Artificial Intelligence Review

, Volume 52, Issue 3, pp 1929–1960 | Cite as

TP-TA: a comparative analytical framework for trust prediction models in online social networks based on trust aspects

  • Aynaz KhaksariEmail author
  • MohammadReza Keyvanpour


Formation of online social network (OSN) strongly depends on the quality of relationships between its agents. Such relationships are affected by a host of factors; trust is one of them. To enhance the quality of relationships in such networks, it is important to find a mechanism to predict the degree of trust among participating agents since trust is the major driving force for initiating and developing social relationships. Although much effort has been made to develop quantitative techniques to obtain trust value, there is a lack of coherent classification of such techniques to achieve a macro vision of trust prediction models and identify their strengths and weaknesses. In this paper, we proposed TP-TA, an analytical framework which consists of three main components: First, classification of various existing trust prediction models in terms of trust aspects in the context of OSNs. Besides, main ideas, prospects, and challenges of each approach are highlighted for further research in this field. Second, defining general criteria to analyze our proposed classification. Finally, we illustrate a qualitative comparison between each approach which is a guide to understanding their superiority to one another. This framework could lead to an efficient selection of trust prediction techniques based on the nature of the target OSN and the intended trust type.


Online social networks Trust prediction Approaches Challenges Benefits Trust prediction model selection Analytical comparison 


  1. Abdessalem T, Cautis B, Souhli A (2010) Trust management in social networks. ISICILGoogle Scholar
  2. Adali MT (2013) Context in networks. Springer, New YorkGoogle Scholar
  3. Adali S, Escriva R, Goldberg MK, Hayvanovych M, Magdon-Ismail M, Szymanski BK, Wallace WA, Williams GT (2010) Measuring behavioral trust in social networks. In: 2010 IEEE international conference on intelligence and security informatics (ISI), Vancouver, BC, CanadaGoogle Scholar
  4. Alunkal BK (2003) Grid Eigen Trust: a framework for computing reputation in grids. In: Master’s thesis, Illinois Institute of TechnologyGoogle Scholar
  5. Anantharam P, Henson CA, Thirunarayan K (2010) Trust model for semantic sensor and social networks: a preliminary report. In: Proceedings of the IEEE national aerospace and electronics conferenceGoogle Scholar
  6. Avello DD, Brenes DJ (2010) Overcoming Spammers in Twitter—a tale of five algorithms. In: Conference on information retrievalGoogle Scholar
  7. Azadeh A, Kokabi R, Saberi M, Hussain FK, Hussain OK (2014) Trust prediction using z-numbers and artificial neural networks. In: IEEE international conference on fuzzy systems, Beijing, ChinaGoogle Scholar
  8. Beatty P, Reay I, Dick S, Miller J (2011) Consumer trust in e-commerce web sites: a meta-study. ACM Comput Surv (CSUR) 43(3). doi: 10.1145/1922649.1922651
  9. Bharadwaj KK, Al-Shamri MYH (2009) Fuzzy computational models for trust and reputation systems. Electron Commer Res Appl 8(1):37–47CrossRefGoogle Scholar
  10. Bhuiyan T, Josang A, Xu Y (2010) Trust and reputation management in web-based social network. In: Usmani Z-U-H (ed) Web intelligence and intelligent agents. InTech, Rijeka, pp 207–232Google Scholar
  11. Boyd DM, Ellison NB (2008) Social network sites: definition, history, and scholarship. J Comput Mediat Commun 13(1):210–230CrossRefGoogle Scholar
  12. Brandtzaeg PB, Lders M, Skjetne JH (2010) Too many Facebook friends? content sharing and sociability versus the need for privacy in social network sites. Int J Hum Comput Interact 26:1006–1030CrossRefGoogle Scholar
  13. Buskens V, Raub W (2008) Rational choice research on social dilemmas: EMBEDDEDNESS EFFECTS ON TRUST. In: Handbook of rational choice social researchGoogle Scholar
  14. Castelfranchi C (2009) A non-reductionist approach to trust. In: Golbeck J (ed) Computing with social trust. Springer, London Human-Computer Interaction SeriesGoogle Scholar
  15. Cho J-H, Chan K, Adali S (2015) A survey on trust modeling. ACM Comput Surv 48(2). doi: 10.1145/2815595
  16. ElSalamouny E, Sassone V, Nielsen M (2010) HMM-based trust model. In: Dimitrakos T, Martinelli F, Ryan PYA, Schneider S (eds) Formal aspects in security and trust. Springer, BerlinGoogle Scholar
  17. Fang H, Bao Y, Zhang J (2014) Leveraging decomposed trust in probabilistic matrix factorization for effective recommendation. In: Proceeding AAAI’14 proceedings of the twenty-eighth AAAI conference on artificial intelligence. AAAI Press, Qubec, Canada, pp 30–36Google Scholar
  18. Fawcett T (2006) An introduction to ROC analysis. Pattern Recogn Lett 27:861–874CrossRefGoogle Scholar
  19. Golbeck HJ (2004) Accuracy of metrics for inferring trust and reputation in semantic web-based social networks. In: Motta E (ed) Engineering knowledge in the age of the semantic web. Springer, BerlinGoogle Scholar
  20. Golbeck J (2005) Computing and applying trust in web-based social networks, Ph.D. dissertation. University of Maryland, College ParkGoogle Scholar
  21. Golbeck J (2006) Combining provenance with trust in social networks for semantic web content filtering. In: Provenance and annotation of data, pp 101–108Google Scholar
  22. Golbeck J, Hendler J (2006) Inferring binary trust relationships in Web-based social networks. ACM Trans Internet Technol 6(4):497–529CrossRefGoogle Scholar
  23. Grabner-Kruter S, Bitter S (2013) Trust in online social networks: a multifaceted perspective. Forum Soc Econ 44(1):48–68CrossRefGoogle Scholar
  24. Gray E, Seigneur J-M, Chen Y, Jensen C (2003) Trust propagation in small worlds. In: International conference on trust management, pp 239–254Google Scholar
  25. Guha R, Kumar R, Raghavan P, Tomkins A (2004) Propagation of trust and distrust. In: Proceedings of the 2005 ACM workshop on privacy in the electronic society, New York, NY, USAGoogle Scholar
  26. Huang Z, Ruj S, Cavenaghi MA, Stojmenovic M, Nayak A (2014) A social network approach to trust management in VANETs. Peer-to-Peer Netw Appl 7(3):229–242CrossRefGoogle Scholar
  27. Huynh TD, Jennings NR, Shadbolt NR (2006) An integrated trust and reputation model for open multi-agent systems. Auton Agents Multi-Agent Syst 13(2):119–154CrossRefGoogle Scholar
  28. Jiang W, Wang G, Bhuiyan MZA, Wu J (2016) Understanding graph-based trust evaluation in online social networks: methodologies and challenges. ACM Comput Surv 49(1). doi: 10.1145/2906151
  29. Jiang W, Wu J, Li F, Wang G, Zheng H (2015) Trust evaluation in online social networks using generalized network flow. IEEE Trans Comput 65(3):952–963MathSciNetCrossRefzbMATHGoogle Scholar
  30. Josang A (2002) A logic for uncertain probabilities. Int J Uncertain Fuzziness Knowl Based Syst 9(3):279–311MathSciNetCrossRefzbMATHGoogle Scholar
  31. Josang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In Proceeding ACSC ’06 proceedings of the 29th Australasian computer science conference, Darlinghurst, AustraliaGoogle Scholar
  32. Josang A, Ismail R (2002) The beta reputation system. In 15th Bled electronic commerce conference. Bled, SloveniaGoogle Scholar
  33. Josang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2):618–644CrossRefGoogle Scholar
  34. Josang A, Pope S (2005) Semantic constraints for trust transitivity. In: Proceedings of the 2nd Asia-Pacific conference on conceptual modelling, Darlinghurst, AustraliaGoogle Scholar
  35. Katz Y, Golbeck J (2006) Using social network-based trust for default reasoning on the web. J Web SemantGoogle Scholar
  36. Keung S, Griffiths N (2008) Using recency and relevance to assess trust and reputation. In: Proceedings of the AISB symposium on behavior regulation in multi-agent systems (BRMAS08), Aberdeen, UKGoogle Scholar
  37. Laat CD, Gross G, Gommans L, Vollbrecht J, Spence D (2000) Generic AAA architecture. Network working groupGoogle Scholar
  38. Lausen C, Ziegler G (2005) Propagation models for trust and distrust in social networks. Inf Syst Front 7(4–5):337–358Google Scholar
  39. Lesani M, Montazeri N (2009) Fuzzy trust aggregation and personalized trust inference in virtual social networks. Comput Intell 25(2):51–83MathSciNetCrossRefGoogle Scholar
  40. Levien R, Aiken A (1998) Attack-resistant trust metrics for public key certification. In: In Proceedings of the 7th USENIX security symposiumGoogle Scholar
  41. Liu X, Datta A, Lim E-P (2015) Computational trust models and machine learning. CRC Press, Chapman and Hall, Boca RatonGoogle Scholar
  42. Liu X, Datta A (2012) Modeling context aware dynamic trust using hidden Markov model. In: Proceedings of the twenty-sixth AAAI conference on artificial intelligenceGoogle Scholar
  43. Lumbreras A, Gavald R (2012) Applying trust metrics based on user interactions to recommendation in social networks. In: International conference on advances in social networks analysis and mining, IEEE Computer Society Washington, DC, USAGoogle Scholar
  44. Malik Z, Akbar I, Bouguettaya A (2009) Web services reputation assessment using a hidden Markov model. In: Proceedings of the 7th international joint conference on service-oriented computing, Stockholm, SwedenGoogle Scholar
  45. Marsh SP (1994) Formalising trust as a computational concept. University of Stirling, StirlingGoogle Scholar
  46. Massa P, Avesani P (2006) Trust-aware bootstrapping of recommender systems. In: Proceedings of 2006 ECAI workshop on recommender systemsGoogle Scholar
  47. Ma S, Wolfson O, Lin J (2011) A survey on trust management for intelligent transportation. In: Proceedings of the 4th ACM SIGSPATIAL international workshop on computational transportation science, New York, NY, USAGoogle Scholar
  48. Minhas UF, Zhang J, Tran T, Cohen R (2010) Intelligent Agents in mobile vehicular ad-hoc networks: leveraging trust modeling based on direct experience with incentives for honesty. In: IEEE/WIC/ACM international conference on web intelligence and intelligent agent technologyGoogle Scholar
  49. Moe MEG, Tavakolifard M, Knapskog SJ (2008) Learning trust in dynamic multiagent environments using HMMs. In: Proceedings of The 13th Nordic workshop on secure IT systems, Copenhagen, DenmarkGoogle Scholar
  50. Moe ME, Helvik BE, Knapskog SJ (2008) TSR: Trust-based secure manet routing using HMMs. In: Proceedings of the 4th ACM symposium on QoS and security for wireless and mobile networks, Vancouver, CanadaGoogle Scholar
  51. Moe M, Helvik BE, Knapskog S (2009) Comparison of the beta and the hidden markov models of trust in dynamic environments. International Federation for Information ProcessingGoogle Scholar
  52. Nepal S, Sherchan W, Bouguettaya A (2010) A behaviour-based trust model for service web. In: Service-oriented computing and applications (SOCA)Google Scholar
  53. Pourkazemi M, Keyvanpour M (2010) A survey on community detection methods based on the nature of social networks. In 3rd International eConference on computer and knowledge engineering (ICCKE)Google Scholar
  54. Quillian R (1968) Semantic memory. Semantic information processingGoogle Scholar
  55. Rousseau DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross-discipline view of trust. Acad Manag Rev 23(3):393–404CrossRefGoogle Scholar
  56. Sabater J, Sierra C (2001) REGRET: reputation in gregarious societies. In: Proceedings of the 5th international conference on autonomous agents, Montreal, Quebec, Canada, pp 194–195Google Scholar
  57. Sabater J, Sierra C (2005) Review on computational trust and reputation models. Artif Intell RevGoogle Scholar
  58. Sherchan W, Nepal S, Paris C (2013) A survey of trust in social networks. ACM Comput Surv 45(4):47CrossRefGoogle Scholar
  59. Shuiguang D, Huang Longtao X, Xindong GW, Zhaohui W (2016) On deep learning for trust-aware recommendations in social networks. IEEE Trans Neural Netw Learn Syst PP(99):1–14Google Scholar
  60. Sun YL, Liu KJR (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. In: PROCEEDINGS—IEEE INFOCOMGoogle Scholar
  61. Sztompka P (1999) Trust: a sociological theory. Cambridge University Press, CambridgeGoogle Scholar
  62. Tavakolifard M (2012) On some challenges for online trust and reputation systems, PhD ThesisGoogle Scholar
  63. Teacy WTL, Patel J, Jennings NR, Luck M (2006) TRAVOS: trust and reputation in the context of inaccurate information sources. Auton Agents Multi-Agent Syst 12(2):183–198CrossRefGoogle Scholar
  64. Victor P, Cornelis C, De Cock M (2011) Trust networks for recommender systems. Springer, BerlinCrossRefzbMATHGoogle Scholar
  65. Vincent B, Werner R (2008) Rational choice research on social dilemmas: embeddedness effects on trust. In: Nee V, Wittek R (eds) Handbook of rational choice social research. Russell Sage, New YorkGoogle Scholar
  66. Wang G, Wu J (2011) FlowTrust: trust inference with network flows. Front Comput Sci 5(2):181–194MathSciNetCrossRefzbMATHGoogle Scholar
  67. Xia W, Cao M, Johansson KH (2015) Structural balance and opinion separation in trust-mistrust social networks. IEEE Trans Control Netw Syst 3(1):46–56MathSciNetCrossRefzbMATHGoogle Scholar
  68. Yan Z, Holtmanns S (2007) Trust modeling and management: from social trust to digital trust. In: Computer security privacy and politics: current issues, challenges and solutions, IGI GlobalGoogle Scholar
  69. Yan Z, Kantola R, Shi G, Zhang P (2013) Unwanted content control via trust management in pervasive social networking. In: 2013 12th IEEE international conference on trust, security and privacy in computing and communicationsGoogle Scholar
  70. Yu B, Singh M (2002) An evidential model of distributed reputation management. In: Proceedings of the first international joint conference on Autonomous agents and multiagent systemsGoogle Scholar
  71. Zadeth LA (2011) A note on z-numbers. Int J Inf Sci 181(14):2923–2932Google Scholar
  72. Zheng X (2015) Trust prediction in online social networks, PhD Thesis, Macquarie UniversityGoogle Scholar
  73. Zheng X, Wang Y, Orgun MA, Liu G, Zhang H (2014) Social context-aware trust prediction in social networks. In: Basu S, Pautasso C, Zhang L, Fu X (eds) Service-oriented computing. Springer, BerlinGoogle Scholar

Copyright information

© Springer Science+Business Media B.V. 2017

Authors and Affiliations

  1. 1.Engineering DepartmentAlzahra UniversityTehranIran

Personalised recommendations