Skip to main content
Log in

Context-aware trust network extraction in large-scale trust-oriented social networks

  • Published:
World Wide Web Aims and scope Submit manuscript

Abstract

In recent years, social networking sites have been used as a means for a rich variety of activities, such as movie recommendations and product recommendations. In order to evaluate the trust between a truster (i.e., the source) and a trustee (i.e., the target) who have no direct interaction in Online Social Networks (OSNs), the trust network between them that contains important intermediate participants, the trust relations between the participants, and the social context, has an important influence on trust evaluation. Thus, to deliver a reasonable trust evaluation result, before performing any trust evaluation (i.e., trust transitivity), the contextual trust network from a given source to a given target needs to be first extracted from the social network, where constraints on social context should also be considered to guarantee the quality of the extracted networks. However, this problem has been proved to be NP-Complete. Towards solving this challenging problem, we first present a contextual trust-oriented social network structure which takes social contextual impact factors, including trust, social intimacy degree, community impact factor, preference similarity and residential location distance into account. These factors have significant influences on both social interactions between participants and trust evaluation. Then, we present a new concept QoTN (Quality of Trust Network) and propose a social context-aware trust network extraction model. Finally, we propose a Heuristic Social Context-Aware trust Network extraction algorithm (H-SCAN-K) by extending the K-Best-First Search (KBFS) method with several proposed optimization strategies. The experiments conducted on two real datasets illustrate that our proposed model and algorithm outperform the existing methods in both algorithm efficiency and the quality of the extracted trust networks.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Figure 1
Figure 2
Figure 3
Figure 4
Figure 5
Figure 6
Figure 7
Figure 8
Figure 9
Figure 10
Figure 11
Figure 12
Figure 13
Figure 14

Similar content being viewed by others

References

  1. Adamic, L.A., Lukose, R.M., Huberman, B.A.: Local search in unstructured networks. In: Handbook of Graphs and Networks. Wiley (2005)

  2. Adler, P.S.: Market, hierarchy, and trust: the knowledge economy and the future of capitalism. Organ. Sci. 12(12), 215–234 (2001)

    Article  Google Scholar 

  3. Baase, S., Gelder, A.: Computer Algorithms Introduction to Design and Analysis. Addison Wesley (1999)

  4. Barnett, E., Casper, M.: A definition of social environment. Am. J. Public Health 91(3), 465 (2001)

    Google Scholar 

  5. Brass, D.J.: A Socal Network Prespective on Industral/Organizational Psychology. Industrial/ Organizational Handbook (2009)

  6. Chang, N., Liu, M.: Revisiting the ttl-based controlled flooding search: Optimality and randomization. In: MobiCom, pp. 85–99 (2004)

  7. Chia, P.H., Pitsilis, G.: Exploring the use of explicit trust link for filtering recommenders: a study on epinions.com. J. Inf. Process. 19, 332–344 (2011)

    Google Scholar 

  8. Choi, M.H.K., Croft, W.: Dependency trigram model for social relation extraction from news articles. In: SIGIR, pp. 1047–1048 (2012)

  9. Christianson, B., Harbison, W.S.: Why isn’t trust transitivie?. In: International Workshop on Security Protocols, pp. 171–176 (1996)

  10. Chua, F., Lim, E.P.: Trust network inference for online rating data using generative models. In: KDD, pp. 889–898 (2010)

  11. Dalton, M.: Men Who Manage. Wiley, New York (1959)

    Google Scholar 

  12. Felner, A., Kraus, S., Korf, R.E.: Kbfs: K-best-first search. Ann. Math. Artif. Intell. 39, 19–39 (2003)

    Article  MathSciNet  MATH  Google Scholar 

  13. Filali, I., Huet, F.: Dynamic ttl-based search in unstructured peer-to-peer networks. In: CCGrid’10, pp. 438–447 (2010)

  14. Freeh, V., Lowenthal, D.K., Pan, F., Kappiah, N., Springer, R., Rountree, B.L., Femal, M.E.: Analyzing the energy-time trade-off in high-performance computing applications. IEEE Trans. Parallel Distrib. Syst. 18(6), 835–848 (2007)

    Article  Google Scholar 

  15. Gimpel, J., Karnes, K., Mctague, J., Pearson-Merkowitz, S.: Distance-decay in the political geography of friends-and-neighbors voting. Polit. Geogr. 27, 231–252 (2008)

    Article  Google Scholar 

  16. Gkantsidis, C., Mihail, M., Saberi, A.: Random walks in peer-to-peer networks. In: IEEE INFORCOM, pp. 120–130 (2004)

  17. Golbeck, J., Hendler, J.: Inferring trust relationships in web-based social networks. ACM Trans. Internet Technol. 6(4), 497–529 (2006)

    Article  Google Scholar 

  18. Groh, G., Hauffa, J.: Characterizing social relations via nlp-based sentiment analysis. In: AAAI Conference on Weblogs and Social Media, pp. 502–505 (2011)

  19. Iosup, A., Ostermann, S., Yigitbasi, N., Prodan, R., Fahringer, T., Epema, D.: Performance analysis of cloud computing services for many-tasks scientific computing. IEEE Trans. Parallel Distrib. Syst. 22(6), 931–945 (2011)

    Article  Google Scholar 

  20. Ira, P.: Bi-Directional Search. Edinburgh University Press, Edinburgh (1971)

    MATH  Google Scholar 

  21. Korte, R.F.: Biases in decision making and implications for human resource development. Adv. Dev. Hum. Resour. 5(4), 440–457 (2003)

    Article  Google Scholar 

  22. Kuter, U., Golbeck, J.: Sunny: A new algorithm for trust inference in social networks using probabilistic confidence model. In: AAAI’07, pp. 1377–1382 (2007)

  23. Lichtenstein, S., Slovic, P.: The Construction of Preference. Cambridge University Press (2006)

  24. Liu, G., Wang, Y., Orgun, M., Lim, E.P.: A heuristic algorithm for trust-oriented service provider selection in complex social networks. In: SCC, pp. 130–137 (2010)

  25. Liu, G., Wang, Y., Orgun, M.A.: Optimal social trust path selection in complex social networks. In: AAAI, pp. 1397–1398 (2010)

  26. Liu, G., Wang, Y., Orgun, M.A.: Finding k optimal social trust paths for the selection of trustworthy service providers in complex social networks. In: ICWS, pp. 41–48 (2011)

  27. Liu, G., Wang, Y., Orgun, M.A.: Trust transitivity in complex social networks. In: AAAI, pp. 1222–1229 (2011)

  28. Liu, G., Wang, Y., Orgun, M.A.: Social Context-Aware Trust Network Discovery in Complex Contextual Social Networks. In: AAAI (2012)

  29. Liu, G., Wang, Y., Orgun, M.A., Lim, E.P.: Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans. Serv. Comput. doi:10.1109/ICWS.2011.81 (2011)

  30. Liu, G., Wang, Y., Orgun, M.A., Liu, H.: Discovering trust networks for the selection of trustworthy service providers in complex contextual social networks. In: ICWS, pp. 384–391 (2012)

  31. Liu, G., Zheng, K., Wang, Y., Orgun, M.A., Liu, A., Zhao, L., Zhou, X.: Multi-constrained graph pattern matching in large-scale contextual social graphs. In: ICDE, pp. 351–362 (2015)

  32. Liu, Q., Xiang, B., Yuan, N.J., Chen, E., Xiong, H., Zheng, Y., Yang, Y.: An influence propagation view of pagerank. ACM Trans. Knowl. Discov. Data 11 (3), 30:1–30:30 (2017)

    Google Scholar 

  33. Lo, D., Surian, D., Zhang, K., Lim, E.P.: Mining direct antagonistic communities in explicit trust networks. In: CIKM, pp. 1013–1018 (2011)

  34. Luhmann, N.: Trust and Power. Wiley, Chichester (1979)

    Google Scholar 

  35. Mansell, R., Collins, B.: Trust and Crime in Information Societies. Edward Elgar Publishing, Cheltenham (2005)

    Google Scholar 

  36. Mccallum, A., Wang, X., Corrada-Emmanuel, A.: Topic and role discovery in social networks with experiments on Enron and academic email. J. Artif. Intell. Res. 30(1), 249–272 (2007)

    Google Scholar 

  37. Milgram, S.: The small world problem. Psychology Today 2(60), 61–67 (1967)

    Google Scholar 

  38. Miller, R., Perlman, D., Brehm, S.: Intimate Relationships, 4th edn. McGraw-Hill College, Boston (2007)

    Google Scholar 

  39. Mislove, A., Marcon, M., Gummadi, K., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: ACM IMC, pp. 29–42 (2007)

  40. Pool, I., Kochen, M.: Contacts and influence. Soc. Netw. 1, 1–48 (1978)

    Article  MathSciNet  Google Scholar 

  41. Prell, C.L.: Community networking and social capital: early investigation. J. Comput.-Mediat. Commun. 8(3). doi:10.1111/j.1083-6101.2003.tb00214.x (2003)

  42. Sun, Y., Yu, W., Han, Z., Liu, K.: Information theoretic framework of trust modelling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24 (2), 305–317 (2006)

    Article  Google Scholar 

  43. Tang, J.H., Gao, H.L., Sarma, A.D.: etrust: Understanding trust evolution in an online world. In: KDD, pp. 253–261 (2012)

  44. Wang, G., Wu, J.: Multi-dimensional evidence-based trust management with multi-trusted paths. Futur. Gener. Comput. Syst. 27(5), 529–538 (2011)

    Article  Google Scholar 

  45. Wang, Y., Varadharajan, V.: Role-based recommendation and trust evaluation. In: IEEE EEE’07, pp. 278–295 (2007)

  46. Wang, Y., Li, L., Liu, G.: Social context-aware trust inference for trust enhancement in social network based recommendations on service providers. World Wide Web Journal August 18(1), 159–184 (2013)

    Article  Google Scholar 

  47. Wren, J., Kozak, K., Johnson, K., Deakyne, S., Schilling, L., Dellavalle, R.: A survey of perceived contributions to papers based on byline position and number of authors. EMBO Rep. 8(11), 988–991 (2007)

    Article  Google Scholar 

  48. Yao, Y., Tong, H., Yan, X., Xu, F., Lu, J.: Matri: A multi-aspect and transitive trust inference model. In: WWW, pp. 1467–1476 (2013)

  49. Yoo, S.Y., Yang, F.L., Moon, I.: Mining social networks for personalized email prioritization. In: KDD, pp. 967–976 (2009)

  50. Zajonc, R.: Interpersonal attraction and attitude similarity. J. Abnorm. Soc. Psychol. 62(3), 713–715 (1961)

    Article  Google Scholar 

Download references

Acknowledgments

This work was partially supported by Natural Science Foundation of China (Grant Nos. 61303019, 61572336, 61532018, 61402313, 61502324), Doctoral Fund of Ministry of Education of China (20133201120012), Postdoctoral Science Foundation of China (2015M571805, 2016T90492), Collaborative Innovation Center of Novel Software Technology and Industrialization, Jiangsu, China, and the Opening Project of Guangdong Province Key Laboratory of Big Data Analysis and Processing (2017002).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to An Liu.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Liu, G., Liu, Y., Liu, A. et al. Context-aware trust network extraction in large-scale trust-oriented social networks. World Wide Web 21, 713–738 (2018). https://doi.org/10.1007/s11280-017-0485-6

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11280-017-0485-6

Keywords

Navigation