Abstract
In e-commerce environments, the trustworthiness of a seller is utterly important to potential buyers, especially when a seller is not known to them. Most existing trust evaluation models compute a single value to reflect the general trustworthiness of a seller without taking any transaction context information into account. With such a result as the indication of reputation, a buyer may be easily deceived by a malicious seller in a transaction where the notorious value imbalance problem is involved—in other words, a malicious seller accumulates a high-level reputation by selling cheap products and then deceives buyers by inducing them to purchase more expensive products.
In this article, we first present a trust vector consisting of three values for contextual transaction trust (CTT). In the computation of CTT values, three identified important context dimensions, including Product Category, Transaction Amount, and Transaction Time, are taken into account. In the meantime, the computation of each CTT value is based on both past transactions and the forthcoming transaction. In particular, with different parameters specified by a buyer regarding context dimensions, different sets of CTT values can be calculated. As a result, all of these trust values can outline the reputation profile of a seller that indicates the dynamic trustworthiness of a seller in different products, product categories, price ranges, time periods, and any necessary combination of them. We name this new model ReputationPro. Nevertheless, in ReputationPro, the computation of reputation profile requires new data structures for appropriately indexing the precomputation of aggregates over large-scale ratings and transaction data in three context dimensions, as well as novel algorithms for promptly answering buyers’ CTT queries. In addition, storing precomputed aggregation results consumes a large volume of space, particularly for a system with millions of sellers. Therefore, reducing storage space for aggregation results is also a great demand.
To solve these challenging problems, we first propose a new index scheme CMK-tree by extending the two-dimensional K-D-B-tree that indexes spatial data to support efficient computation of CTT values. Then, we further extend the CMK-tree and propose a CMK-treeRS approach to reducing the storage space allocated to each seller. The two approaches are not only applicable to three context dimensions that are either linear or hierarchical but also take into account the characteristics of the transaction-time model—that is, transaction data is inserted in chronological order. Moreover, the proposed data structures can index each specific product traded in a time period to compute the trustworthiness of a seller in selling a product. Finally, the experimental results illustrate that the CMK-tree is superior in efficiency of computing CTT values to all three existing approaches in the literature. In particular, while answering a buyer’s CTT queries for each brand-based product category, the CMK-tree has almost linear query performance. In addition, with significantly reduced storage space, the CMK-treeRS approach can further improve the efficiency in computing CTT values. Therefore, our proposed ReputationPro model is scalable to large-scale e-commerce Web sites in terms of efficiency and storage space consumption.
- D. J. Abadi, S. R. Madden, and N. Hachem. 2008. Column-stores vs. row-stores: How different are they really? In Proceedings of ACM SIGMOD. 967--980. Google Scholar
Digital Library
- S. Adali, R. Escriva, M. K. Goldberg, M. Hayvanovych, M. Magdon-Ismail, B. K. Szymanski, W. A. Wallace, and G. Williams. 2010. Measuring behavioral trust in social networks. In Proceedings of the IEEE International Conference on Intelligence and Security Informatics. 150--152.Google Scholar
- P. K. Agarwala, L. Argeb, S. Govindarajanc, J. Yanga, and K. Yi. 2012. Efficient external memory structures for range-aggregate queries. Computational Geometry 46, 3, 358--370. Google Scholar
Digital Library
- S. Ba and P. A. Pavlou. 2002. Evidence of the effect of trust building technology in electronic markets: Price premiums and buyer behavior. MIS Quarterly 26, 3, 243--268. Google Scholar
Digital Library
- R. Bayer and E. M. McCreight. 1972. Organization and maintenance of large ordered indices. Acta Informatica 1, 173--189. Google Scholar
Digital Library
- B. Becker, S. Gschwind, T. Ohler, B. Seeger, and P. Widmayer. 1996. An asymptotically optimal multiversion B-tree. International Journal on Very Large Data Bases 5, 4, 264--275. Google Scholar
Digital Library
- C. Böhm, S. Berchtold, and D. A. Keim. 2001. Searching in high-dimensional spaces: Index structures for improving the performance of multimedia databases. ACM Computing Surveys 33, 3, 322--373. Google Scholar
Digital Library
- A. Caballero, J. Botia, and A. Gomez-Skarmeta. 2007. On the behaviour of the TRSIM model for trust and reputation. In Proceedings of the German Conference on Multi-Agent System Technologies. 13--24. Google Scholar
Digital Library
- S. Chaudhuri and U. Dayal. 1997. An overview of data warehousing and OLAP technology. SIGMOD Record 26, 1, 65--74. Google Scholar
Digital Library
- E. Damiani, S. D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. 2002. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of ACM Conference on Computer and Communications Security. 207--216. Google Scholar
Digital Library
- E. Damiani, S. D. C. di Vimercati, P. Samarati, and M. Viviani. 2006. A WOWA-based aggregation technique on trust values connected to metadata. Electronic Notes in Theoretical Computer Science 157, 3, 131--142. Google Scholar
Digital Library
- C. Dellarocas. 2002. Goodwill hunting: An economically efficient online feedback mechanism for environments with variable product quality. In Proceedings of the Workshop on Agent-Mediated Electronic Commerce. 238--252. Google Scholar
Digital Library
- E. ElSalamouny, V. Sassone, and M. Nielsen. 2010. HMM-based trust model. In Formal Aspects of Security and Trust. Lecture Notes in Computer Science, Vol. 5983. Springer, 21--35. Google Scholar
Digital Library
- J. Golbeck and J. Hendler. 2006. Inferring binary trust relationships in Web-based social networks. ACM Transactions on Internet Technology 6, 4, 497--529. Google Scholar
Digital Library
- S. Govindarajan, P. K. Agarwal, and L. Arge. 2003. CRB-Tree: An efficient indexing scheme for range-aggregate queries. In Proceedings of the International Conference on Database Theory. 143--157. Google Scholar
Digital Library
- J. Gray, S. Chaudhuri, A. Bosworth, A. Layman, D. Reichart, and M. Venkatrao. 1996. Data cube: A relational aggregation operator generalizing group-by, cross-tab, and subtotals. In Proceedings of the International Conference on Data Engineering. 152--159. Google Scholar
Digital Library
- N. Griffiths. 2005. Task delegation using experience-based multi-dimensional trust. In Proceedings of ACM International Conference on Autonomous Agents and Multiagent Systems. 489--496. Google Scholar
Digital Library
- S. M. Habib, S. Ries, and M. Muhlhauser. 2011. Towards a trust management system for cloud computing. In Proceedings of the International Conference on Trust, Security, and Privacy in Computing and Communications. 933--939. Google Scholar
Digital Library
- F. Ham, E. Imana, A. Ondi, R. Ford, W. Allen, and M. Reedy. 2009. Reputation prediction in mobile ad hoc networks using RBF neural networks. In Proceedings of the International Conference on Engineering Applications of Neural Networks, Vol. 43. 485--494.Google Scholar
- V. Harinarayan, A. Rajaraman, and J. D. Ullman. 1996. Implementing data cubes efficiently. In Proceedings of ACM SIGMOD. 205--216. Google Scholar
Digital Library
- K. Hwang and D. Li. 2010. Trusted cloud computing with secure resources and data coloring. IEEE Internet Computing 14, 5, 14--22. Google Scholar
Digital Library
- A. Jøsang. 2001. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9, 3, 279--212. Google Scholar
Digital Library
- A. Jøsang and J. Golbeck. 2009. Challenges for robust trust and reputation systems. In Proceedings of the International Workshop on Security and Trust Management.Google Scholar
- A. Jøsang and R. Ismail. 2002. The beta reputation system. In Proceedings of the Bled Electronic Commerce Conference. Article No. 41.Google Scholar
- A. Jøsang, R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2, 618--644. Google Scholar
Digital Library
- M. Jurgens and H.-J. Lenz. 1998. The Ra*-tree: An improved R-tree with materialized data for supporting range queries on OLAP-Data. In Proceedings of the Workshop on Database and Expert Systems Applications. 186--191. Google Scholar
Digital Library
- S. Kamvar, M. Schlosser, and H. Garcia-Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the International World Wide Web Conference. 640--651. Google Scholar
Digital Library
- S. T. Kang, Y. D. Chung, and M. H. Kim. 2004. An efficient method for temporal aggregation with range-condition attributes. Information Sciences 168, 1--4, 243--265. Google Scholar
Digital Library
- R. Kerr and R. Cohen. 2006. Modelling trust using transactional, numerical units. In Proceedings of the ACM International Conference on Privacy, Security, and Trust. 21:1--21:11. Google Scholar
Digital Library
- D. J. Kim, D. L. Ferrin, and H. R. Rao. 2008. A trust-based consumer decision-making model in electronic commerce: The role of trust, perceived risk, and their antecedents. Decision Support Systems 44, 2, 342--353. Google Scholar
Digital Library
- L. Li and Y. Wang. 2010. Context based trust normalization in service-oriented environments. In Proceedings of the IEEE International Conference on Autonomic and Trusted Computing. 122--138. Google Scholar
Digital Library
- K.-I. Lin, H. V. Jagadish, and C. Faloutsos. 1994. The TV-tree—an index structure for high-dimensional data. International Journal on Very Large Data Bases 3, 517--542. Google Scholar
Digital Library
- W.-Y. Lin and I.-C. Kuo. 2004. A genetic selection algorithm for OLAP data cubes. Knowledge and Information Systems 6, 1, 83--102.Google Scholar
Cross Ref
- J. Liu and V. Issarny. 2004. Enhanced reputation mechanism for mobile ad hoc networks. In Proceedings of the International Conference on Trust Management. 48--62.Google Scholar
- X. Liu and A. Datta. 2012. Modeling context aware dynamic trust using hidden Markov model. In Proceedings of the AAAI Conference on Artificial Intelligence. 1938--1944.Google Scholar
- X. Liu, A. Datta, H. Fang, and J. Zhang. 2012. Detecting imprudence of ‘reliable’ sellers in online auction sites. In Proceedings of the IEEE International Conference on Trust, Security, and Privacy in Computing and Communications. 246--253. Google Scholar
Digital Library
- Z. Malik and A. Bouguettaya. 2009. RATEWEB: Reputation assessment for trust establishment among Web services. International Journal on Very Large Data Bases 18, 4, 885--911. Google Scholar
Digital Library
- S. P. Marsh. 1994. Formalising Trust as a Computational Concept. Ph.D. Dissertation. University of Stirling, Stirling, Scotland.Google Scholar
- L. Mui. 2003. Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. Ph.D. Dissertation. Massachusetts Institute of Technology, Cambridge, MA.Google Scholar
- T. H. Noor, Q. Z. Sheng, S. Zeadally, and J. Yu. 2013. Trust management of services in cloud environments: Obstacles and solutions. ACM Computing Surveys 46, 1, 1--30. Google Scholar
Digital Library
- B. C. Ooi, K.-L. Tan, C. Yu, and S. Bressan. 2000. Indexing the edges—a simple and yet efficient approach to high-dimensional indexing. In Proceedings of the ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. 166--174. Google Scholar
Digital Library
- D. Papadias, P. Kalnis, J. Zhang, and Y. Tao. 2001. Efficient OLAP operations in spatial data warehouses. In Proceedings of the International Symposium on Spatial and Temporal Databases. 443--459. Google Scholar
Digital Library
- D. Papadias, Y. F. Tao, P. Kalnis, and J. Zhang. 2002. Indexing spatio-temporal data warehouses. In Proceedings of the International Conference on Data Engineering. 166--175. Google Scholar
Digital Library
- M. Rehak, M. Pechoucek, and J. M. Bradshaw. 2006. Representing context for multiagent trust modeling. In Proceedings of the IEEE/WIC/ACM International Conference on Intelligent Agent Technology. 737--746. Google Scholar
Digital Library
- A. Rettinger, M. Nickles, and V. Tresp. 2011. Statistical relational learning of trust. Machine Learning 82, 2, 191--209. Google Scholar
Digital Library
- B. Rietjens. 2006. Trust and reputation on eBay: Towards a legal framework for feedback intermediaries. Information and Communications Technology Law 15, 1, 55--78.Google Scholar
Cross Ref
- J. Robinson. 1981. The K-D-B-Tree: A search structure for large multidimensional dynamic indexes. In Proceedings of ACM SIGMOD. 10--18. Google Scholar
Digital Library
- J. Sabater and C. Sierra. 2001. Regret: Reputation in gregarious societies. In Proceedings of the International Conference on Autonomous Agents. 194--195. Google Scholar
Digital Library
- J. Sabater and C. Sierra. 2005. Review on computational trust and reputation models. Artificial Intelligence Review 24, 1, 33--60. Google Scholar
Digital Library
- W. Sherchan, S. Nepal, and C. Paris. 2013. A survey of trust in social networks. ACM Computing Surveys 45, 4, 1--33. Google Scholar
Digital Library
- C. Sierra and J. Debenham. 2007. Information-based agency. In Proceedings of the International Joint Conference on Artificial Intelligence. 1513--1518. Google Scholar
Digital Library
- S. Spitz and Y. Tuchelmann. 2009. A trust model considering the aspects of time. In Proceedings of the International Conference on Computer and Electrical Engineering. 550--554. Google Scholar
Digital Library
- G. Suryanarayana and R. N. Taylor. 2002. A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications. Technical Report. University of California, Irvine.Google Scholar
- A. Swaminathan, R. G. Cattelan, Y. Wexler, C. V. Mathew, and D. Kirovski. 2010. Relating reputation and money in online markets. ACM Transactions on the Web 4, 4, 1--31. Google Scholar
Digital Library
- Y. Tao and D. Papadias. 2005. Historical spatio-temporal aggregation. ACM Transactions on Information Systems 23, 1, 61--102. Google Scholar
Digital Library
- Y. Tao, J. Zhang, D. Papadias, and N. Mamoulis. 2004. Range aggregate processing in spatial databases. IEEE Transactions on Knowledge and Data Engineering 16, 12, 1555--1570. Google Scholar
Digital Library
- S. Toivonen, G. Lenzini, and I. Uusitalo. 2006. Context-aware trust evaluation functions for dynamic reconfigurable systems. In Proceedings of the Models of Trust for the Web Workshop.Google Scholar
- M. Uddin, M. Zulkernine, and S. Ahamed. 2008. CAT: A context-aware trust model for open and dynamic systems. In Proceedings of the ACM Symposium on Applied Computing. 2024--2029. Google Scholar
Digital Library
- S. D. C. di Vimercati, S. Foresti, S. Jajodia, S. Paraboschi, G. Psaila, and P. Samarati. 2012. Integrating trust management and access control in data-intensive Web applications. ACM Transactions on the Web 6, 2, 6:1--6:43. Google Scholar
Digital Library
- L.-H. Vu, M. Hauswirth, and K. Aberer. 2005. QoS-based service selection and ranking with trust and reputation management. In Proceedings of the IEEE International Conference on Cooperative Information Systems. 466--483. Google Scholar
Digital Library
- J. Wang, J. Lu, Z. Fang, T. Ge, and C. Chen. 2013a. PL-Tree: An efficient indexing method for high-dimensional data. In Proceedings of the International Symposium on Spatial and Temporal Databases. 183--200. Google Scholar
Digital Library
- X. F. Wang, L. Liu, and J. Su. 2012. RLM: A general model for trust representation and aggregation. IEEE Transactions on Service Computing 5, 1, 131--143. Google Scholar
Digital Library
- Y. Wang and L. Li. 2011. Two-dimensional trust rating aggregations in service-oriented applications. IEEE Transactions on Service Computing 4, 4, 257--271. Google Scholar
Digital Library
- Y. Wang, L. Li, and G. Liu. 2013b. Social context-aware trust inference for trust enhancement in social network based recommendations on service providers. In World Wide Web. Springer, 1--26. DOI:http://dx.doi.org/10.1007/s11280-013-0241-5 Preprint. Google Scholar
Digital Library
- Y. Wang and E.-P. Lim. 2008. The evaluation of situational transaction trust in e-service environments. In Proceedings of the IEEE International Conference of Engineering and Business Education. 265--272. Google Scholar
Digital Library
- Y. Wang and K.-J. Lin. 2008. Reputation-oriented trustworthy computing in e-commerce environments. IEEE Internet Computing 12, 4, 55--59. Google Scholar
Digital Library
- Y. Wang, K.-J. Lin, D. S. Wong, and V. Varadharajan. 2009. Trust management towards service-oriented applications. Service Oriented Computing and Applications 3, 2, 129--146.Google Scholar
Cross Ref
- Y. Wang and M. P. Singh. 2007. Formal trust model for multiagent systems. In Proceedings of the International Joint Conference on Artificial Intelligence. 1551--1556. Google Scholar
Digital Library
- Y. Wang and V. Varadharajan. 2005a. Trust2: Developing trust in peer-to-peer environments. In Proceedings of the International Conference on Services Computing. 24--31. Google Scholar
Digital Library
- Y. Wang and V. Varadharajan. 2005b. Two-phase peer evaluation in P2P e-commerce environments. In Proceedings of the International Conference on e-Technology, e-Commerce, and e-Service. 654--657. Google Scholar
Digital Library
- Y. Wang and J. Vassileva. 2007. Toward Trust and Reputation Based Web Service Selection: A Survey. Technical Report. University of Saskatchewan, Saskatoon.Google Scholar
- L. Xiong and L. Liu. 2003. A reputation-based trust model for peer-to-peer ecommerce communities. In Proceedings of the IEEE International Conference on E-Commerce. 275--284. Google Scholar
Digital Library
- L. Xiong and L. Liu. 2004. PeerTrust: Supporting reputation-based trust in peer-to-peer communities. IEEE Transactions on Knowledge and Data Engineering 16, 7, 843--857. Google Scholar
Digital Library
- J. Yang and J. Widom. 2003. Incremental computation and maintenance of temporal aggregates. Proceedings of the International Conference on Very Large Data Bases 12, 3, 262--283. Google Scholar
Digital Library
- D. Zhang, D. Gunopulos, V. J. Tsotras, and B. Seeger. 2003. Temporal and spatio-temporal aggregations over data streams using multiple time granularities. Information Systems 28, 1--2, 61--84. Google Scholar
Digital Library
- D. Zhang, A. Markowetz, V. J. Tsotras, D. Gunopulos, and B. Seeger. 2001. Efficient computation of temporal aggregates with range predicates. In Proceedings of the ACM International Symposium on Principles of Database Systems. 237--245. Google Scholar
Digital Library
- D. Zhang, A. Markowetz, V. J. Tsotras, D. Gunopulos, and B. Seeger. 2002. Efficient aggregation over objects with extent. In Proceedings of the ACM International Symposium on Principles of Database Systems. 121--132. Google Scholar
Digital Library
- D. Zhang, A. Markowetz, V. J. Tsotras, D. Gunopulos, and B. Seeger. 2008. On computing temporal aggregates with range predicates. ACM Transactions on Database Systems 33, 2, 1--38. Google Scholar
Digital Library
- H. Zhang and Y. Wang. 2013. A novel model for contextual transaction trust computation with fixed storage space in e-commerce and e-service environments. In Proceedings of the IEEE International Conference on Services Computing. 667--674. Google Scholar
Digital Library
- H. Zhang, Y. Wang, and X. Zhang. 2011. Transaction similarity-based contextual trust evaluation in e-commerce and e-service environments. In Proceedings of the IEEE International Conference on Web Services. 500--507. Google Scholar
Digital Library
- H. Zhang, Y. Wang, and X. Zhang. 2012a. Efficient contextual transaction trust computation in e-commerce environments. In Proceedings of the IEEE International Conference on Trust, Security, and Privacy in Computing and Communications. 318--325. Google Scholar
Digital Library
- H. Zhang, Y. Wang, and X. Zhang. 2012b. A trust vector approach to transaction context-aware trust evaluation in e-commerce and e-service environments. In Proceedings of the IEEE International Conference on Service Oriented Computing and Applications. 1--8. Google Scholar
Digital Library
- H. Zhang, Y. Wang, and X. Zhang. 2014. The approaches to contextual transaction trust computation in e-commerce environments. Security and Communication Networks 7, 9, 1331--1351.Google Scholar
Digital Library
- J. Zhang. 2011. A survey on trust management for VANETs. In Proceedings of the IEEE International Conference on Advanced Information Networking and Applications. 105--112. Google Scholar
Digital Library
- C. Zouridaki, B. L. Mark, M. Hejmo, and R. K. Thomas. 2006. Robust cooperative trust establishment for MANETs. In Proceedings of the ACM Workshop on Security of Ad Hoc and Sensor Networks. 23--34. Google Scholar
Digital Library
Index Terms
ReputationPro: The Efficient Approaches to Contextual Transaction Trust Computation in E-Commerce Environments
Recommendations
Space Reduction for Contextual Transaction Trust Computation in E-Commerce and E-Service Environments
SCC '15: Proceedings of the 2015 IEEE International Conference on Services ComputingIn the literature, Contextual Transaction Trust computation (termed as CTT computation) is considered an effective approach to evaluate the trustworthiness of a seller. Specifically, it computes a seller's reputation profile to indicate his/her dynamic ...
A Novel Model for Contextual Transaction Trust Computation with Fixed Storage Space in E-Commerce and E-Service Environments
SCC '13: Proceedings of the 2013 IEEE International Conference on Services ComputingIn e-commerce and e-service environments, transaction context is important when evaluating the trust level of a seller or a service provider in a forthcoming transaction. However, most existing trust evaluation models compute a single value to reflect ...
The approaches to contextual transaction trust computation in e-Commerce environments
In e-commerce environments, the reputation of sellers is a crucial issue to potential buyers in making decisions. Most existing trust evaluation models compute a single value to reflect the general trust level of a seller without taking any transaction ...






Comments