Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges

被引:156
作者
Jiang, Wenjun [1 ]
Wang, Guojun [2 ]
Bhuiyan, Md Zakirul Alam [3 ]
Wu, Jie [3 ]
机构
[1] Hunan Univ, Coll Comp Sci & Elect Engn, Changsha 410082, Hunan, Peoples R China
[2] Guangzhou Univ, Sch Comp Sci & Educ Software, Guangzhou 510006, Guangdong, Peoples R China
[3] Temple Univ, Dept Comp & Informat Sci, Philadelphia, PA 19122 USA
关键词
Design; Reliability; Management; Trusted graph; trust evaluation; simplification; analogy; online social networks (OSNs); trust models; REPUTATION; MANAGEMENT; MODELS; PROPAGATION; DEFENSE; SYSTEMS; METRICS; SEARCH; ATTACK;
D O I
10.1145/2906151
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Online Social Networks (OSNs) are becoming a popular method of meeting people and keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to improve service quality and enhance user experiences. Much research has been done to evaluate trust and predict the trustworthiness of a target, usually from the view of a source. Graph-based approaches make up a major portion of the existing works, in which the trust value is calculated through a trusted graph (or trusted network, web of trust, or multiple trust chains). In this article, we focus on graph-based trust evaluation models in OSNs, particularly in the computer science literature. We first summarize the features of OSNs and the properties of trust. Then we comparatively review two categories of graph-simplification-based and graph-analogy-based approaches and discuss their individual problems and challenges. We also analyze the common challenges of all graph-based models. To provide an integrated view of trust evaluation, we conduct a brief review of its pre- and postprocesses (i.e., the preparation and validation of trust models, including information collection, performance evaluation, and related applications). Finally, we identify some open challenges that all trust models are facing.
引用
收藏
页数:35
相关论文
共 157 条
  • [1] Ahuja RK, 1993, Network flows
  • [2] Altman A, 2005, 19TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE (IJCAI-05), P917
  • [3] Amatriain X., 2012, ACM SIGKDD Explorations Newsletter, V14, P37
  • [4] Andersen R., 2008, WWW2008, P199, DOI DOI 10.1145/1367497.1367525
  • [5] [Anonymous], 2005, Computing applying trust in web-based social networks, DOI DOI 10.1016/j.physa.2012.03.021
  • [6] [Anonymous], 2004, Proceedings of the 13th International Conference on World Wide Web, DOI DOI 10.1145/988672.988727
  • [7] [Anonymous], 2011, IEEE COMMUNICATIONS
  • [8] [Anonymous], 2010, P 16 ACM SIGKDD INT, DOI DOI 10.1145/1835804.1835934
  • [9] [Anonymous], 2012, P 21 INT C WORLD WID, DOI DOI 10.1145/2187836.2187907
  • [10] [Anonymous], 1999, P NETW DISTR SYST SE