Document Type : Research Article

Authors

Abstract

It is a common and useful task in a web of trust to evaluate the trust value between two nodes using intermediate nodes. This technique is widely used when the source node has no experience of direct interaction with the target node, or the direct trust is not reliable enough by itself. If trust is used to support decision-making, it is important to have not only an accurate estimate of trust, but also a measure of confidence in the intermediate nodes as well as the final estimated value of trust. The present paper thus aims to introduce a novel framework for integrated representation of trust and confidence using intervals, which provides two operations of trust interval multiplication and summation. The former is used for computing propagated trust and confidence, whereas the latter provides a formula for aggregating different trust opinions. The properties of the two operations are investigated in details. This study also proposes a time-variant method that considers freshness, expertise level and two similarity measures in confidence estimation. The results indicate that this method is more accurate compared to the existing ones. In this regard, the results of experiments carried out on two well-known trust datasets are reported and analyzed, showing that the proposed method increases the accuracy of trust inference in comparison with the existing methods.

Keywords

[1] H. Shakeri and A. G. Bafghi. Computing trust resultant using intervals. In Proceedings of the 8th International ISC Conference on Information Security and Cryptology (ISCISC’11), pages 15-20.FUM, Mashhad, Iran, 2011.
[2] H. Shakeri and A. G. Bafghi. Propagation of trust and confidence using intervals. In Proceedings of the 6th International Conference for Internet Technology and Secured Transactions (ICITST 2011), pages 436-441. Khalifa University, Abu Dhabi, UAE, 2011.
[3] D. Olmedilla, O. Rana, B. Matthews, and W. Nejdl. Security and trust issues in semantic grids. In Proceedings of the Dagsthul Seminar, Semantic Grid: The Convergence of Technologies, no. 05271, 2005.
[4] P. Massa and C. Hayes. Page-rank: Using trusted links to re-rank authority. In Proceedings of the 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI’05), pages 614- 617.Washington DC, USA, 2005.
[5] H. Shakeri and A. G. Bafghi. RTBIMS: Accuracy enhancement in iterative multiplication strategy for computing propagated trust. In Proceedings of the 8th International ISC Conference on Information Security and Cryptology (ISCISC’11), pages 9-14.FUM, Mashhad, Iran, 2011.
[6] J. A. Golbeck. Computing and applying trust in web-based social networks. Ph.D. Dissertation, University of Maryland, College Park, 2005.
[7] U. Kuter and J. Golbeck. SUNNY: A new algorithm for trust inference in social networks using probabilistic confidence models. In Proceedings of the 22nd National Conference on Artificial Intelligence, British Columbia, Canada, pages 1377-1382. 2007.
[8] U. Kuter and J. Golbeck. Using probabilistic confidence models for trust inference in web-based social networks. ACM Transactions on Internet Technology, 10(2):Article 8, 2010.
[9] T. Huynh, N. Jennings, and N. Shadbolt. An integrated trust and reputation model for open multi-agent systems, Autonomous Agents and Multi-Agent Systems, 13:119-154, 2006.
[10] L. Ding, P. Kolari, S. Ganjugunte, T. Finin, and A. Joshi. Modeling and evaluating trust network inference. In Proceedings of the 7th International Workshop on Trust in Agent Societies at AAMAS, 2004.
[11] J. Sabater. Trust and reputation for agent societies. Ph.D. Thesis, Universitat Autonoma de Barcelona, 2003.
[12] W. Teacy, J. Patel, N. Jennings, and M. Luck. Travos: trust and reputation in the context of inaccurate information sources. Journal of Autonomous Agents and Multi-Agent Systems, 12(2):183-198, 2006.
[13] . Saadi, J. M. Pierson, and L. Brunie. Authentication and access control using trust collaboration in pervasive grid environment. In Proceedings of the International Conference on Grid and Pervasive Computing (GPC 2007), 2007.
[14] O. Hasan, L. Brunie, and J. M. Pierson. Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments. In Proceedings of ICPS’09, London, United Kingdom, 2009.
[15] Y. Wang and M. P. Singh. Trust representation and aggregation in a distributed agent system. In Proceedings of 21st National Conference on Artificial Intelligence (AAAI), pages 1425-1430. Boston, MA, USA, 2006.
[16] A. Jøsang and S. G. Knapskog. A metric for trusted systems. In Proceedings of the 21st National Security Conference, pages 16-29. Arlington, Virginia, USA, 1998.
[17] A. Josang and T. Bhuiyan. Optimal trust network analysis with subjective logic. In Proceedings of the 2nd International Conference on Emerging Security Information, Systems and Technologies, pages 179-184. Cap Esterel, France, 2008.
[18] A. Das and M. M. Islam. Secured Trust: A dynamic trust computation model for secured communication in multi-agent systems. IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 9(2):261-274, 2012.
[19] J. Hu, Q. Wu, and B. Zhou., FCTrust: A robust and efficient feedback credibility-based distributed P2P trust model. In Proceedings of the 9th International Conference for Young Computer Scientists, pages 1963-1968. Zhang JiaJie, China, 2008.
[20] B. Khosravifar, J. Bentahar, M. Gomrokchi, and R. Alam. CRM: An efficient trust and reputation model for agent computing, Journal of Knowledge-Based Systems, 30:1-16, 2012.
[21] J. S. Chang and H. J. Wong. Selecting appropriate sellers in online auctions through a multi-attribute reputation calculation method. Journal of Electronic Commerce Research and Applications, 10:144-154, 2011.
[22] X. Qiu, L. Zhang, S.Wang, and G. Qian. A trust transitivity model based on Dempster-Shafer theory. Journal of Networks, 5(2): 1025-1032, 2010.
[23] Y. A. Kim and H. S. Song. Strategies for predicting local trust based on trust propagation in social networks. Journal of Knowledge-Based Systems, 24(8):1360-1371, 2011.
[24] J. Urbano, A. P. Rocha, and E. Oliveria. Computing confidence values: Does trust dynamics matter?. In Proceedings of EPIA’09, Portugal, 2009.
[25] J.Weng, Z. Shen, C. Miao, A. Goh, and C. Leung. Credibility: How agents can handle unfair third party testimonies in computational trust models. IEEE TKDE, 22(9):1286-1298, 2010.
[26] Y. Wang and L. Li. Two-dimensional trust rating aggregations in service-oriented applications, IEEE TRANSACTIONS ON SERVICES COMPUTING, 4(4):257-271, 2011.
[27] W. Ping, Q. Jing, and Q. Y. Hui. A computational trust model with  confidence in unstructured P2P systems. In Proceedings of 2009 Joint Conferences on Pervasive Computing (JCPC 2009), pages 451-454. Tamkang University, Taipei, Taiwan, 2009.
[28] A. G. Bafghi and H. Shakeri. Improving iterative multiplication strategy in estimating propagated trust using similarity measure and ant colony optimization. In Proceedings of the 16th Annual CSI Computer Conference, pages 374-379. Sharif University, Tehran, Iran, 2011.