skip to main content
10.1145/2980258.2982105acmotherconferencesArticle/Chapter ViewAbstractPublication PagesiciaConference Proceedingsconference-collections
research-article

Provenance based Trust computation for Recommendation in Social Network

Published: 25 August 2016 Publication History

Editorial Notes

NOTICE OF CONCERN: ACM has received evidence that casts doubt on the integrity of the peer review process for the ICIA 2016 Conference. As a result, ACM is issuing a Notice of Concern for all papers published and strongly suggests that the papers from this Conference not be cited in the literature until ACM's investigation has concluded and final decisions have been made regarding the integrity of the peer review process for this Conference.

Abstract

The term social network means to develop traditional communication among people. As it becomes online, the people in communication don't have face-to-face contact and also they may be known or unknown. Though known, there is no guarantee and confident that one who contact as a requester is a friend or foe. This paper aims towards developing a provenance-based trust model by utilizing the reputation of the mutual friend from the interaction he/she had with the requester. Provenance factors identified from the interaction information are used to compute the reputation. Because of the uncertainty in the behavior of a person in online social networking (OSN) sites, a stochastic model that evolves the randomness over time is applied and the trust computation is further refined. A statistical approach using Bayesian is used for recommending trustable request.

References

[1]
Aarthi Nagarajan; Vijay Varadharajan. 2011. Dynamic trust enhanced security model for trusted platform based services, Future Generation Computer Systems 2011 vol. 27, Pp. 564--573.
[2]
Anuradha Yadav, Shampa Chakraverty, Ritu Sibal. 2015. A Survey of Implicit Trust on Social Networks, Green Computing and Internet of Things (ICGCIoT), 2015 International Conference on, (Noida, 2015), IEEE, PP 1511--1515.
[3]
Cedric Archambeau, Dan Cornford, Manfred Opper, John Shawe-Taylor. 2007. Gaussian Process Approximations of Stochastic Differential Equations, JMLR: 2007 Workshop and Conference Proceedings 1: 1--16,.
[4]
Christiyana Arulselvi A, Dhanalakshmi T, Sendhilkumar S. 2016. Reputation based Trust Computation for Social Network. In National Conference on Intelligent Computing and Data Analytics,(Anna University, Chennai, 2016), knowledge Curve Publisher, 183--193.
[5]
Dhanalakshmi teekaraman, sendhilkumar selvaraju. 2013. Framework for trustworthy user grouping in social networks using semantic Provenance. In Chennai Fourth International Conference on Sustainable Energy and Intelligent Systems, (KCG College, Chennai, 2013), IET Publisher, PP 285--291.
[6]
Edward J. Allen, Linda J. S. Allen, Armando Arciniega, and Priscilla E. Greenwood. 2008. Construction of Equivalent Stochastic Differential Equation Model, Stochastic Analysis and Applications 2008, 26(2): 274--297.
[7]
Gallager R.G. 2013. STOCHASTIC PROCESSES: Theory for Applications, Cambridge University press, 2013.
[8]
Guanfeng Liu and An Liu, Yan Wang, Lei Li. 2014. An Efficient Multiple Trust Paths Finding Algorithm for Trustworthy Service Provider Selection in Real-Time Online Social Network Environments, International Conference on Web Services, (Anchorage, AK, 2014), IEEE, PP 121--128.
[9]
Wikipedia, Stochastic differential equation, {online} 2016, Available at: https://en.wikipedia.org/wiki/Stochastic_differential_equation. {Retrieved 12 June 2016}.
[10]
Jennifer Golbeck; Aaron Mannes. 2006. Using trust and Provenance for content filtering on semantic web, Proceedings of the Workshop on Models of Trust on the Web, at the 15th World Wide Web conference 2006, version 1.
[11]
Jiaojiao Song; Xiaohong Li; Jing Hu; Guangquan Xu and Zhiyong Feng. 2015. Dynamic Trust Evaluation of Wireless Sensor Networks Based on Multi-factor. In trustCom/BigData SE/ISPA, (Helsinki, 2015), IEEE, PP 33--40.
[12]
Jiawei Han, Micheline Kamber. 2006. Data Mining Concepts and Techniques", Second Edition, Elsevier, USA, 2006.
[13]
Kang Zhao, and Li Pan. 2014. A Machine Learning Based Trust Evaluation Framework for Online Social Networks. In 13th International Conference on Trust, Security and Privacy in Computing and Communications, (Beijing, 2014), IEEE, PP 69--74.
[14]
Krishnaprasad Thirunarayan, Pramod Anantharam. 2010. Some Trust Issues in Social Networks and Sensor Networks. In 2010 International Symposium on Collaborative Technologies and Systems (Chicacgo, 2010), IEEE, Pp. 573--580.
[15]
Lawrence C.Evans. 2010. An Introduction to Stochastic Differential Equations, American Mathematical society, UC Berkeley, 2010.
[16]
Lingshan Xu; Xianghan Zheng; Chunming Rong. 2013. Trust Evaluation based Content Filtering in Social Interactive Data in International Conference on Cloud Computing and Big Data, (Fuzhou, 2013), IEEE, PP 538--542.
[17]
Mohit Gambhir, M. N. Doja, Moinuddin. 2015. Novel Trust Computation Architecture for Users Accountability in Online Social Networks, in 2015 IEEE International Conference on Computational Intelligence & Communication Technology, (Ghaziabad, 2015), IEEE, PP 725--731.
[18]
Oksendal, Bernt. 2013. Stochastic Differential Equations:An Introduction with Applications, Fifth Edition, Springer-Verlag Heidelberg, New York, 2013.
[19]
Ramchurn S.D; N.R.Jennings; C.Sierra; L.Godo. 2004. Devising a trust model for multi-agent interactions using confidence and reputation. Applied Artificial Intelligence: An international Journal vol. 18, PP 833--852.
[20]
Rui Tang, Luke Lu, Yan Zhuang, Simon Fong. 2012. Not Every Friend on a Social Network Can be Trusted: An Online Trust Indexing Algorithm. 2012 IEEE/WIC/ACM International Conferences on Web Intelligence and Intelligent Agent Technology, (Macau, 2012), IEEE, 280--285.
[21]
Sana HAMDI, Amel BOUZEGHOUB, Alda LOPES GANCARSKI, Sadok BEN YAHIA. 2013. Trust Inference computation for online Social Networks, 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications, (Melbourne, 2013), IEEE, 210--217.
[22]
Sana Hussein, 2013. Solution of some stochastic differential equation. IOSR Journal of Mathematics, Volume 5, Issue 3, PP 01--05.
[23]
Sapna Gambhir, Vinod Kumar. 2015. Bidirectional Trust Calculation in Online Social Networks. In 2015 4th International Conference on Reliability Infocom Technologies and Optimization, (Noida, 2015), IEEE, PP 1--6.
[24]
Schlager C; G. Pernul. 2008. Trust modeling in E-commerce through fuzzy cognitive maps. 3rd International Conference on Availability, Reliability and Security (Barcelona, 2008), IEEE, Pp. 344--351.
[25]
Schmidt S et al; R. Steele; T.S. Dillon; E. Chang. 2007. Fuzzy trust evaluation and credibility development in multi-agent systems. Applied Soft Computing Journal vol. 7(2), Pp. 492--505.
[26]
Shouxian Wei, Xiaolin Zheng, Deren Chen, 2014. Service Selection Based on Dynamic Group Trust in Social Network. In International Conference on Service Sciences, (Wuxi, 2014), IEEE, PP 157--162.
[27]
Shuqin Z; L. Dongxin; Y. Yongtian. 2004. A fuzzy set based trust and reputation models in P2P networks. Intelligent Data Engineering and Automated Learning. Lecture Notes in Computer Science, Vol 3177, Pp. 211--217.
[28]
Sibel Adali, Robert Escriva, Mark K. Goldberg, Mykola Hayvanovych, Malik Magdon-Ismail, Boleslaw K. Szymanski, William A. Wallace and Gregory T. Williams. 2010. Measuring Behavioral Trust in Social Networks. In 2010 International Conference on Intelligence and Security Informatics, (Vancover, BC, Canada, 2010), IEEE, PP:150--152.
[29]
Sudha Ram, Jun Liu. 2009. A New Perspective on Semantics of Data Provenance. In SWPM'09 Proceedings of the First International Conference on Semantic Web in Provenance Management, (Germany, 2009), CUER-WS.org Aachen, Volume 526, PP: 35--40.
[30]
Surya Nepal, Wanita Sherchan, Cecile Paris. 2011. STrust: A Trust Model for Social Networks. In 10th International Joint Conference on Trust, Security and Privacy in Computing and Communications, (Changsha, 2011), IEEE, 841--846.
[31]
Tae Kyung Kim and Hee Suk Seo. 2008. A Trust Model using Fuzzy Logic in Wireless Sensor Network. World Academy of Science, Engineering and Technology, International Journal of Electrical, Computer, Energetic, Electronic and Communication Engineering, Vol:2(6), PP 1051--1054.
[32]
Tajeddine A, A. Kayssi; A. Chehab; H. Artail. 2007. PATROL: a comprehensive reputation-based trust model. International Journal of Internet Technology and Secured transactions vol. 1(1-2), Pp. 108--131.
[33]
Tibor Bosse, Catholijn M. Jonker, Jan Treur, Dmytro Tykhonov. 2007. Formal Analysis of Trust Dynamics in Human and Software Agent Experiments. In 11th International Workshop on Cooperative Information Agents XI Lecture Notes in Computer Science, (Delft, The Netherland, 2007), Springer Berlin Heidelberg, PP 343--359.
[34]
Umara Noor, Zahid Anwar, Yasir Mehmood, Waseem Aslam. 2013. TrustBook: Web of Trust Based Relationship Establishment in Online Social Networks. 11th International Conference on Frontiers of Information Technology, (Islamabad, 2013), IEEE, PP 223--228.
[35]
Wanita Sherchan, Surya Nepal and Cecile Paris. 2013. A Survey of Trust in Social Networks. Jornal of ACM Computing Surveys, Vol 45(4), Article No:47.
[36]
Xiao Shen; Haixia Long; Cuihua Ma. 2015. Incorporating Trust Relationships in Collaborative Filtering Recommender System. 16th IEEE/ACIS international conference on Software Engineering, Artificial Intelligence, Networking and Parallel/Distributed Computing, ( Takamatsu, 2015), PP 1--8.
[37]
Gagliordi, N., McSweeney, K., Foley, M., Whittaker, Z., Foley, M., Kingsley-Hughes, A., Brown, E., Gewirtz, D., Harris, R. and Bisson, S. (2016). Latest Topics | ZDNet. {online} ZDNet. Available at: http://www.zdnet.com.au/news/security/soa/Facebook-users-fall-foul-of-fake-frog-ID-thief-/0,130061744,339281228,00.htm?feed=rss {Retrieved 12 Jun. 2016}.
[38]
Zhan J and X. ang. 2011. A Novel Trust computing system for Social Networks, Proceedings of the IEEE third international conference on privacy, security, Risk and Trust and Social Computing, (Boston, MA, 2011), IEEE, PP:1284--1289.

Cited By

View all
  • (2023)Using Sentiment Analysis to Spot Trending Products2023 Sixth International Conference on Vocational Education and Electrical Engineering (ICVEE)10.1109/ICVEE59738.2023.10348252(48-54)Online publication date: 14-Oct-2023
  • (2017)Classification of tweets for sentiment and trend analysis2017 International Conference on Intelligent Computing and Control Systems (ICICCS)10.1109/ICCONS.2017.8250525(566-573)Online publication date: Jun-2017

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Other conferences
ICIA-16: Proceedings of the International Conference on Informatics and Analytics
August 2016
868 pages
ISBN:9781450347563
DOI:10.1145/2980258
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 25 August 2016

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Social network
  2. Trust
  3. provenance
  4. reputation
  5. statistical
  6. stochastic

Qualifiers

  • Research-article
  • Research
  • Refereed limited

Conference

ICIA-16

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)1
Reflects downloads up to 03 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Using Sentiment Analysis to Spot Trending Products2023 Sixth International Conference on Vocational Education and Electrical Engineering (ICVEE)10.1109/ICVEE59738.2023.10348252(48-54)Online publication date: 14-Oct-2023
  • (2017)Classification of tweets for sentiment and trend analysis2017 International Conference on Intelligent Computing and Control Systems (ICICCS)10.1109/ICCONS.2017.8250525(566-573)Online publication date: Jun-2017

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media