Please wait a minute...
Frontiers of Computer Science

ISSN 2095-2228

ISSN 2095-2236(Online)

CN 10-1014/TP

Postal Subscription Code 80-970

2018 Impact Factor: 1.129

Front Comput Sci Chin    2011, Vol. 5 Issue (2) : 181-194    https://doi.org/10.1007/s11704-011-0323-4
RESEARCH ARTICLE
FlowTrust: trust inference with network flows
Guojun WANG1(), Jie WU2
1. School of Information Science and Engineering, Central South University, Changsha 410083, China; 2. Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USA
 Download: PDF(236 KB)   HTML
 Export: BibTeX | EndNote | Reference Manager | ProCite | RefWorks
Abstract

Web-based social networking is increasingly gaining popularity due to the rapid development of computer networking technologies. However, social networking applications still cannot obtain a wider acceptance by many users due to some unresolved issues, such as trust, security, and privacy. In social networks, trust is mainly studied whether a remote user behaves as expected by an interested user via other users, who are respectively named trustee, trustor, and recommenders. A trust graph consists of a trustor, a trustee, some recommenders, and the trust relationships between them. In this paper, we propose a novel FlowTrust approach to model a trust graph with network flows, and evaluate the maximum amount of trust that can flow through a trust graph using network flow theory. FlowTrust supports multi-dimensional trust. We use trust value and confidence level as two trust factors. We deduce four trust metrics from these two trust factors, which are maximum flow of trust value, maximum flow of confidence level, minimum cost of uncertainty with maximum flow of trust, and minimum cost of mistrust with maximum flow of confidence. We also propose three FlowTrust algorithms to normalize these four trust metrics. We compare our proposed FlowTrust approach with the existing RelTrust and CircuitTrust approaches. We show that all three approaches are comparable in terms of the inferred trust values. Therefore, FlowTrust is the best of the three since it also supports multi-dimensional trust.

Keywords trust inference      multi-dimensional trust      approximate algorithm      network flows      social networks     
Corresponding Author(s): WANG Guojun,Email:csgjwang@mail.csu.edu.cn   
Issue Date: 05 June 2011
 Cite this article:   
Guojun WANG,Jie WU. FlowTrust: trust inference with network flows[J]. Front Comput Sci Chin, 2011, 5(2): 181-194.
 URL:  
https://academic.hep.com.cn/fcs/EN/10.1007/s11704-011-0323-4
https://academic.hep.com.cn/fcs/EN/Y2011/V5/I2/181
1 J?sang A, Hayward R, Pope S. Trust network analysis with subjective logic. In: Proceedings of 29th Australasian Computer Science Conference . 2006, 85-94
2 Reiter M K, Stubblebine S G. Resilient authentication using path independence. IEEE Transactions on Computers , 1998, 47(12): 1351-1362
doi: 10.1109/12.737682
3 Flocchini P, Luccio F L. Routing in series parallel networks. Theory of Computing Systems , 2003, 36(2): 137-157
doi: 10.1007/s00224-002-1033-y
4 Colbourn C J. The Combinatorics of Network Reliability. New York: Oxford University Press, 1987
5 Siewiorec D P, Swarz R S. Reliable Computer Systems: Design and Evaluation, 3rd ed. Natick: A. K. Peters, Ltd., 1998
6 Hayt W, Kemmerly J, Durbin S, Engineering Circuit Analysis. 7th ed. New York: McGraw-Hill Higher Education, 2007
7 Hnativ A, Ludwig S A. Evaluation of trust in an eCommerce multi-agent system using fuzzy reasoning. In: Proceedings of 18th International Conference on Fuzzy Systems . 2009, 20-24
8 Liu G F, Wang Y, Orgun M. Trust Inference in complex trust-oriented social networks. In: Proceedings of 2009 International Conference on Computational Science and Engineering . 2009, 29-31
doi: 10.1109/CSE.2009.248
9 Mahoney G, Myrvold W, Shoja G C. Generic reliability trust model. In: Proceedings of 3rd Annual Conference on Privacy, Security and Trust . 2005, 113-120
10 Taherian M, Amini M, Jalili R. Trust inference in web-based social networks using resistive networks. In: Proceedings of 3rd International Conference on Internet and Web Applications and Services . 2008, 233-238
doi: 10.1109/ICIW.2008.41
11 Gefen D. Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database , 2002, 33(3): 38-53
doi: 10.1145/569905.569910
12 Griffiths N. Task delegation using experience-based multi-dimensional trust. In: Proceedings of 4th International Joint Conference on Autonomous Agents and Multiagent Systems . 2005, 489-496
13 Xiong L, Liu L. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering , 2004, 16(7): 843-857
doi: 10.1109/TKDE.2004.1318566
14 Wang G, Wu J. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Generation Computer Systems , 2011, 27(5): 529-538
doi: 10.1016/j.future.2010.04.015
15 Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation. In: Proceedings of 35th Annual Hawaii International Conference on System Sciences , 2002, 2431-2439
doi: 10.1109/HICSS.2002.994181
16 Theodorakopoulos G, Baras J S. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications , 2006, 24(2): 318-328
doi: 10.1109/JSAC.2005.861390
17 Sun Y L, Yu W, Han Z, Liu K J R. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications , 2006, 24(2): 305-317
18 Golbeck J, Hendler J. Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology , 2006, 6(4): 497-529
doi: 10.1145/1183463.1183470
19 Zuo Y J, Hu W C, O’Keefe T. Trust computing for social networking. In: Proceedings of 6th International Conference on Information Technology: New Generation . 2009, 1534-1539
20 Anantvalee T, Wu J. Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: Proceedings of 2007 IEEE International Conference on Communications . 2007, 3383-3388
doi: 10.1109/ICC.2007.560
21 Watts D J. Six Degrees: The Science of a Connected Age. New York: W. W. Norton & Company, 2004
[1] Gang WU, Zhiyong CHEN, Jia LIU, Donghong HAN, Baiyou QIAO. Task assignment for social-oriented crowdsourcing[J]. Front. Comput. Sci., 2021, 15(2): 152316-.
[2] Ildar NURGALIEV, Qiang QU, Seyed Mojtaba Hosseini BAMAKAN, Muhammad MUZAMMAL. Matching user identities across social networks with limited profile data[J]. Front. Comput. Sci., 2020, 14(6): 146809-.
[3] Kai LI, Guangyi LV, Zhefeng WANG, Qi LIU, Enhong CHEN, Lisheng QIAO. Understanding the mechanism of social tie in the propagation process of social network with communication channel[J]. Front. Comput. Sci., 2019, 13(6): 1296-1308.
[4] Zhongqing WANG, Shoushan LI, Guodong ZHOU. Personal summarization from profile networks[J]. Front. Comput. Sci., 2017, 11(6): 1085-1097.
[5] Yuan SU,Xi ZHANG,Lixin LIU,Shouyou SONG,Binxing FANG. Understanding information interactions in diffusion: an evolutionary game-theoretic perspective[J]. Front. Comput. Sci., 2016, 10(3): 518-531.
[6] Rong-Hua LI, Jianquan LIU, Jeffrey Xu YU, Hanxiong CHEN, Hiroyuki KITAGAWA. Co-occurrence prediction in a large location-based social network[J]. Front Comput Sci, 2013, 7(2): 185-194.
[7] Xiaolong ZHENG, Yongguang ZHONG, Daniel ZENG, Fei-Yue WANG. Social influence and spread dynamics in social networks[J]. Front Comput Sci, 2012, 6(5): 611-620.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed