ABSTRACT
We investigate how trust can be defined and exploited in the problem of accepting a candidate for enrollment in a group in a distributed setting. A simulation in Python using the NetworkX package has the servers (nodes) implement the WedID protocol. Each node has a profile document with a FOAF graph connecting the server to its neighbors via the foaf:knows property. We assume that the FOAF graphs have been assembled into a network tying together the group. Enrollment relies heavily on two novel notions of trust: one is the trust one node has in another, which we take to come from several kinds of sources, and the other is the trustworthiness a node enjoys because of its centrality. If someone objects to the candidate, there is a vote, a novel procedure that weights a node's votes by its trustworthiness and allows votes based on reference weighted by trust in the referrer. Our main contributions are the procedure for accepting a candidate and the two notions of trust. Results to date include the simulation mentioned; thirty-five test runs provided reasonable results. Work in progress is an implementation of the procedures on a group of servers implementing the WebID protocol.
- Karl Aberer and Zoran Despotovic. 2001. Managing Trust in a Peer-2-Peer Information System. In Proceedings of the tenth international conference on Information and knowledge management. 310--317.Google ScholarDigital Library
- David Airehrour, Jairo Gutierrez, and Sayan Kumar Ray. 2016. A Lightweight Trust Design for IoT Routing. In 2016 IEEE 14th Intl Conf on Dependable, Autonomic and Secure Computing, 14th Intl Conf on Pervasive Intelligence and Computing, 2nd Intl Conf on Big Data Intelligence and Computing and Cyber Science and Technology Congress (DASC/PiCom/DataCom/CyberSciTech). IEEE, 552--557.Google Scholar
- Dan Brickley and Libby Miller. 2014. FOAF Vocabulary Specification 0.99. W3C (2014). http://xmlns.com/foaf/0.1Google Scholar
- Arthur P Dempster. 2008. Upper and Lower Probabilities Induced by a Multivalued Mapping. In Classic works of the Dempster-Shafer theory of belief functions. Springer, 57--72.Google Scholar
- David Easley and Jon Kleinberg. 2010. Networks, Crowds, and Markets: Reasoning about a Highly Connected World. Cambridge university press.Google ScholarDigital Library
- Tyrone Grandison and Morris Sloman. 2003. Trust Management Tools for Internet Applications. In International Conference on Trust Management. Springer, 91--107.Google Scholar
- Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A Survey of Trust and Reputation Systems for Online Service Provision. Decision support systems 43, 2 (2007), 618--644.Google Scholar
- Kofi Kyei, William Nick, and Albert Esterline. 2021. A Method for Calculating Trustworthiness in Social Networks. In SoutheastCon 2021. IEEE, 01--06.Google ScholarCross Ref
- Seungjoon Lee, Rob Sherwood, and Bobby Bhattacharjee. 2003. Cooperative Peer Groups in NICE. In IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No. 03CH37428), Vol. 2. IEEE, 1272--1282.Google Scholar
- J David Lewis and Andrew Weigert. 1985. Trust as a Social Reality. Social forces 63, 4 (1985), 967--985.Google Scholar
- Yujia Liu, Changyong Liang, Francisco Chiclana, and Jian Wu. 2017. A Trust Induced Recommendation Mechanism for Reaching Consensus in Group Decision Making. Knowledge-Based Systems 119 (2017), 221--231.Google ScholarDigital Library
- Paolo Massa and Paolo Avesani. 2007. Trust-aware Recommender Systems. In Proceedings of the 2007 ACM conference on Recommender systems. 17--24.Google ScholarDigital Library
- Mark Newman. 2018. Networks. Oxford university press.Google Scholar
- Thomas L Saaty. 1988. What is the Analytic Hierarchy Process? In Mathematical models for decision support. Springer, 109--121.Google Scholar
- Andrei Sambra, Henry Story, and Tim Berners-Lee. 2014. WebID 1.0, Web Identity and Discovery. W3C Editor's Draft (2014). https://www.w3.org/2005/Incubator/webid/spec/identity/Google Scholar
- Glenn Shafer. 1976. A Mathematical Theory of Evidence. Vol. 42. Princeton university press.Google Scholar
- Henry Story, Bruno Harbulot, Ian Jacobi, and Mike Jones. 2009. FOAF+ SSL: Restful Authentication for the Social Web. In Proceedings of the First Workshop on Trust and Privacy on the Social and Semantic Web (SPOT2009).Google Scholar
- Stanislav Sùkora. 2009. Mathematical Means and Averages: Basic Properties. Ph.D. Dissertation. Ed. S. Sykora.Google Scholar
- United Nations Development Programme. 2019. Frequently Asked Questions - Human Development Reports. Technical Report.Google Scholar
- Jing Pei Wang, Sun Bin, Yang Yu, and Xin Xin Niu. 2013. Distributed Trust Management Mechanism for the Internet of Things. In Applied Mechanics and Materials, Vol. 347. Trans Tech Publ, 2463--2467.Google Scholar
- Jian Wu, Lifang Dai, Francisco Chiclana, Hamido Fujita, and Enrique Herrera-Viedma. 2018. A Minimum Adjustment Cost Feedback Mechanism Based Consensus Model for Group Decision Making under Social Network with Distributed Linguistic Trust. Information Fusion 41 (2018), 232--242.Google ScholarDigital Library
- Raphael Yahalom, Birgit Klein, and Thomas Beth. 1993. Trust Relationships in Secure Systems-a Distributed Authentication Perspective. In Proceedings 1993 IEEE computer society symposium on research in security and privacy. IEEE, 150--164.Google ScholarCross Ref
- Bin Yu and Munindar P Singh. 2003. Detecting Deception in Reputation Management. In Proceedings of the second international joint conference on Autonomous agents and multiagent systems. 73--80.Google ScholarDigital Library
Index Terms
- Trust-based Enrollment in a Group in a Distributed Setting
Recommendations
National culture and consumer trust in e-commerce
The article examines how culture influences trust in e-commerce.Disposition to trust is a significant predictor of perceived trustworthiness.Disposition to trust mediates effects between national culture and trustworthiness.Long-term orientation and ...
Distrust and trust in B2C e-commerce: do they differ?
ICEC '06: Proceedings of the 8th international conference on Electronic commerce: The new e-commerce: innovations for conquering current barriers, obstacles and limitations to conducting successful business on the internetResearchers have not studied e-commerce <u>distrust</u> as much as e-commerce <u>trust</u>. This study examines whether trust and distrust are distinct concepts. If trust and distrust are the same, lack of distrust research matters little. But if they ...
A Distributed Trust-based Reputation Model in P2P System
SNPD '07: Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 01The P2P system is an anonymous and dynamic system, thus, some malicious behaviour can't be punished. In order to restrict the malicious behaviour in the P2P system, researchers have focused on establishing effective reputation systems. However, the ...
Comments