skip to main content
10.1145/3564746.3587014acmotherconferencesArticle/Chapter ViewAbstractPublication Pagesacm-seConference Proceedingsconference-collections
research-article

Trust-based Enrollment in a Group in a Distributed Setting

Published:12 June 2023Publication History

ABSTRACT

We investigate how trust can be defined and exploited in the problem of accepting a candidate for enrollment in a group in a distributed setting. A simulation in Python using the NetworkX package has the servers (nodes) implement the WedID protocol. Each node has a profile document with a FOAF graph connecting the server to its neighbors via the foaf:knows property. We assume that the FOAF graphs have been assembled into a network tying together the group. Enrollment relies heavily on two novel notions of trust: one is the trust one node has in another, which we take to come from several kinds of sources, and the other is the trustworthiness a node enjoys because of its centrality. If someone objects to the candidate, there is a vote, a novel procedure that weights a node's votes by its trustworthiness and allows votes based on reference weighted by trust in the referrer. Our main contributions are the procedure for accepting a candidate and the two notions of trust. Results to date include the simulation mentioned; thirty-five test runs provided reasonable results. Work in progress is an implementation of the procedures on a group of servers implementing the WebID protocol.

References

  1. Karl Aberer and Zoran Despotovic. 2001. Managing Trust in a Peer-2-Peer Information System. In Proceedings of the tenth international conference on Information and knowledge management. 310--317.Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. David Airehrour, Jairo Gutierrez, and Sayan Kumar Ray. 2016. A Lightweight Trust Design for IoT Routing. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, 552--557.Google ScholarGoogle Scholar
  3. Dan Brickley and Libby Miller. 2014. FOAF Vocabulary Specification 0.99. W3C (2014). http://xmlns.com/foaf/0.1Google ScholarGoogle Scholar
  4. Arthur P Dempster. 2008. Upper and Lower Probabilities Induced by a Multivalued Mapping. In Classic works of the Dempster-Shafer theory of belief functions. Springer, 57--72.Google ScholarGoogle Scholar
  5. David Easley and Jon Kleinberg. 2010. Networks, Crowds, and Markets: Reasoning about a Highly Connected World. Cambridge university press.Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Tyrone Grandison and Morris Sloman. 2003. Trust Management Tools for Internet Applications. In International Conference on Trust Management. Springer, 91--107.Google ScholarGoogle Scholar
  7. Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A Survey of Trust and Reputation Systems for Online Service Provision. Decision support systems 43, 2 (2007), 618--644.Google ScholarGoogle Scholar
  8. Kofi Kyei, William Nick, and Albert Esterline. 2021. A Method for Calculating Trustworthiness in Social Networks. In SoutheastCon 2021. IEEE, 01--06.Google ScholarGoogle ScholarCross RefCross Ref
  9. Seungjoon Lee, Rob Sherwood, and Bobby Bhattacharjee. 2003. Cooperative Peer Groups in NICE. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), Vol. 2. IEEE, 1272--1282.Google ScholarGoogle Scholar
  10. J David Lewis and Andrew Weigert. 1985. Trust as a Social Reality. Social forces 63, 4 (1985), 967--985.Google ScholarGoogle Scholar
  11. Yujia Liu, Changyong Liang, Francisco Chiclana, and Jian Wu. 2017. A Trust Induced Recommendation Mechanism for Reaching Consensus in Group Decision Making. Knowledge-Based Systems 119 (2017), 221--231.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Paolo Massa and Paolo Avesani. 2007. Trust-aware Recommender Systems. In Proceedings of the 2007 ACM conference on Recommender systems. 17--24.Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. Mark Newman. 2018. Networks. Oxford university press.Google ScholarGoogle Scholar
  14. Thomas L Saaty. 1988. What is the Analytic Hierarchy Process? In Mathematical models for decision support. Springer, 109--121.Google ScholarGoogle Scholar
  15. Andrei Sambra, Henry Story, and Tim Berners-Lee. 2014. WebID 1.0, Web Identity and Discovery. W3C Editor's Draft (2014). https://www.w3.org/2005/Incubator/webid/spec/identity/Google ScholarGoogle Scholar
  16. Glenn Shafer. 1976. A Mathematical Theory of Evidence. Vol. 42. Princeton university press.Google ScholarGoogle Scholar
  17. Henry Story, Bruno Harbulot, Ian Jacobi, and Mike Jones. 2009. FOAF+ SSL: Restful Authentication for the Social Web. In Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009).Google ScholarGoogle Scholar
  18. Stanislav Sùkora. 2009. Mathematical Means and Averages: Basic Properties. Ph.D. Dissertation. Ed. S. Sykora.Google ScholarGoogle Scholar
  19. United Nations Development Programme. 2019. Frequently Asked Questions - Human Development Reports. Technical Report.Google ScholarGoogle Scholar
  20. Jing Pei Wang, Sun Bin, Yang Yu, and Xin Xin Niu. 2013. Distributed Trust Management Mechanism for the Internet of Things. In Applied Mechanics and Materials, Vol. 347. Trans Tech Publ, 2463--2467.Google ScholarGoogle Scholar
  21. Jian Wu, Lifang Dai, Francisco Chiclana, Hamido Fujita, and Enrique Herrera-Viedma. 2018. A Minimum Adjustment Cost Feedback Mechanism Based Consensus Model for Group Decision Making under Social Network with Distributed Linguistic Trust. Information Fusion 41 (2018), 232--242.Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. Raphael Yahalom, Birgit Klein, and Thomas Beth. 1993. Trust Relationships in Secure Systems-a Distributed Authentication Perspective. In Proceedings 1993 IEEE computer society symposium on research in security and privacy. IEEE, 150--164.Google ScholarGoogle ScholarCross RefCross Ref
  23. Bin Yu and Munindar P Singh. 2003. Detecting Deception in Reputation Management. In Proceedings of the second international joint conference on Autonomous agents and multiagent systems. 73--80.Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Trust-based Enrollment in a Group in a Distributed Setting

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in
        • Published in

          cover image ACM Other conferences
          ACM SE '23: Proceedings of the 2023 ACM Southeast Conference
          April 2023
          216 pages
          ISBN:9781450399210
          DOI:10.1145/3564746

          Copyright © 2023 ACM

          Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than the author(s) must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected].

          Publisher

          Association for Computing Machinery

          New York, NY, United States

          Publication History

          • Published: 12 June 2023

          Permissions

          Request permissions about this article.

          Request Permissions

          Check for updates

          Qualifiers

          • research-article

          Acceptance Rates

          ACM SE '23 Paper Acceptance Rate31of71submissions,44%Overall Acceptance Rate178of377submissions,47%
        • Article Metrics

          • Downloads (Last 12 months)30
          • Downloads (Last 6 weeks)2

          Other Metrics

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader