GTrust: a group based trust model




Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both parties of such trust relationship will face big problems of collecting data and forming reasonable and reliable beliefs. Considering the concept of "group" in modeling trust is a way to overcome the above mentioned problems. Since, group-based trust is more suited with the nature of trust in new virtual environments. In this paper, a new trust model called "GTrust" is proposed in which trust is considered as a collective and shared feature of all group members. Therefore, group membership is used as the judgment criteria regarding a person's expected behavior and how he can be a trustee. GTrust is based on Metagraphs which are graphical data structures for representing a collection of directed set-to-set mappings. We show that by using GTrust, large trust spaces between unknown individuals can be shaped effectively. The proposed model not only offers a better description of human sense of trust when considering communities, but also provides the setting for evaluating the trust of individuals whom we do not know, and therefore provides an extended evaluation domain.


[1] S. C. Currall and A. C. Inkpen, "13 On the complexity of organizational trust: a multi-level co-evolutionary perspective and guidelines for future research," Handbook of trust research, p. 235, 2006.

[2] C. Offe, "How can we trust our fellow citizens?," Democracy and trust, pp. 42-87, 1999.

[3] R. Spanek, "SecGRID: model for maintaining trust in large-scale dynamic environments," International Journal of Grid and Utility Computing, vol. 1, pp. 146-158, 2009.

[4] M. Foddy and R. Dawes, "Group-based trust in social dilemmas," New Issues and Paradigms in Research on Social Dilemmas, pp. 57-71, 2008.

[5] M. Williams, "In whom we trust: Group membership as an affective context for trust development," Academy of Management Review, vol. 26, pp. 377-396, 2001.

[6] A. Basu and R. W. Blanning, Metagraphs and their applications: Springer, 2007.

[7] M. Yasutomi, Y. Mashimo, and H. Shigeno, "GRAT: Group Reputation Aggregation Trust for Unstructured Peer-to-Peer Networks," in Distributed Computing Systems Workshops (ICDCSW), 2010 IEEE 30th International Conference on, 2010, pp. 126-133.

[8] L. Wenzhi and L. Zhaobin, "Trust Assessment Model Based on Domain Group Collaboration," in 2009 First International Conference on Information Science and Engineering, 2009 pp. 3548-3551.

[9] X. Liu, A. Datta, K. Rzadca, and E. P. Lim, "Stereotrust: a group based personalized trust model," in Proceeding of the 18th ACM conference on Information and knowledge management, 2009, pp. 7-16.

[10] X. Tong and W. Zhang, "Group Trust and Group Reputation," in Fifth International Conference on Natural Computation, 2009, pp. 561-565.

[11] G. Dai, Y. Wang, Z. Jiang, and Y. Hou, "A Group Trust Model with Control Flow Constraint Based on Bayesian Method," in Computational Science and Optimization (CSO), 2010 Third International Joint Conference on, 2010, pp. 390-394.

[12] W. Yong and R. Xingtian, "A Group Trust Model with Control Flow Constraint Based on Subjective Logic," in Management and Service Science, 2009. MASS '09. International Conference on, 2009, pp. 1-6.

[13] R. A. Shaikh, H. Jameel, B. J. d'Auriol, H. Lee, S. Lee, and Y. J. Song, "Group-based trust management scheme for clustered wireless sensor networks," Parallel and Distributed Systems, IEEE Transactions on, vol. 20, pp. 1698-1712, 2009.

[14] G. H. Zhang and Z. G. Chen, "A Robust Trust Model Based on Group for P2P Environments," Key Engineering Materials, vol. 439, pp. 98-103, 2010.

[15] A. Ravichandran and J. Yoon, "Trust management with delegation in grouped peer-to-peer communities," in Proceedings of the eleventh ACM symposium on Access control models and technologies, 2006, pp. 71-80.

[16] A. Gummadi and J. P. Yoon, "Modeling group trust for peer-to-peer access control," in Database and Expert Systems Applications, 2004. Proceedings. 15th International Workshop on, 2004, pp. 971-978.

[17] S. Bistarelli and F. Santini, "SCLP for trust propagation in small-world networks," Recent Advances in Constraints, pp. 32-46, 2008.

[18] B. McEvily, V. Perrone, and A. Zaheer, "Trust as an organizing principle," Organization Science, vol. 14, pp. 91-103, 2003.

[19] R. Prada and A. Paiva, "Believable groups of synthetic characters," in Proceedings of the fourth international joint conference on Autonomous agents and multi-agent systems, 2005, pp. 37-43.

[20] Z.-H. Tan, "Fuzzy metagraph and its combination with the indexing approach in rule-based systems," Knowledge and Data Engineering, IEEE Transactions on, vol. 18, pp. 829-841, 2006.

[21] E.Mokhtari, Z. Noorian, B. Tork Ladani, and M. Nematbakhsh. "A context-aware reputation-based model of trust for open multi-agent environments." Advances in Artificial Intelligence, pp. 301-312. Springer Berlin Heidelberg, 2011.

[22] M. McPherson, L. Smith-Lovin, and J. M. Cook, "Birds of a feather: homophily in social networks," Annual Review of Sociology, vol. 27, no. 1, pp. 415-444, 2001.

[23] J.Han., and M. Kamber, "Data Mining: Concepts and Techniques". Elsevier, San Francisco. 2006.