Advertisement

Social Trust Management

  • Alireza RezvanianEmail author
  • Behnaz Moradabadi
  • Mina Ghavipour
  • Mohammad Mehdi Daliri Khomami
  • Mohammad Reza Meybodi
Chapter
Part of the Studies in Computational Intelligence book series (SCI, volume 820)

Abstract

Since trust is one of the most important factors in forming social interactions, it is necessary in these networks to evaluate trust from one user to another indirectly connected user, using propagating trust along reliable trust paths between the two users. The quality of trust inference based on trust propagation is affected by the length of trust paths and also different aggregation and propagation strategies for propagating and combining trust values. In this chapter, we first review existing methods in the literature for the trust inference and then introduce two learning automata based trust propagation algorithms DLATrust and DyTrust in details. The algorithm DLATrust utilizes distributed learning automata to discover reliable trust paths and predict the trust value between two indirectly connected users. The algorithm DyTrust is a dynamic trust propagation algorithm based on distributed learning automata for inferring trust in stochastic trust networks. Since trust changes over time as a result of repeated direct interactions between users, trust networks can be modelled as stochastic graphs with continuous time-varying edge weights. Even though the dynamic nature of trust has been universally accepted in literature, existing trust propagation algorithms do not take the dynamicity of trust into consideration. These algorithms take an instant snapshot of trust network and then deterministically infer trust in the network snapshot. Due to being time consuming of trust propagation algorithms, it is highly probable that trust weights change during the algorithms’ running time and therefore the estimated trust values will not have enough accuracy. DyTrust is the first to address the dynamicity property of trust in the domain of trust inference. Considering the changes of trust weights in time, this algorithm finds the most reliable trust path to each neighboring user of target and estimates the trust value of the target based on its neighbors’ reliability.

References

  1. Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: Proceedings of the 33rd annual Hawaii international conference on system sciences. IEEE, p 9Google Scholar
  2. Al-Oufi S, Kim HN, El Saddik A (2012) A group trust metric for identifying people of trust in online social networks. Expert Syst Appl 39:13173–13181.  https://doi.org/10.1016/j.eswa.2012.05.084CrossRefGoogle Scholar
  3. Avesani P, Massa P, Symposium RT-P of the 2005 A, 2005 undefined 2005 (2005) A trust-enhanced recommender system application: Moleskiing. DlAcmOrg, pp 1589–1593Google Scholar
  4. Beigy H, Meybodi MR (2006) Utilizing distributed learning automata to solve stochastic shortest path problems. Int J Uncertain Fuzziness Knowl-Based Syst 14:591–615.  https://doi.org/10.1142/S0218488506004217MathSciNetCrossRefzbMATHGoogle Scholar
  5. Caverlee J, Liu L, Webb S (2008) Towards robust trust establishment in web-based social networks with socialtrust. In: Proceeding of the 17th international conference on World Wide Web—WWW ’08. ACM, p 1163Google Scholar
  6. Chen IR, Bao F, Chang M, Cho JH (2014) Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans Parallel Distrib Syst 25:1200–1210.  https://doi.org/10.1109/TPDS.2013.116CrossRefGoogle Scholar
  7. Cho JH, Swami A, Chen IR (2012) Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks. J Netw Comput Appl 35:1001–1012.  https://doi.org/10.1016/j.jnca.2011.03.016CrossRefGoogle Scholar
  8. Christianson B, Harbison WS (1996) Why isn’t trust transitive? In: International workshop on security protocols. Springer, pp 171–176Google Scholar
  9. Cook KS, Yamagishi T, Cheshire C et al (2005) Trust building via risk taking: a cross-societal experiment. Soc Psychol Q 68:121–142.  https://doi.org/10.1177/019027250506800202CrossRefGoogle Scholar
  10. Dillon TS, Chang E, Hussain FK (2004) Managing the dynamic nature of trust. IEEE Intell Syst 19:79–82CrossRefGoogle Scholar
  11. Fan ZP, Suo WL, Feng B, Liu Y (2011) Trust estimation in a virtual team: a decision support method. Expert Syst Appl 38:10240–10251.  https://doi.org/10.1016/j.eswa.2011.02.060CrossRefGoogle Scholar
  12. Fung C, Zhang J (2011) Dirichlet-based trust management for effective collaborative intrusion detection networks. Netw Serv 8:79–91CrossRefGoogle Scholar
  13. Ghavipour M, Meybodi MR (2018) A dynamic algorithm for stochastic trust propagation in online social networks: learning automata approach. Comput Commun 123:11–23.  https://doi.org/10.1016/j.comcom.2018.04.004CrossRefGoogle Scholar
  14. Golbeck J (2004) Inferring trust relationships in web-based social networks, 2006. Security 6:497–529Google Scholar
  15. Granovetter M (1985) Economic action and social structure: the problem of embeddedness. Am J Sociol 91:481–510.  https://doi.org/10.1002/9780470755679.ch5CrossRefGoogle Scholar
  16. Guo J, Chen I, Tsai JJP (2017) A Survey of trust computation models for service management in internet of things systems. Comput Commun 97:1–14CrossRefGoogle Scholar
  17. Huang F (2007) Building social trust: a human-capital approach. J Inst Theor Econ JITE 163:552–573CrossRefGoogle Scholar
  18. Hughes D, Coulson G, Walkerdine J (2005) Free riding on Gnutella revisited—the bell tolls (IEEE JNL 2005). IEEE Distrib Syst online 6Google Scholar
  19. Jang M-H, Faloutsos C, Kim S-W, et al (2016) PIN-TRUST: fast trust propagation exploiting positive, implicit, and negative information. In: Proceedings of the 25th ACM international on conference on information and knowledge management. ACM, pp 629–638Google Scholar
  20. Jiang LL, Perc M (2013) Spreading of cooperative behaviour across interdependent groups. Sci Rep 3.  https://doi.org/10.1038/srep02483
  21. Jiang W, Wang G, Wu J (2014) Generating trusted graphs for trust evaluation in online social networks. Futur Gener Comput Syst 31:48–58.  https://doi.org/10.1016/j.future.2012.06.010CrossRefGoogle Scholar
  22. Jiang W, Wu J, Wang G (2015) On selecting recommenders for trust evaluation in online social networks. ACM Trans Internet Technol 15:14.  https://doi.org/10.1145/2807697CrossRefGoogle Scholar
  23. Jiang W, Wu J, Li F et al (2016) Trust evaluation in online social networks using generalized network flow. IEEE Trans Comput 65:952–963.  https://doi.org/10.1109/TC.2015.2435785MathSciNetCrossRefzbMATHGoogle Scholar
  24. Jones AJI, Pitt J (2011) On the classification of emotions, and its relevance to the understanding of trust. In: Trust in agent societies (TRUST-2011), 14th edn, pp 69–82Google Scholar
  25. Jøsang A, Haller J (2007) Dirichlet reputation systems. In: Proceedings—second international conference on availability, reliability and security, ARES 2007. IEEE, pp 112–119Google Scholar
  26. Jøsang A, Ismail R, Jsang A, Ismail R (2002) The beta reputation system. In: Proceedings of the 15th bled electronic commerce conference. pp 41–55Google Scholar
  27. Jøsang A, Gray E, Kinateder M (2006) Simplification and analysis of transitive trust networks. Web Intell Agent Syst 4:1–26.  https://doi.org/10.1109/TDEI.2009.4784557CrossRefGoogle Scholar
  28. Jurca R, Faltings B (2003) An incentive compatible reputation mechanism.pdf. In: IEEE international conference on E-commerce, 2003. CEC 2003. IEEE, pp 285–292Google Scholar
  29. Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The Eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the twelfth international conference on World Wide Web—WWW ’03. ACM, p 640Google Scholar
  30. Kim YA (2015) An enhanced trust propagation approach with expertise and homophily-based trust networks. Knowledge-Based Syst 82:20–28.  https://doi.org/10.1016/j.knosys.2015.02.023CrossRefGoogle Scholar
  31. Kim YA, Song HS (2011) Strategies for predicting local trust based on trust propagation in social networks. Knowl-Based Syst 24:1360–1371.  https://doi.org/10.1016/j.knosys.2011.06.009CrossRefGoogle Scholar
  32. Kohavi R (1995) A study of cross-validation and bootstrap for accuracy estimation and model selection. In: Proceedings of the 14th international joint conference on artificial intelligence, vol 2, pp 1137–1143Google Scholar
  33. Kuter U, Golbeck J (2007) SUNNY: a new algorithm for trust inference in social networks, using probabilistic confidence models. In: Proceedings of the 22nd national conference on artificial intelligence (AAAI-07). pp 1377–1382Google Scholar
  34. Kuter U, Golbeck J (2010) Using probabilistic confidence models for trust inference in web-based social networks. ACM Trans Internet Technol 10:1–23.  https://doi.org/10.1145/1754393.1754397CrossRefGoogle Scholar
  35. Lakshmivarahan S, Thathachar MAL (1976) Bounds on the convergence probabilities of learning automata. IEEE Trans Syst Man, Cybern A Syst Humans 6:756–763MathSciNetzbMATHGoogle Scholar
  36. Lesani M, Montazeri N (2009) Fuzzy trust aggregation and personalized trust inference in virtual social networks. Comput Intell 25:51–83.  https://doi.org/10.1111/j.1467-8640.2009.00334.xMathSciNetCrossRefGoogle Scholar
  37. Levien R, Aiken A (1998) Attack-resistant trust metrics for public key certification. In: 7th USENIX security symposium. pp 229–241Google Scholar
  38. Li Q, Chen M, Perc M, et al (2013) Effects of adaptive degrees of trust on coevolution of quantum strategies on scale-free networks. Sci Rep 3.  https://doi.org/10.1038/srep02949
  39. Liu H, Lim E-P, Lauw HW, et al (2008) Predicting trusts among users of online communities. In: Proceedings of the 9th ACM conference on electronic commerce—EC ’08. ACM, p 310Google Scholar
  40. Liu X, Wang Y, Zhu S, Lin H (2013) Combating web spam through trust-distrust propagation with confidence. Pattern Recognit Lett 34:1462–1469.  https://doi.org/10.1016/j.patrec.2013.05.017CrossRefGoogle Scholar
  41. Lyu S, Liu J, Tang M et al (2015) Efficiently predicting trustworthiness of mobile services based on trust propagation in social networks. Mob Netw Appl 20:840–852.  https://doi.org/10.1007/s11036-015-0619-yCrossRefGoogle Scholar
  42. Maheswaran M, Hon CT, Ghunaim A (2007) Towards a gravity-based trust model for social networking systems. In: Proceedings—international conference on distributed computing systems. IEEE, p 24Google Scholar
  43. Massa P, Avesani P (2007) Trust metrics on controversial users. Int J Semant Web Inf Syst 3:39–64.  https://doi.org/10.4018/jswis.2007010103CrossRefGoogle Scholar
  44. Möllering G (2001) The nature of trust: from georg simmel to a theory of expectation, interpretation and suspension. Sociology 35:403–420.  https://doi.org/10.1017/S0038038501000190CrossRefGoogle Scholar
  45. Molm LD, Takahashi N, Peterson G (2000) Risk and trust in social exchange: an experimental test of a classical proposition. Am J Sociol 105:1396–1427.  https://doi.org/10.1086/210434CrossRefGoogle Scholar
  46. Mui L, Halberstadt A (2002) A computational model of trust and reputation. In: Proceedings of the 35th Hawaii international conference on system sciences. IEEE, pp 2431–2439Google Scholar
  47. Ortega FJ, Troyano JA, Cruz FL et al (2012) Propagation of trust and distrust for the detection of trolls in a social network. Comput Networks 56:2884–2895.  https://doi.org/10.1016/j.comnet.2012.05.002CrossRefGoogle Scholar
  48. Perc M, Grigolini P (2013) Collective behavior and evolutionary games—an introduction. Chaos Solitons Fractals 56:1–5.  https://doi.org/10.1016/j.chaos.2013.06.002MathSciNetCrossRefzbMATHGoogle Scholar
  49. Ren Y, Li M, Xiang Y et al (2013) Evolution of cooperation in reputation system by group-based scheme. J Supercomput 63:171–190.  https://doi.org/10.1007/s11227-010-0498-8CrossRefGoogle Scholar
  50. Resnick P, Varian HR (1997) Recommender Systems. Commun ACM 40:56–58CrossRefGoogle Scholar
  51. Resnick P, Iacovou N, Suchak M, et al (1994) GroupLens: An Open Architecture for Collaborative Filtering of Netnews. In: Proceedings of ACM 1994 conference on computer supported cooperative work. ACM, pp 175–186Google Scholar
  52. Richardson M, Agrawal R, Domingos P (2003) Trust Management for the Semantic Web. In: International semantic Web conference. Springer, pp 351–368Google Scholar
  53. Rotter JB (1967) A new scale for the measurement of interpersonal trust. J Pers 35:651–665.  https://doi.org/10.1111/j.1467-6494.1967.tb01454.xCrossRefGoogle Scholar
  54. Roussea DM, Sitkin SB, Burt RS, Camerer C (1998) Not so different after all: a cross-discipline view of trust. Acad Manag Rev 23:393–404CrossRefGoogle Scholar
  55. Shekarpour S, Katebi SD (2010) Modeling and evaluation of trust with an extension in semantic web. J Web Semant 8:26–36.  https://doi.org/10.1016/j.websem.2009.11.003CrossRefGoogle Scholar
  56. Sherchan W, Nepal S, Paris C (2013) A survey of trust in social networks. ACM Comput Surv 45:1–33.  https://doi.org/10.1145/2501654.2501661CrossRefGoogle Scholar
  57. Song S, Hwang K, Zhou R (2005) Trusted P2P transactions with fuzzy. IEEE Internet Comput 9:24–34CrossRefGoogle Scholar
  58. Su Z, Liu L, Li M, et al (2013) ServiceTrust: trust management in service provision networks. In: Proceedings—IEEE 10th international conference on services computing, SCC 2013. IEEE, pp 272–279Google Scholar
  59. Su Z, Li M, Fan X, et al (2014) Research on trust propagation models in reputation management systems. Math Probl Eng 2014.  https://doi.org/10.1155/2014/536717Google Scholar
  60. Thathachar MAL, Ramachandran KM (1985) Asymptotic behavior of a hierarchical system of learning automata. Inf Sci (Ny) 35:91–110.  https://doi.org/10.1016/0020-0255(85)90043-XMathSciNetCrossRefzbMATHGoogle Scholar
  61. Thathachar MAL, Sastry PS (2002) Varieties of learning automata: an overview. IEEE Trans Syst Man Cybern Part B Cybern 32:711–722.  https://doi.org/10.1109/TSMCB.2002.1049606CrossRefGoogle Scholar
  62. Vogiatzis G, MacGillivray I, Chli M (2010) A probabilistic model for trust and reputation. In: AAMAS ’10 Proceedings of the 9th international conference on autonomous agents and multiagent systems: volume 1, vol 1, pp 225–232Google Scholar
  63. von Laszewski G, Alunkal B, Veljkovic I (2005) Toward reputable grids. Scalable Comput Pract Exp 6:95–106Google Scholar
  64. Vydiswaran VGV, Zhai C, Roth D (2011) Content-driven trust propagation framework. In: Proceedings of the 17th ACM SIGKDD international conference on Knowledge discovery and data mining - KDD ’11. ACM, p 974Google Scholar
  65. Wang G, Wu J (2011) Multi-dimensional evidence-based trust management with multi-trusted paths. Futur Gener Comput Syst 27:529–538.  https://doi.org/10.1016/j.future.2010.04.015CrossRefGoogle Scholar
  66. Wishart R, Robinson R, Indulska J, Jøsang A (2005) Superstring Rep: reputation-enhanced service discovery. In: Proceedings of the twenty-eighth australasian conference on computer science-volume 38. Aust Comput Soc Inc. pp 49–57sGoogle Scholar
  67. Witkowski J (2011) Trust mechanisms for online systems (extended abstract). In: IJCAI international joint conference on artificial intelligence. pp 2866–2867Google Scholar
  68. Xiong L, L Ling (2004) PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans Knowl Data Eng 16:843–857.  https://doi.org/10.1109/TKDE.2004.1318566CrossRefGoogle Scholar
  69. Xiong L, Liu L (2003) A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]. In: Proceedings of the 4th ACM conference on electronic commerce—EC ’03. ACM Press, New York, NY, USA, p 228Google Scholar
  70. Yang X, Guo Y, Liu Y, Steck H (2014) A survey of collaborative filtering based social recommender systems. Comput Commun 41:1–27.  https://doi.org/10.1016/j.comcom.2013.06.009CrossRefGoogle Scholar
  71. Yin X, Zhang J, Wang X (2004) Sequential injection analysis system for the determination of arsenic by hydride generation atomic absorption spectrometry. Fenxi Huaxue 32:1365–1367.  https://doi.org/10.1017/CBO9781107415324.004CrossRefGoogle Scholar
  72. Yu B, Singh MP (2002) Distributed reputation management for electronic commerce. Comput Intell 18:535–549.  https://doi.org/10.1111/1467-8640.00202MathSciNetCrossRefGoogle Scholar
  73. Zhang J, Cohen R (2008) Evaluating the trustworthiness of advice about seller agents in e-marketplaces: a personalized approach. Electron Commer Res Appl 7:330–340.  https://doi.org/10.1016/j.elerap.2008.03.001CrossRefGoogle Scholar
  74. Zhang Y, Fang Y (2007) A fine-grained reputation system for reliable service selection in peer-to-peer networks. IEEE Trans Parallel Distrib Syst 18:1134–1145.  https://doi.org/10.1109/TPDS.2007.1043CrossRefGoogle Scholar
  75. Zhou R, Hwang K (2007) PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parallel Distrib Syst 18:460–473.  https://doi.org/10.1109/TPDS.2007.1021CrossRefGoogle Scholar

Copyright information

© Springer Nature Switzerland AG 2019

Authors and Affiliations

  • Alireza Rezvanian
    • 1
    • 2
    Email author
  • Behnaz Moradabadi
    • 2
  • Mina Ghavipour
    • 2
  • Mohammad Mehdi Daliri Khomami
    • 2
  • Mohammad Reza Meybodi
    • 2
  1. 1.School of Computer ScienceInstitute for Research in Fundamental Sciences (IPM)TehranIran
  2. 2.Computer Engineering and Information Technology DepartmentAmirkabir University of Technology (Tehran Polytechnic)TehranIran

Personalised recommendations