ITEC 810 Workshop Paper: A Survey of Web-based Social Network Trust

Slides:



Advertisements
Similar presentations
Trust Management of Services in Cloud Environments:
Advertisements

Understanding Cancer-based Networks in Twitter using Social Network Analysis Dhiraj Murthy Daniela Oliveira Alexander Gross Social Network Innovation Lab.
TAODV: A Trusted AODV Routing Protocol for MANET Li Xiaoqi, GiGi March 22, 2004.
Trust and Reputation in Social Networks Laura Zavala 03/2010.
Location Based Trust for Mobile User – Generated Content : Applications, Challenges and Implementations Presented By : Anand Dipakkumar Joshi USC.
A Survey of Trust in Social Networks WANITA SHERCHAN, IBM Research-Australia SURYA NEPAL and CECILE PARIS CSIRO ICT Centre Presented by Jacob Couch.
Jean-Eudes Ranvier 17/05/2015Planet Data - Madrid Trustworthiness assessment (on web pages) Task 3.3.
Yuan Yao Joint work with Hanghang Tong, Xifeng Yan, Feng Xu, and Jian Lu MATRI: A Multi-Aspect and Transitive Trust Inference Model 1 May 13-17, WWW 2013.
1 Combining Provenance with Trust in Social Networks for Semantic Web Content Filtering Jennifer Golbeck University of Maryland, College Park May, 2006.
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
Search Engines and Information Retrieval
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Computing Trust in Social Networks
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Social Context Based Recommendation Systems and Trust Inference Student: Andrea Manrique ID: ITEC810, Macquarie University1 Advisor: A/Prof. Yan.
The Social Web: A laboratory for studying s ocial networks, tagging and beyond Kristina Lerman USC Information Sciences Institute.
Leveraging Big Data: Lecture 11 Instructors: Edith Cohen Amos Fiat Haim Kaplan Tova Milo.
Recommender Systems. >1,000,000,000 Finding Trusted Information How many cows in Texas?
WARNINGBIRD: A Near Real-time Detection System for Suspicious URLs in Twitter Stream.
Modeling and Predicting Personal Information Dissemination Behavior Authors: Ching-Yung Lin Belle L. Tseng Ming-Ting Sun Speaker: Yi-Ching Huang Authors:
Mark Levene, An Introduction to Search Engines and Web Navigation © Pearson Education Limited 2005 Slide 9.1 Chapter 9 : Social Networks What is a social.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
Search Engines and Information Retrieval Chapter 1.
1 Adaptive User Profiling Carolina Bailey
Popularity versus Similarity in Growing Networks Fragiskos Papadopoulos Cyprus University of Technology M. Kitsak, M. Á. Serrano, M. Boguñá, and Dmitri.
1 Computing with Social Networks on the Web (2008 slide deck) Jennifer Golbeck University of Maryland, College Park Jim Hendler Rensselaer Polytechnic.
FaceTrust: Assessing the Credibility of Online Personas via Social Networks Michael Sirivianos, Kyungbaek Kim and Xiaowei Yang in collaboration with J.W.
Trustworthiness Management in the Social Internet of Things
RecSys 2011 Review Qi Zhao Outline Overview Sessions – Algorithms – Recommenders and the Social Web – Multi-dimensional Recommendation, Context-
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
Chi-Cheng Lin, Winona State University CS 313 Introduction to Computer Networking & Telecommunication Chapter 5 Network Layer.
Developing Trust Networks based on User Tagging Information for Recommendation Making Touhid Bhuiyan et al. WISE May 2012 SNU IDB Lab. Hyunwoo Kim.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
This work is by Georgia Koutrika, published on CIDR'09 All the figures & tables in these slides are from that paper.
1 The Other Kind of Networking: Social Networks on the Web Dr. Jennifer Golbeck University of Maryland, College Park March 20, 2006.
CSC 104 December 13,2012. Internet Regulation: States that it is about restricting or controlling certain pieces of information. This consisting of censorship.
Reputation Network Analysis for Filtering Ravi Emani Ramesh Ravindran.
1 Computing Trust in Social Networks Huy Nguyen Lab seminar April 15, 2011.
High-integrity Sensor Networks Mani Srivastava UCLA.
Privacy Preserving Payments in Credit Networks By: Moreno-Sanchez et al from Saarland University Presented By: Cody Watson Some Slides Borrowed From NDSS’15.
Microsoft Research Faculty Summit Jennifer Golbeck Assistant Professor, College of Information Studies University of Maryland, College Park Social.
Dude, Where's My Car? And Other Questions in Context-Awareness Jason I. Hong James A. Landay Group for User Interface Research University of California.
Risk-Aware Mitigation for MANET Routing Attacks Submitted by Sk. Khajavali.
Meta-Path-Based Ranking with Pseudo Relevance Feedback on Heterogeneous Graph for Citation Recommendation By: Xiaozhong Liu, Yingying Yu, Chun Guo, Yizhou.
Reputation-aware QoS Value Prediction of Web Services Weiwei Qiu, Zhejiang University Zibin Zheng, The Chinese University of HongKong Xinyu Wang, Zhejiang.
Trust-aware Recommender Systems
Route Metric Proposal Date: Authors: July 2007 Month Year
Societal Impact of Computing
Mohsen Riahi Manesh and Dr. Naima Kaabouch
Presented by Edith Ngai MPhil Term 3 Presentation
Talal H. Noor, Quan Z. Sheng, Lina Yao,
Discovering the Most Trusted Agents Without Central Control
Uncovering the Mystery of Trust in An Online Social Network
Trustworthiness Management in the Social Internet of Things
LinkedIn Overview – Basics
Contextual Intelligence as a Driver of Services Innovation
The Beta Reputation System
A survey of trust and reputation systems for online service provision
A Case Study for Adaptive News Systems with Open User Model
Structural Properties of Networks: Introduction
Is Proficiency in Social Networking a Professional Competency?
Service-Oriented Computing: Semantics, Processes, Agents
Why listen to me? Sr. Digital Marketing Specialist for Fastline Media Group Social media is my world Fastline has seen a… 1,044% growth in Facebook audience.
Code search & recommendation engines
Graph-based Security and Privacy Analytics via Collective Classification with Joint Weight Learning and Propagation Binghui Wang, Jinyuan Jia, and Neil.
Service-Oriented Computing: Semantics, Processes, Agents
A Unified Framework for Location Privacy
JAMES BURK
Presentation transcript:

ITEC 810 Workshop Paper: A Survey of Web-based Social Network Trust Student: Eric Wang 41176774 Supervisor: Yan Wang Subject Coordinator: Robert Dale 5th Jun 2009

Agenda Trust and WBSN Trust inference in a WBSN Survey of trust inference mechanisms Findings and discussion Possible area for future studies Conclusion Question time Slide 2

Problem How trustworthy is the opinion of a friend of my friend who I do not have direct relationship with? How to infer trust on people I do not have direct relationship via the people I do have direct relationship? How to accurately estimate this inferred trust without negative impact from malicious users? Slide 3

Trust and WBSN Trust Web-based Social Network Have confidence or faith in a person or a piece of information Web-based Social Network MySpace, Facebook, LinkedIn Decisions are made based on trust Which movie should I watch next weekend? Should I buy Windows Vista or wait for Windows 7? How can we estimate trust from someone not directly connected to me in a WBSN? Slide 4

Properties of trust in a WBSN Asymmetry Personalisation Transitive Slide 5

Trust inference in a WBSN Trust inference in a trust diagram Slide 6

Survey of Trust Inference Mechanisms TidalTrust Binary Trust Algorithms Advogato Trust Metric Appleseed SocialTrust FuzzyTrust Algorithm SUNNY Trusted Gossip RN-Trust We select 5 to present here Slide 7

TidalTrust Jennifer Golbeck, 2005 Simple algorithm - scalable Generic – applicable to any WBSN Applies two conditions to increase accuracy Only consider the shortest path Trust threshold limit on highly trusted neighbours Most frequently cited and compared by others Slide 8

SocialTrust James Caverlee, et al, 2008 Distinguishing relationship quality from trust Incorporating personalised user feedback Three components: Current quality component History component Adaptation to change component More robust against malicious attacks than PageRank from Google Slide 9

FuzzyTrust Algorithm James Caverlee, et al, 2008 Fuzzy linguistic terms instead of numeric trust values Computes trust from stronger and shorter paths More meaningful information when there is contradictory information Slide 10

Trusted Gossip Arindam Mitra and Mucumaru Maheswaran, 2007 Encourages spread of good information while restrict spam messages Perform more than one step of trust estimation Bayesian trust estimation Recommender system Three approaches on where node-level and message level filtering applied Receiver Initiated Sender Initiated Using both as Hybrid Robust against reputation distribution Slide 11

RN-Trust Mohsen Taherian et al, 2008 Electrical resistance network model Simple and generic Scalable Improve on weakness of TidalTrust All paths considered, not only shortest paths Slide 12

Findings and discussion Approach of trust inference estimation Only trust values in the shortest or strongest paths Perform more than one step of trust estimation Include user feedback Fuzzy linguistic terms instead of numeric trust values Electrical resistance model Merits and Weaknesses Increased accuracy Simplicity Scalability Dynamic update by feedback Robust against reputation distribution Robust against malicious attacks Slide 13

Possible topics for future studies Further improve accuracy and precision Develop event based trust inference algorithm Develop context aware extensions Other applications of inference trust Military Intelligence Data mining Computing requirement CPU process Storage Network Slide 14

Conclusion Define trust and its properties in WBSN Survey of existing trust inference mechanisms Merits and weaknesses in existing trust inference mechanisms 5 possible topics for future studies Slide 15

Question Time Question from the audience Slide 16