Trust Assessment in Online Social Networks

被引:28
作者
Liu, Guangchi [1 ]
Yang, Qing [2 ]
Wang, Honggang [3 ]
Liu, Alex X. [4 ]
机构
[1] Stratifyd Inc, Res & Dev Dept, Charlotte, NC 28209 USA
[2] Univ North Texas, Dept Comp Sci & Engn, Denton, TX 76207 USA
[3] Univ Massachusetts Dartmouth, Dept Elect & Comp Engn, N Dartmouth, MA 02747 USA
[4] Michigan State Univ, Dept Comp Sci & Engn, E Lansing, MI 48824 USA
基金
美国国家科学基金会;
关键词
Computational modeling; Social networking (online); Network topology; Topology; Peer-to-peer computing; Security; Uncertainty; Trust assessment; online social networks; three-valued subjective logic; trust model; PRIVACY;
D O I
10.1109/TDSC.2019.2916366
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Assessing trust in online social networks (OSNs) is critical for many applications such as online marketing and network security. It is a challenging problem, however, due to the difficulties of handling complex social network topologies and conducting accurate assessment in these topologies. To address these challenges, we model trust by proposing the three-valued subjective logic (3VSL) model. 3VSL properly models the uncertainties that exist in trust, thus is able to compute trust in arbitrary graphs. We theoretically prove the capability of 3VSL based on the Dirichlet-Categorical (DC) distribution and its correctness in arbitrary OSN topologies. Based on the 3VSL model, we further design the AssessTrust (AT) algorithm to accurately compute the trust between any two users connected in an OSN. We validate 3VSL against two real-world OSN datasets: Advogato and Pretty Good Privacy (PGP). Experimental results indicate that 3VSL can accurately model the trust between any pair of indirectly connected users in the Advogato and PGP.
引用
收藏
页码:994 / 1007
页数:14
相关论文
共 63 条
[51]  
Vogiatzis G., 2010, P 9 INT C AUT AG MUL, V1, P225
[52]  
Wang Y., 2006, P 21 NATL C ARTIFICI, V2, P1425
[53]   Evidence-Based Trust: A Mathematical Model Geared for Multiagent Systems [J].
Wang, Yonghong ;
Singh, Munindar P. .
ACM TRANSACTIONS ON AUTONOMOUS AND ADAPTIVE SYSTEMS, 2010, 5 (04)
[54]   A Probabilistic Approach for Maintaining Trust Based on Evidence [J].
Wang, Yonghong ;
Hang, Chung-Wei ;
Singh, Munindar P. .
JOURNAL OF ARTIFICIAL INTELLIGENCE RESEARCH, 2011, 40 :221-267
[55]  
Wang YH, 2007, 20TH INTERNATIONAL JOINT CONFERENCE ON ARTIFICIAL INTELLIGENCE, P1551
[56]  
Wei W, 2012, IEEE INFOCOM SER, P1951, DOI 10.1109/INFCOM.2012.6195572
[57]   Dynamic Trust Relationships Aware Data Privacy Protection in Mobile Crowd-Sensing [J].
Wu, Dapeng ;
Si, Shushan ;
Wu, Shaoen ;
Wang, Ruyan .
IEEE INTERNET OF THINGS JOURNAL, 2018, 5 (04) :2958-2970
[58]   Social Attribute Aware Incentive Mechanism for Device-to-Device Video Distribution [J].
Wu, Dapeng ;
Yan, Junjie ;
Wang, Honggang ;
Wu, Dalei ;
Wang, Ruyan .
IEEE TRANSACTIONS ON MULTIMEDIA, 2017, 19 (08) :1908-1920
[59]  
Yang DN, 2013, 19TH ACM SIGKDD INTERNATIONAL CONFERENCE ON KNOWLEDGE DISCOVERY AND DATA MINING (KDD'13), P713
[60]   SybilGuard: Defending against sybil attacks via social networks [J].
Yu, Haifeng ;
Kaminsky, Michael ;
Gibbons, Phillip B. ;
Flaxman, Abraham D. .
IEEE-ACM TRANSACTIONS ON NETWORKING, 2008, 16 (03) :576-589