]
Touhid Bhuiyan. 2013. Trust for Intelligent Recommendation. Springer, Heidelberg.
[6]
Johan Bollen, Huina Mao, and Xiaojun Zeng. 2011. Twitter mood predicts the stock market. J. Comput. Sci. 2, 1 (2011), 1--8.
[7]
A. B. Can and B. Bhargava. 2013. SORT: A self-organizing trust model for peer-to-peer systems. IEEE Trans. Depend. Secure Comput. 10, 1 (Jan. 2013), 14--27.
[8]
Christiano Castelfranchi and Rino Falcone. 2010. Trust Theory: A Socio-Cognitive and Computational Model. Vol. 18. John Wiley 8 Sons, New York, NY.
[9]
Anthony A. Clifford. 1973. Multivariate Error Analysis. John Wiley 8 Sons, New York, NY.
[10]
Thomas F. Coleman and Jorge J. Moré. 1983. Estimation of sparse jacobian matrices and graph coloring blems. SIAM J. Numer. Anal. 20, 1 (1983), 187--209.
[11]
Manfred Drosg. 2009. Dealing with Uncertainties: A Guide to Error Analysis. Springer-Verlag, Berlin.
[12]
Jennifer Golbeck. 2005. Computing and Applying Trust in Web-based Social Networks. Ph.D. Dissertation. University of Maryland at College Park, College Park, MD.
[13]
Jennifer Golbeck. 2009. Trust and nuanced profile similarity in online social networks. ACM Trans. Web 3, 4, 12 (Sept. 2009).
[14]
Jennifer Golbeck and James Hendler. 2006. Inferring binary trust relationships in web-based social networks. ACM Trans. Internet Technol. 6, 4 (Nov. 2006), 497--529.
[15]
Kannan Govindan and Prasant Mohapatra. 2012. Trust computations and trust dynamics in mobile adhoc networks: A survey. IEEE Commun. Surv. Tutor. 14, 2 (2012), 279--298.
[16]
R. Guha, Ravi Kumar, Prabhakar Raghavan, and Andrew Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web (WWW’04). 403--412.
[17]
Chung-Wei Hang, Yonghong Wang, and Munindar P. Singh. 2009. Operators for propagating trust and their evaluation in social networks. In Proceedings of the 8th International Conference on Autonomous Agents and Multiagent Systems-Volume 2. International Foundation for Autonomous Agents and Multiagent Systems, 1025--1032.
[18]
Chung-Wei Hang, Zhe Zhang, and Munindar P. Singh. 2013. Shin: Generalized trust propagation with limited evidence. Computer 3 (2013), 78--85.
[19]
Christopher J. Hazard and Munindar P. Singh. 2013. Macau: A basis for evaluating reputation systems. In IJCAI.
[20]
Tad Hogg, Dennis M. Wilkinson, Gabor Szabo, and Michael J Brzozowski. 2008. Multiple relationship types in online communities and social networks. In Proceedings of the AAAI Spring Symposium: Social Information Processing. 30--35.
[21]
Paul W. Holland and Samuel Leinhardt. 1972. Holland and Leinhardt reply: Some evidence on the transitivity of positive interpersonal sentiment. American Journal of Sociology 77 (1972), 1205--1209.
[22]
C. Honey and S. C. Herring. 2009. Beyond microblogging: Conversation and collaboration via twitter. In Proceedings of the 42nd Hawaii International Conference on System Sciences, 2009 (HICSS’09). 1--10.
[23]
Jin Huang, Feiping Nie, Heng Huang, and Yi-Cheng Tu. 2012. Trust prediction via aggregating heterogeneous social networks. In Proceedings of the 21st ACM International Conference on Information and Knowledge Management (CIKM’12). 1774--1778.
[24]
Ifan Hughes and Thomas Hase. 2010. Measurements and Their Uncertainties: A Practical Guide to Modern Error Analysis. Oxford University Press, London.
[25]
Wenjun Jiang, Jie Wu, and Guojun Wang. 2015. On selecting recommenders for trust evaluation in online social networks. ACM Trans. Internet Technol. 15, 4, Article 14 (Nov. 2015).
[26]
Audun Jøsang. 1999. An algebra for assessing trust in certification chains. In NDSS, Vol. 99.
[27]
Audun Jøsang. 2001. A logic for uncertain probabilities. Int. J. Uncertain. Fuzziness Knowl.-Based Syst. 9, 3 (June 2001), 279--311.
[28]
Audun Jøsang, Elizabeth Gray, and Michael Kinateder. 2006. Simplification and analysis of transitive trust networks. Web Intell. Agent Syst. 4, 2 (Apr. 2006), 139--161.
[29]
Anubhav Kale, Amit Karandikar, Pranam Kolari, Akshay Java, Tim Finin, and Anupam Joshi. 2007. Modeling trust and influence in the blogosphere using link polarity. In Proceedings of the International Conference on Weblogs and Social Media (ICWSM’07).
[30]
Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web (WWW’03). 640--651.
[31]
Seungjoon Lee, R. Sherwood, and B. Bhattacharjee. 2003. Cooperative peer groups in NICE. In Proceedings of the INFOCOM 2003 22nd Annual Joint Conference of the IEEE Computer and Communications. IEEE Societies. Vol. 2. 1272--1282.
[32]
Bing Liu. 2010. Sentiment analysis and subjectivity. Handbook of Natural Language Processing 2 (2010), 627--666.
[33]
Stephen Paul Marsh. 1994. Formalising Trust as A Computational Concept. Ph.D. Dissertation. University of Stirling, Scotland, UK.
[34]
Paolo Massa and Paolo Avesani. 2007. Trust metrics on controversial users: Balancing between tyranny of the majority. Int. J. Semant. Web Inform. Syst. 3, 1 (2007), 39--64.
[35]
Paolo Massa and Paolo Avesani. 2009. Trust metrics in recommender systems. In Computing with Social Trust, Jennifer Golbeck (Ed.). Springer, London, 259--285.
[36]
Ueli Maurer. 1996. Modelling a public-key infrastructure. In Computer Security ESORICS 96, Elisa Bertino, Helmut Kurth, Giancarlo Martella, and Emilio Montolivo (Eds.). Lecture Notes in Computer Science, Vol. 1146. Springer, Berlin, 325--350.
[37]
Douglas C. Montgomery and George C. Runger. 2010. Applied Statistics and Probability for Engineers. John Wiley 8 Sons, New York, NY.
[38]
Millett Granger Morgan and Mitchell Small. 1992. Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis. Cambridge University Press, Cambridge.
[39]
Paul Resnick, Ko Kuwabara, Richard Zeckhauser, and Eric Friedman. 2000. Reputation systems. Commun. ACM 43, 12 (Dec. 2000), 45--48.
[40]
Matthew Richardson, Rakesh Agrawal, and Pedro Domingos. 2003. Trust management for the semantic web. In The Semantic Web (ISWC 2003), Dieter Fensel, Katia Sycara, and John Mylopoulos (Eds.). Lecture Notes in Computer Science, Vol. 2870. Springer, Berlin, 351--368.
[41]
Sebastian Ries. 2007. Certain trust: A trust model for users and agents. In Proceedings of the 2007 ACM Symposium on Applied Computing (SAC’07). 1599--1604.
[42]
Yefeng Ruan, L. Alfantoukh, and A. Durresi. 2015. Exploring stock market using twitter trust network. In Proceedings of the 2015 IEEE 29th International Conference on Advanced Information Networking and Applications (AINA’15). 428--433.
[43]
Yefeng Ruan and Arjan Durresi. 2016. A survey of trust management systems for online social communities—Trust modeling, trust inference and attacks. Knowledge-Based Systems 106 (2016), 150--163.
[44]
Yefeng Ruan, Arjan Durresi, and Lina Alfantoukh. 2016. Trust management framework for internet of things. In Proceedings of the 2016 IEEE 30th International Conference on Advanced Information Networking and Applications (AINA). 1013--1019.
[45]
Takeshi Sakaki, Makoto Okazaki, and Yutaka Matsuo. 2010. Earthquake shakes twitter users: Real-time event detection by social sensors. In Proceedings of the 19th International Conference on World wide web. ACM, 851--860.
[46]
Glenn Shafer et al. 1976. A Mathematical Theory of Evidence. Vol. 1. Princeton University Press Princeton, NJ.
[47]
M. Sirivianos, Kyungbaek Kim, and Xiaowei Yang. 2011. Socialfilter: Introducing social trust to collaborative spam mitigation. In Prodeedings of the INFOCOM 2011. 2300--2308.
[48]
Yan Sun, Wei Yu, Zhu Han, and K. J. R. Liu. 2005. Trust modeling and evaluation in ad hoc networks. In Proceedings of the 2005 IEEE Global Telecommunications Conference (GLOBECOM’05). Vol. 3.
[49]
Y. L. Sun, Wei Yu, Zhu Han, and K. J. R. Liu. 2006. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J. Select. Areas Commun. 24, 2 (Feb 2006), 305--317.
[50]
Alistair G. Sutcliffe, Di Wang, and Robin I. M. Dunbar. 2015. Modelling the role of trust in social relationships. ACM Trans. Internet Technol. 15, 4, 16 (Nov. 2015).
[51]
Jiliang Tang, Huiji Gao, Xia Hu, and Huan Liu. 2013. Exploiting homophily effect for trust prediction. In Proceedings of the 6th ACM International Conference on Web Search and Data Mining. ACM, 53--62.
[52]
Jiliang Tang, Xia Hu, Yi Chang, and Huan Liu. 2014. Predictability of distrust with interaction data. In Proceedings of the 23rd ACM International Conference on Conference on Information and Knowledge Management (CIKM’14). 181--190.
[53]
WT Luke Teacy, Jigar Patel, Nicholas R. Jennings, and Michael Luck. 2006. Travos: Trust and reputation in the context of inaccurate information sources. Auton. Agents Multi-Agent Syst. 12, 2 (2006), 183--198.
[54]
Mike Thelwall, Kevan Buckley, Georgios Paltoglou, Di Cai, and Arvid Kappas. 2010. Sentiment strength detection in short informal text. J. Am. Soc. Inf. Sci. Technol. 61, 12 (2010), 2544--2558.
[55]
G. Theodorakopoulos and J. S. Baras. 2006. On trust models and trust evaluation metrics for ad hoc networks. IEEE J. Select. Areas Commun. 24, 2 (Feb. 2006), 318--328.
[56]
Georgios E. Theodorakopoulos. 2007. Robust Network Trust Establishment for Collaborative Applications and Protocols. Ph.D. Dissertation. University of Maryland at College Park, College Park, MD.
[57]
H. Tosun and J. W. Sheppard. 2011. Incorporating evidence into trust propagation models using markov random fields. In Proceedings of the 2011 IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops). 263--269.
[58]
Patricia Victor, Chris Cornelis, and Martine De Cock. 2011. Trust Networks for Recommender Systems. Vol. 4. Springer, Heidelberg.
[59]
George Vogiatzis, Ian MacGillivray, and Maria Chli. 2010. A probabilistic model for trust and reputation. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: Volume 1. International Foundation for Autonomous Agents and Multiagent Systems, 225--232.
[60]
Hao Wang, Dogan Can, Abe Kazemzadeh, François Bar, and Shrikanth Narayanan. 2012. A system for real-time twitter sentiment analysis of 2012 us presidential election cycle. In Proceedings of the ACL 2012 System Demonstrations. Association for Computational Linguistics, 115--120.
[61]
Yonghong Wang, Chung-Wei Hang, and Munindar P. Singh. 2011. A probabilistic approach for maintaining trust based on evidence. J. Artif. Int. Res. 40, 1 (Jan. 2011), 221--267.
[62]
Yonghong Wang and Munindar P. Singh. 2006. Trust representation and aggregation in a distributed agent system. In Proceedings of the 21st National Conference on Artificial Intelligence (AAAI’06). AAAI Press, Boston, MA, 1425--1430.
[63]
Yonghong Wang and Munindar P. Singh. 2007. Formal trust model for multiagent systems. In Proceedings of the 20th International Joint Conference on Artifical Intelligence (IJCAI’07). Morgan Kaufmann, San Francisco, CA, 1551--1556.
[64]
Stanley Wasserman. 1994. Social Network Analysis: Methods and Applications. Vol. 8. Cambridge University Press, Cambridge.
[65]
G. Wierzowiecki and A. Wierzbicki. 2010. Efficient and correct trust propagation using closelook. In Proceedings of the 2010 IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI-IAT), Vol. 1. 676--681.
[66]
Yelp. 2014. Yelp competetion dataset. Retrieved from https://www.yelp.com/academic_dataset.
[67]
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. 2006. SybilGuard: Defending against sybil attacks via social networks. SIGCOMM Comput. Commun. Rev. 36, 4 (Aug. 2006), 267--278.
[68]
Guangwei Zhang, Jianchu Kang, and Rui He. 2005. Towards a trust model with uncertainty for e-commerce systems. In Proceedings of the IEEE International Conference on e-Business Engineering, 2005 (ICEBE’05).200--207.
[69]
Ping Zhang and A. Durresi. 2012. Trust management framework for social networks. In Proceedings of the 2012 IEEE International Conference on Communications (ICC’12). 1042--1047.
[70]
Tong Zhao, Chunping Li, Mengya Li, Qiang Ding, and Li Li. 2013. Social recommendation incorporating topic mining and social trust analysis. In Proceedings of the 22nd ACM International Conference on Information and Knowledge Management (CIKM’13). 1643--1648.
[71]
Cai-Nicolas Ziegler and Georg Lausen. 2005. Propagation models for trust and distrust in social networks. Inf. Syst. Front. 7, 4 (2005), 337--358.

Cited By

View all
  • (2024)E-SERS: An Enhanced Approach to Trust-Based Ranking of AppsSoftware10.3390/software30300133:3(250-270)Online publication date: 13-Jul-2024
  • (2024)Analysis of Motivational Theories in Crowdsourcing Using Long Tail Theory: A Systematic Literature ReviewInternational Journal of Crowd Science10.26599/IJCS.2023.91000108:1(10-27)Online publication date: Feb-2024
  • (2024)Causal Inference to Enhance AI Trustworthiness in Environmental Decision-MakingAdvanced Information Networking and Applications10.1007/978-3-031-57916-5_19(214-225)Online publication date: 9-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 17, Issue 2
Special Issue on Advances in Social Computing and Regular Papers
May 2017
249 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/3068849
  • Editor:
  • Munindar P. Singh
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 24 March 2017
Accepted: 01 November 2016
Revised: 01 November 2016
Received: 01 February 2016
Published in TOIT Volume 17, Issue 2

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Measurement theory
  2. online social communities
  3. trust inference operators
  4. trust management

Qualifiers

  • Research-article
  • Research
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)116
  • Downloads (Last 6 weeks)10
Reflects downloads up to 01 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)E-SERS: An Enhanced Approach to Trust-Based Ranking of AppsSoftware10.3390/software30300133:3(250-270)Online publication date: 13-Jul-2024
  • (2024)Analysis of Motivational Theories in Crowdsourcing Using Long Tail Theory: A Systematic Literature ReviewInternational Journal of Crowd Science10.26599/IJCS.2023.91000108:1(10-27)Online publication date: Feb-2024
  • (2024)Causal Inference to Enhance AI Trustworthiness in Environmental Decision-MakingAdvanced Information Networking and Applications10.1007/978-3-031-57916-5_19(214-225)Online publication date: 9-Apr-2024
  • (2024)LLM-Based Agents Utilized in a Trustworthy Artificial Conscience Model for Controlling AI in Medical ApplicationsAdvanced Information Networking and Applications10.1007/978-3-031-57870-0_18(198-209)Online publication date: 10-Apr-2024
  • (2023)Artificial intelligence control for trust‐based detection of attackers in 5G social networksComputational Intelligence10.1111/coin.1261840:1Online publication date: 25-Dec-2023
  • (2023)Trust management in online computing environment: a complete reviewJournal of Ambient Intelligence and Humanized Computing10.1007/s12652-023-04676-915:1(491-545)Online publication date: 14-Sep-2023
  • (2023)TRTCD: trust route prediction based on trusted community detectionMultimedia Tools and Applications10.1007/s11042-023-15096-482:27(41571-41607)Online publication date: 4-Apr-2023
  • (2023)Quantum Algorithms for Trust-Based AI ApplicationsComplex, Intelligent and Software Intensive Systems10.1007/978-3-031-35734-3_1(1-12)Online publication date: 19-Jun-2023
  • (2023)A Model for Artificial Conscience to Control Artificial IntelligenceAdvanced Information Networking and Applications10.1007/978-3-031-28451-9_14(159-170)Online publication date: 15-Mar-2023
  • (2023)To Be Trustworthy and To Trust: The New Frontier of Intelligent SystemsHandbook of Human‐Machine Systems10.1002/9781119863663.ch19(213-223)Online publication date: 7-Jul-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media