skip to main content
10.1145/1963405.1963485acmotherconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
research-article

Finding the bias and prestige of nodes in networks based on trust scores

Published:28 March 2011Publication History

ABSTRACT

Many real-life graphs such as social networks and peer-to-peer networks capture the relationships among the nodes by using trust scores to label the edges. Important usage of such networks includes trust prediction, finding the most reliable or trusted node in a local subgraph, etc. For many of these applications, it is crucial to assess the prestige and bias of a node. The bias of a node denotes its propensity to trust/mistrust its neighbours and is closely related to truthfulness. If a node trusts all its neighbours, its recommendation of another node as trustworthy is less reliable. It is based on the idea that the recommendation of a highly biased node should weigh less. In this paper, we propose an algorithm to compute the bias and prestige of nodes in networks where the edge weight denotes the trust score. Unlike most other graph-based algorithms, our method works even when the edge weights are not necessarily positive. The algorithm is iterative and runs in O(km) time where k is the number of iterations and m is the total number of edges in the network. The algorithm exhibits several other desirable properties. It converges to a unique value very quickly. Also, the error in bias and prestige values at any particular iteration is bounded. Further, experiments show that our model conforms well to social theories such as the balance theory (enemy of a friend is an enemy, etc.).

References

  1. P. Bonacich. Factoring and weighting approaches to status scores and clique identification. J. Mathematical Sociology, 2:113--120, 1972.Google ScholarGoogle ScholarCross RefCross Ref
  2. D. Cartwright and F. Harary. Structural balance: A generalization of Heider's theory. Psychological Review, 63:277--293, 1956.Google ScholarGoogle ScholarCross RefCross Ref
  3. C. de Kerchove and P. V. Dooren. The PageTrust algorithm: How to rank web pages when negative links are allowed? In SDM, pages 346--352, 2008.Google ScholarGoogle ScholarCross RefCross Ref
  4. G. Golub and C. F. V. Loan. Matrix Computations. Johns Hopkins University Press, 1996.Google ScholarGoogle Scholar
  5. R. V. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In WWW, pages 403--412, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. F. Heider. Attitudes and Cognitive Organization. J. Psychology, 21:107--112, 1946.Google ScholarGoogle ScholarCross RefCross Ref
  7. B. D. Hughes. Random Walks and Random Environments. Oxford University Press, 1996.Google ScholarGoogle Scholar
  8. G. Jeh and J. Widom. Simrank: A measure of structural-context similarity. In KDD, pages 538--543, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The Eigentrust algorithm for reputation management in P2P networks. In WWW, pages 640--651, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. J. M. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46(5):604--632, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg. Predicting positive and negative links in online social networks. In WWW, pages 641--650, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. J. Leskovec, D. P. Huttenlocher, and J. M. Kleinberg. Signed networks in social media. In CHI, pages 1361--1370, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. D. Lizorkin, P. Velikhov, M. Grinev, and D. Turdakov. Accuracy estimate and optimization techniques for SimRank computation. Proc. VLDB Endowment, 1(1):422--433, 2008. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. L. Page, S. Brin, R. Motwani, and T. Winograd. The PageRank citation ranking: Bringing order to the web. Technical report, Stanford Digital Library Technologies Project, 1998.Google ScholarGoogle Scholar
  15. M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In ISWC, pages 351--368, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Finding the bias and prestige of nodes in networks based on trust scores

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Other conferences
      WWW '11: Proceedings of the 20th international conference on World wide web
      March 2011
      840 pages
      ISBN:9781450306324
      DOI:10.1145/1963405

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 28 March 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate1,899of8,196submissions,23%

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader