Abstract
Trust is a central component of social interactions among humans. Many applications motivate the consideration of trust evaluation in online social networks (OSNs). Some work has been proposed based on a trusted graph. However, it is still an open challenge to construct a trusted graph, especially in terms of selecting proper recommenders, which can be used to predict the trustworthiness of an unknown target efficiently and effectively. Based on the intuition that people who are close to and influential to us can make more proper and acceptable recommendations, we present the idea of recommendation-aware trust evaluation (RATE). We further model the recommender selection problem as an optimization problem, with the objectives of higher accuracy, lower risk (uncertainty), and lower cost. Four metrics: trustworthiness, expertise, uncertainty, and cost, are identified to measure and adjust the quality of recommenders. We focus on a 1-hop recommender selection, for which we propose the FluidTrust model to better illustrate the trust--decision making process of a user. We also discuss the extension of multihop scenarios and multitarget scenarios. Experimental results, with the real social network datasets of Epinions and Advogato, validate the effectiveness of RATE: it can predict trust with higher accuracy (it gains about 20% higher accuracy in Epinions), lower risk, and less cost (about a 30% improvement).
- C. Cao, J. She, Y. Tong, and L. Chen. 2012. Whom to ask? Jury selection for decision making tasks on micro-blog services. Proceedings of VLDB 5, 11, 1495--1506. Google Scholar
Digital Library
- R. I. M. Dunbar. 1992. Neocortex size as a constraint on group size in primates. Journal of Human Evolution 20, 469--493.Google Scholar
Cross Ref
- A. Etuk, T. J. Norman, M. Sensoy, C. Bisdikian, and M. Srivatsa. 2013. TIDY: A trust-based approach to information fusion through diversity. In Proceedings of the 16th International Conference on Information Fusion (FUSION). 1188--1195.Google Scholar
- J. Golbeck. 2005. Computing and Applying Trust in Web-Based Social Networks. Ph.D. dissertation. University of Maryland, College Park, MD. Google Scholar
Digital Library
- J. M. Jaffe. 1984. Algorithms for finding paths with multiple constraints. Networks 14, 95--116.Google Scholar
Cross Ref
- W. Jiang, G. Wang, and J. Wu. 2014. Generating trusted graphs for trust evaluation in online social networks. Future Generation Computer Systems 31, 48--58. Google Scholar
Digital Library
- W. Jiang, J. Wu, F. Li, G. Wang, and H. Zheng. 2015. Trust evaluation in online social networks using generalized flow. IEEE Transactions on Computers (TC). DOI:http://dx.doi.org/10.1109/TC.2015.2435785Google Scholar
- W. Jiang, J. Wu, and G. Wang. 2013. RATE: Recommendation-aware trust evaluation in online social networks. Proceedings of IEEE NCA. 149--152.Google Scholar
- W. Jiang, J. Wu, G. Wang, and H. Zheng. 2014. FluidRating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics. Proceedings of IEEE INFOCOM. 1707--1715.Google Scholar
- W. Jiang, J. Wu, G. Wang, and H. Zheng. 2015. Forming opinions via trusted friends: Time-evolving rating prediction using fluid dynamics. IEEE Transactions on Computers (TC). DOI:http://dx.doi.org/10.1109/TC.2015.2444842Google Scholar
- A. Jøsang, R. Hayward, and S. Pope. 2006. Trust network analysis with subjective logic. Proceedings of ACSC. 85--94. Google Scholar
Digital Library
- J. Kleinberg. 2000. The small-world phenomenon: An algorithmic perspective. Proceedings of the 32nd ACM Symposium on Theory of Computing. Google Scholar
Digital Library
- T. Korkmaz and M. Krunz. 2001. Multi-constrained optimal path selection. Proceedings of IEEE INFOCOM. 834--843.Google Scholar
- Z. Liang and W. Shi. 2008. Analysis of ratings on trust inference in open environments. Performance Evaluation 65, 2, 99--128. Google Scholar
Digital Library
- G. Liu, Y. Wang, M. A. Orgun, and E. Lim. 2010. A heuristic algorithm for trust-oriented service provider selection in complex social networks. In Proceedings of IEEE SCC. 130--137. DOI:http://dx.doi.org/10.1109/SCC.2010.47 Google Scholar
Digital Library
- G. Liu, Y. Wang, M. A. Orgun, and E. Lim. 2013. Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Transactions on Services Computing 6. 2, 152--167. Google Scholar
Digital Library
- G. Liu, Q. Yang, H. Wang, X. Lin, and M. Wittie. 2014. Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic. Proceedings of IEEE INFOCOM.Google Scholar
- P. Massa and P. Avesani. 2007a. Trust-aware recommender systems. In Proceedings of ACM RecSys. 17--24. Google Scholar
Digital Library
- P. Massa and P. Avesani. 2007b. Trust metrics on controversial users: Balancing between tyranny of the majority and echo chambers. International Journal on Semantic Web and Information Systems 3, 39--64.Google Scholar
Cross Ref
- M. Newman. 2010. Networks: An Introduction. Oxford University Press, New York, NY. Google Scholar
Digital Library
- S. Pushpa, K. S. Easwarakumar, S. Elias, and Z. Maamar. 2010. Referral based expertise search system in a time evolving social network. In Proc. Compute. Google Scholar
Digital Library
- M. Richardson, R. Agrawal, and P. Domingos. 2003. Trust management for the semantic web. Proceedings of ISWC 2870, 351--368.Google Scholar
- S. Schechter, S. Egelman, and R. W. Reeder. 2009. It's Not What You Know, but Who You Know: A Social Approach to Last-resort Authentication. In Proceedings of ACM SIGCHI. 1983--1992. Google Scholar
Digital Library
- M. Taherian, M. Amini, and R. Jalili. 2008. Trust inference in web-based social networks using resistive networks. Proceedings of ICIW 233--238. Google Scholar
Digital Library
- J. Tang, H. Gao, H. Liu, and A. D. Sarma. 2012. eTrust: Understanding trust evolution in an online world. In Proceedings of ACM KDD. Google Scholar
Digital Library
- G. Wang, W. Jiang, J. Wu, and Z. Xiong. 2014. Fine-grained feature-based social influence evaluation in online social networks. IEEE Transactions on Parallel and Distributed Systems 25(9) (2014), 2286--2296.Google Scholar
- G. Wang and J. Wu. 2011. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Generation Computer Systems 27, 5, 529--538. Google Scholar
Digital Library
- D. J. Watts. 1999. Small worlds: The dynamics of networks between order and randomness. Princeton University Press, Princeton, NJ. Google Scholar
Digital Library
- Wikipedia. 2015. Torricelli’s law. Retrieved October 21, 2015 from http://en.wikipedia.org/wiki/Torricelli's_law.Google Scholar
- P. Yolum and M. P. Singh. 2003. Emergent properties of referral systems. In Proceedings of AAMAS. ACM, New York, NY, 592--599. DOI:http://dx.doi.org/10.1145/860575.860670 Google Scholar
Digital Library
- P. Yolum and M. P. Singh. 2005. Engineering self-organizing referral networks for trustworthy service selection. IEEE Transactions on Systems, Man and Cybernetics, Part A: Systems and Humans 35, 3, 396--407. Google Scholar
Digital Library
- W. Yuan, D. Guan, and Y. Lee. 2010. Improved trust-aware recommender system using small-worldness of trust networks. Knowledge-Based Systems 23, 232--238. Google Scholar
Digital Library
Index Terms
On Selecting Recommenders for Trust Evaluation in Online Social Networks
Recommendations
Understanding Graph-Based Trust Evaluation in Online Social Networks: Methodologies and Challenges
Online Social Networks (OSNs) are becoming a popular method of meeting people and keeping in touch with friends. OSNs resort to trust evaluation models and algorithms to improve service quality and enhance user experiences. Much research has been done ...
Research on Trust Evaluation Model Based on TPM
FCST '09: Proceedings of the 2009 Fourth International Conference on Frontier of Computer Science and TechnologyTrusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and ...
A Machine Learning Based Trust Evaluation Framework for Online Social Networks
TRUSTCOM '14: Proceedings of the 2014 IEEE 13th International Conference on Trust, Security and Privacy in Computing and CommunicationsTrust in Online Social Networks is an increasing popular issue in the field of social computing. It has been widely used in scenarios such as e-commerce, friend recommendation and trust-based access control system. Several trust computing methods have ...






Comments