|
|
FlowTrust: trust inference with network flows |
Guojun WANG1( ), Jie WU2 |
1. School of Information Science and Engineering, Central South University, Changsha 410083, China; 2. Department of Computer and Information Sciences, Temple University, Philadelphia, PA 19122, USA |
|
|
Abstract Web-based social networking is increasingly gaining popularity due to the rapid development of computer networking technologies. However, social networking applications still cannot obtain a wider acceptance by many users due to some unresolved issues, such as trust, security, and privacy. In social networks, trust is mainly studied whether a remote user behaves as expected by an interested user via other users, who are respectively named trustee, trustor, and recommenders. A trust graph consists of a trustor, a trustee, some recommenders, and the trust relationships between them. In this paper, we propose a novel FlowTrust approach to model a trust graph with network flows, and evaluate the maximum amount of trust that can flow through a trust graph using network flow theory. FlowTrust supports multi-dimensional trust. We use trust value and confidence level as two trust factors. We deduce four trust metrics from these two trust factors, which are maximum flow of trust value, maximum flow of confidence level, minimum cost of uncertainty with maximum flow of trust, and minimum cost of mistrust with maximum flow of confidence. We also propose three FlowTrust algorithms to normalize these four trust metrics. We compare our proposed FlowTrust approach with the existing RelTrust and CircuitTrust approaches. We show that all three approaches are comparable in terms of the inferred trust values. Therefore, FlowTrust is the best of the three since it also supports multi-dimensional trust.
|
Keywords
trust inference
multi-dimensional trust
approximate algorithm
network flows
social networks
|
Corresponding Author(s):
WANG Guojun,Email:csgjwang@mail.csu.edu.cn
|
Issue Date: 05 June 2011
|
|
1 |
J?sang A, Hayward R, Pope S. Trust network analysis with subjective logic. In: Proceedings of 29th Australasian Computer Science Conference . 2006, 85-94
|
2 |
Reiter M K, Stubblebine S G. Resilient authentication using path independence. IEEE Transactions on Computers , 1998, 47(12): 1351-1362 doi: 10.1109/12.737682
|
3 |
Flocchini P, Luccio F L. Routing in series parallel networks. Theory of Computing Systems , 2003, 36(2): 137-157 doi: 10.1007/s00224-002-1033-y
|
4 |
Colbourn C J. The Combinatorics of Network Reliability. New York: Oxford University Press, 1987
|
5 |
Siewiorec D P, Swarz R S. Reliable Computer Systems: Design and Evaluation, 3rd ed. Natick: A. K. Peters, Ltd., 1998
|
6 |
Hayt W, Kemmerly J, Durbin S, Engineering Circuit Analysis. 7th ed. New York: McGraw-Hill Higher Education, 2007
|
7 |
Hnativ A, Ludwig S A. Evaluation of trust in an eCommerce multi-agent system using fuzzy reasoning. In: Proceedings of 18th International Conference on Fuzzy Systems . 2009, 20-24
|
8 |
Liu G F, Wang Y, Orgun M. Trust Inference in complex trust-oriented social networks. In: Proceedings of 2009 International Conference on Computational Science and Engineering . 2009, 29-31 doi: 10.1109/CSE.2009.248
|
9 |
Mahoney G, Myrvold W, Shoja G C. Generic reliability trust model. In: Proceedings of 3rd Annual Conference on Privacy, Security and Trust . 2005, 113-120
|
10 |
Taherian M, Amini M, Jalili R. Trust inference in web-based social networks using resistive networks. In: Proceedings of 3rd International Conference on Internet and Web Applications and Services . 2008, 233-238 doi: 10.1109/ICIW.2008.41
|
11 |
Gefen D. Reflections on the dimensions of trust and trustworthiness among online consumers. ACM SIGMIS Database , 2002, 33(3): 38-53 doi: 10.1145/569905.569910
|
12 |
Griffiths N. Task delegation using experience-based multi-dimensional trust. In: Proceedings of 4th International Joint Conference on Autonomous Agents and Multiagent Systems . 2005, 489-496
|
13 |
Xiong L, Liu L. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering , 2004, 16(7): 843-857 doi: 10.1109/TKDE.2004.1318566
|
14 |
Wang G, Wu J. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Generation Computer Systems , 2011, 27(5): 529-538 doi: 10.1016/j.future.2010.04.015
|
15 |
Mui L, Mohtashemi M, Halberstadt A. A computational model of trust and reputation. In: Proceedings of 35th Annual Hawaii International Conference on System Sciences , 2002, 2431-2439 doi: 10.1109/HICSS.2002.994181
|
16 |
Theodorakopoulos G, Baras J S. On trust models and trust evaluation metrics for ad hoc networks. IEEE Journal on Selected Areas in Communications , 2006, 24(2): 318-328 doi: 10.1109/JSAC.2005.861390
|
17 |
Sun Y L, Yu W, Han Z, Liu K J R. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE Journal on Selected Areas in Communications , 2006, 24(2): 305-317
|
18 |
Golbeck J, Hendler J. Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology , 2006, 6(4): 497-529 doi: 10.1145/1183463.1183470
|
19 |
Zuo Y J, Hu W C, O’Keefe T. Trust computing for social networking. In: Proceedings of 6th International Conference on Information Technology: New Generation . 2009, 1534-1539
|
20 |
Anantvalee T, Wu J. Reputation-based system for encouraging the cooperation of nodes in mobile ad hoc networks. In: Proceedings of 2007 IEEE International Conference on Communications . 2007, 3383-3388 doi: 10.1109/ICC.2007.560
|
21 |
Watts D J. Six Degrees: The Science of a Connected Age. New York: W. W. Norton & Company, 2004
|
|
Viewed |
|
|
|
Full text
|
|
|
|
|
Abstract
|
|
|
|
|
Cited |
|
|
|
|
|
Shared |
|
|
|
|
|
Discussed |
|
|
|
|