Skip to main content

Models for Trust Inference in Social Networks

  • Chapter
  • First Online:
Propagation Phenomena in Real World Networks

Part of the book series: Intelligent Systems Reference Library ((ISRL,volume 85))

Abstract

Interpersonal trust between any two people in social networks is hard to gauge, and even harder to infer, given that these two people are not connected by an immediate social link, such as friendship or acquaintanceship. In order to be able to make accurate inferences for an arbitrary tuple of people in a given social environment, we present an approach, named Appleseed, that is based on mechanics taken from neuropsychology, known as spreading activation models. Compelling in its simplicity, we relate the concept to trust propagation and evaluation in an intuitive fashion. While Appleseed works very well when paths between two arbitrary people in the network can be established, no inference of trust is possible when this is not the case. To this end, we present several algorithms for inferring trust that go beyond network structure and demonstrate their accuracy in real social networks. We also show how these algorithms can be augmented with additional data that may be available in some contexts.

The research presented in this chapter has been conducted while being affiliated with Albert-Ludwigs- Universität Freiburg i.Br., Germany.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Note that trust concepts commonly adopted for webs of trust, and similar trust network applications, are largely general and do not cover specifics such as “situational trust” [26], as has been pointed out in [13]. For instance, agent \(a_i\) may blindly trust \(a_j\) with respect to books, but not trust \(a_j\) with respect to trusting others, for \(a_j\) has been found to accord trust to other people too easily. For our trust propagation scheme at hand, we also suppose this largely uni-dimensional concept of trust.

  2. 2.

    Supposing identical parameterizations for the metrics in use, as well as similar network structures.

  3. 3.

    Though various levels of peer certification exist, their interpretation does not perfectly align with weighted trust relationships.

  4. 4.

    With respect to seed node \(a\).

  5. 5.

    The terms “energy” and “trust” are used interchangeably in this context.

  6. 6.

    Crawls have been executed in September 2004.

  7. 7.

    We oversimplify by using predicate calculus expressions, supposing that trust, and hence distrust, is fully transitive.

  8. 8.

    See http://trust.mindswap.org/FilmTrust.

References

  1. Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: New Security Paradigms Workshop, pp. 48–60. Cumbria, UK (1997)

    Google Scholar 

  2. Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proceedings of the 33rd Hawaii International Conference on System Sciences. Maui, HI, USA (2000)

    Google Scholar 

  3. Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Paques, H., Liu, L., Grossman, D. (eds.) Proceedings of the Tenth International Conference on Information and Knowledge Management, pp. 310–317. ACM Press, Atlanta, GA, USA (2001)

    Google Scholar 

  4. Beth, T., Borcherding, M., Klein, B.: Valuation of trust in open networks. In: Proceedings of the 1994 European Symposium on Research in Computer Security, pp. 3–18. Brighton, UK (1994)

    Google Scholar 

  5. Ceglowski, M., Coburn, A., Cuadrado, J.: Semantic search of unstructured data using contextual network graphs (2003)

    Google Scholar 

  6. Chen, R., Yeager, W.: Poblano: a distributed trust model for peer-to-peer networks. Technical report, Sun Microsystems, Santa Clara, CA, USA (2003)

    Google Scholar 

  7. Eschenauer, L., Gligor, V., Baras, J.: On trust establishment in mobile ad-hoc networks. Technical report MS 2002–10, Institute for Systems Research, University of Maryland, MD, USA (2002)

    Google Scholar 

  8. Ford, L., Fulkerson, R.: Flows in Networks. Princeton University Press, Princeton (1962)

    MATH  Google Scholar 

  9. Gans, G., Jarke, M., Kethers, S., Lakemeyer, G.: Modeling the impact of trust and distrust in agent networks. In: Proceedings of the Third International Bi-Conference Workshop on Agent-Oriented Information Systems. Montreal, Canada (2001)

    Google Scholar 

  10. Golbeck, J.: Computing and applying trust in Web-based social networks. Ph.D. thesis, University of Maryland, College Park, MD, USA (2005)

    Google Scholar 

  11. Golbeck, J.: Combining provenance with trust in social networks for semantic web content filtering. In: Proceedings of the International Provenance and Annotation Workshop, LNCS, vol. 4145, pp. 101–108. Springer, Chicago, IL, USA (2006)

    Google Scholar 

  12. Golbeck, J.: Generating predictive movie recommendations from trust in social networks. In: Proceedings of the Fourth International Conference on Trust Management, LNCS, vol. 3986, pp. 93–104. Springer, Pisa, Italy (2006)

    Google Scholar 

  13. Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the Semantic Web. In: Proceedings of Cooperative Intelligent Agents. Helsinki, Finland (2003)

    Google Scholar 

  14. Guha, R.: Open rating systems. Technical report, Stanford Knowledge Systems Laboratory, Stanford, CA, USA (2003)

    Google Scholar 

  15. Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the Thirteenth International World Wide Web Conference. ACM Press, New York, NY, USA (2004)

    Google Scholar 

  16. Hartmann, K., Strothotte, T.: A spreading activation approach to text illustration. In: Proceedings of the 2nd International Symposium on Smart Graphics, pp. 39–46. ACM Press, Hawthorne, NY, USA (2002)

    Google Scholar 

  17. Jøsang, A., Gray, E., Kinateder, M.: Analysing topologies of transitive trust. In: Proceedings of the Workshop of Formal Aspects of Security and Trust. Pisa, Italy (2003)

    Google Scholar 

  18. Kamvar, S., Schlosser, M., Garcia-Molina, H.: The EigenTrust algorithm for reputation management in P2P networks. In: Proceedings of the Twelfth International World Wide Web Conference. Budapest, Hungary (2003)

    Google Scholar 

  19. Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies, LNCS, vol. 2378. Springer, Prague, Czech Republic (2003)

    Google Scholar 

  20. Kinateder, M., Rothermel, K.: Architecture and algorithms for a distributed reputation system. In: Nixon, P., Terzis, S. (eds.) Proceedings of the First International Conference on Trust Management, LNCS, vol. 2692, pp. 1–16. Springer, Crete, Greece (2003)

    Google Scholar 

  21. Król, D.: Propagation phenomenon in complex networks: theory and practice. New Gener. Comput. 32(3–4), 187–192 (2014)

    Article  Google Scholar 

  22. Levien, R.: Attack-resistant trust metrics. Ph.D. thesis, University of California at Berkeley, Berkeley, CA, USA (2004)

    Google Scholar 

  23. Levien, R., Aiken, A.: Attack-resistant trust metrics for public key certification. In: Proceedings of the 7th USENIX Security Symposium. San Antonio, TX, USA (1998)

    Google Scholar 

  24. Levien, R., Aiken, A.: An attack-resistant, scalable name service. Draft Submission to the Fourth International Conference on Financial Cryptography (2000)

    Google Scholar 

  25. Lewicki, R., McAllister, D., Bies, R.: Trust and distrust: new relationships and realities. Acad. Manag. Rev. 23(12), 438–458 (1998)

    Google Scholar 

  26. Marsh, S.: Formalising trust as a computational concept. Ph.D. thesis, Department of Mathematics and Computer Science, University of Stirling, Stirling, UK (1994)

    Google Scholar 

  27. Marsh, S.: Optimism and pessimism in trust. In: Ramirez, J. (ed.) Proceedings of the Ibero-American Conference on Artificial Intelligence. McGraw-Hill, Caracas, Venezuela (1994)

    Google Scholar 

  28. Maurer, U.: Modelling a public key infrastructure. In: Bertino, E. (ed.) Proceedings of the 1996 European Symposium on Research in Computer Security, LNCS, vol. 1146, pp. 325–350. Springer, Rome, Italy (1996)

    Google Scholar 

  29. McKnight, H., Chervany, N.: The meaning of trust. Technical report MISRC 96–04, Management Information Systems Research Center, University of Minnesota, MN, USA (1996)

    Google Scholar 

  30. Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proceedings of the 35th Hawaii International Conference on System Sciences, pp. 188–196. Big Island, HI, USA (2002)

    Google Scholar 

  31. Page, L., Brin, S., Motwani, R., Winograd, T.: The PageRank citation ranking: bringing order to the Web. Technical report, Stanford Digital Library Technologies Project (1998)

    Google Scholar 

  32. Quillian, R.: Semantic memory. In: Minsky, M. (ed.) Semantic Information Processing, pp. 227–270. MIT Press, Boston (1968)

    Google Scholar 

  33. Reiter, M., Stubblebine, S.: Path independence for authentication in large-scale systems. In: Proceedings of the ACM Conference on Computer and Communications Security, pp. 57–66. ACM Press, Zürich, Switzerland (1997)

    Google Scholar 

  34. Reiter, M., Stubblebine, S.: Toward acceptable metrics of authentication. In: Proceedings of the IEEE Symposium on Security and Privacy, pp. 10–20. IEEE Computer Society Press, Oakland, CA, USA (1997)

    Google Scholar 

  35. Richardson, M., Agrawal, R., Domingos, P.: Trust management for the Semantic Web. In: Proceedings of the Second International Semantic Web Conference. Sanibel Island, FL, USA (2003)

    Google Scholar 

  36. Sankaralingam, K., Sethumadhavan, S., Browne, J.: Distributed PageRank for P2P systems. In: Proceedings of the Twelfth International Symposium on High Performance Distributed Computing. Seattle, WA, USA (2003)

    Google Scholar 

  37. Smith, E., Nolen-Hoeksema, S., Fredrickson, B., Loftus, G.: Atkinson and Hilgards’s Introduction to Psychology. Thomson Learning, Boston (2003)

    Google Scholar 

  38. Twigg, A., Dimmock, N.: Attack-resistance of computational trust models. In: Proceedings of the Twelfth IEEE International Workshop on Enabling Technologies, pp. 275–280. Linz, Austria (2003)

    Google Scholar 

  39. Wiese, R., Eiglsperger, M., Kaufmann, M.: yFiles: Visualization and automatic layout of graphs. In: Proceedings of the 9th International Symposium on Graph Drawing, LNCS, vol. 2265, pp. 453–454. Springer, Heidelberg, Germany (2001)

    Google Scholar 

  40. Ziegler, C.N., Golbeck, J.: Investigating interactions of trust and interest similarity. Decis. Support Syst. 43(2), 460–475 (2007)

    Article  Google Scholar 

  41. Ziegler, C.N., Lausen, G.: Paradigms for decentralized social filtering exploiting trust network structure. In: Meersman, R., Tari, Z. (eds.) Proceedings of the DOA/CoopIS/ODBASE Confederated International Conferences (2), LNCS, vol. 3291, pp. 840–858. Springer, Larnaca, Cyprus (2004)

    Google Scholar 

  42. Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service. IEEE Computer Society Press, Taipei, Taiwan (2004)

    Google Scholar 

  43. Ziegler, C.N., Lausen, G.: Propagation models for trust and distrust in social networks. Inf. Syst. Front. 7(4–5), 337–358 (2005)

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Cai-Nicolas Ziegler .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ziegler, CN., Golbeck, J. (2015). Models for Trust Inference in Social Networks. In: Król, D., Fay, D., Gabryś, B. (eds) Propagation Phenomena in Real World Networks. Intelligent Systems Reference Library, vol 85. Springer, Cham. https://doi.org/10.1007/978-3-319-15916-4_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-15916-4_3

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-15915-7

  • Online ISBN: 978-3-319-15916-4

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics