Survey of Trust Management on Various Networks

Trust representation and management has been studied in in the context of various information for a long time. Originally a digital equivalent of human trust, trust in information system is used for different purposes. In this paper we surveyed studies on how trust is represented and managed in previous trust/reputation systems. We focus on how trust in information systems is formed-manually or automatically, how trust is represented according to metrics used, and how trust is managed when transitivity is concerned. Furthermore, we investigated the characteristics of each design choice. Finally, we briefly reviewed typical architectures of trust management systems, and critical issues that affects their performance and robustness.

[1]  Li Ding,et al.  Trust based knowledge outsourcing for semantic Web agents , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).

[2]  Panagiotis Papadimitratos,et al.  On Data-Centric Trust Establishment in Ephemeral Ad Hoc Networks , 2008, IEEE INFOCOM 2008 - The 27th Conference on Computer Communications.

[3]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[4]  Malcolm J. Beynon,et al.  The Dempster-Shafer Theory , 2009, Encyclopedia of Artificial Intelligence.

[5]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[6]  Jean-Yves Le Boudec,et al.  The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-hoc Networks , 2003 .

[7]  Ernesto Damiani,et al.  Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems: Special Topic Section on Soft Approaches to Information Retrieval and Information Access on the Web , 2006 .

[8]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[9]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[10]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[11]  Vitaly Shmatikov,et al.  De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.

[12]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[13]  Ersin Uzun,et al.  A reputation-based trust management system for P2P networks , 2004, IEEE International Symposium on Cluster Computing and the Grid, 2004. CCGrid 2004..

[14]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[15]  Ling Liu,et al.  TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[16]  Bhavani M. Thuraisingham,et al.  A semantic web based framework for social network access control , 2009, SACMAT '09.

[17]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[18]  Jennifer Golbeck,et al.  Inferring Reputation on the Semantic Web , 2004, WWW 2004.

[19]  Rino Falcone,et al.  Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).

[20]  Ali Aydın,et al.  Reputation-Based Trust Management for P2P Networks , 2004 .

[21]  Audun Jøsang Probabilistic Logic under Uncertainty , 2007, CATS.

[22]  Yong Zhang,et al.  A Novel Reputation Computation Model Based on Subjective Logic for Mobile Ad Hoc Networks , 2009, 2009 Third International Conference on Network and System Security.

[23]  Audun Jøsang,et al.  Optimal Trust Network Analysis with Subjective Logic , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[24]  Zhu Han,et al.  Information theoretic framework of trust modeling and evaluation for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[25]  Batya Friedman,et al.  Trust online , 2000, CACM.

[26]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[27]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[28]  Kai Hwang,et al.  Gossip-based Reputation Aggregation for Unstructured Peer-to-Peer Networks , 2007, 2007 IEEE International Parallel and Distributed Processing Symposium.

[29]  Nora Cuppens-Boulahia,et al.  A Robust Reputation Scheme for Group Management in Mobile Ad Hoc Networks , 2008 .

[30]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[31]  James C. Browne,et al.  Using uncertainty in reputation methods to enforce cooperation in ad-hoc networks , 2006, WiSe '06.

[32]  Françoise Sailhan,et al.  Group management for mobile Ad Hoc networks: design, implementation and experiment , 2005, MDM '05.

[33]  Georg Lausen,et al.  Propagation Models for Trust and Distrust in Social Networks , 2005, Inf. Syst. Frontiers.

[34]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[35]  Jonathan Weisberg,et al.  Dempster-Shafer Theory , 2010 .

[36]  Jing Wang,et al.  Trust Model Based on Similarity Measure of Vectors in P2P Networks , 2005, GCC.

[37]  Azzedine Boukerche,et al.  Modeling and Managing the Trust for Wireless and Mobile Ad Hoc Networks , 2008, 2008 IEEE International Conference on Communications.

[38]  Ernesto Damiani,et al.  Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems , 2006, J. Assoc. Inf. Sci. Technol..

[39]  Michael Rovatsos,et al.  Using trust for detecting deceitful agents in artificial societies , 2000, Appl. Artif. Intell..

[40]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[41]  Bruce Christianson,et al.  Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.

[42]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[43]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[44]  Ioanis Nikolaidis,et al.  Certain limitations of reputation--based schemes in mobile environments , 2005, MSWiM '05.

[45]  James A. Hendler,et al.  Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-Based Social Networks , 2004, EKAW.

[46]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[47]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[48]  Sheng Zhong,et al.  Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[49]  James A. Hendler,et al.  The Semantic Web" in Scientific American , 2001 .

[50]  Manoj Misra,et al.  Trust based security in MANET routing protocols: a survey , 2010, A2CWiC '10.

[51]  James A. Hendler,et al.  The Semantic Web 10 , 2011 .

[52]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[53]  Chrysanthos Dellarocas Efficiency and Robustness of Binary Feedback Mechanisms in Trading Environments with Moral Hazard , 2003 .

[54]  P. Papadimitratos Secure ad hoc networking , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[55]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[56]  Audun Jøsang,et al.  Exploring Different Types of Trust Propagation , 2006, iTrust.

[57]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[58]  Vana Kalogeraki,et al.  Decentralized trust management for ad-hoc peer-to-peer networks , 2006, MPAC '06.

[59]  Audun Jøsang,et al.  Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..

[60]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[61]  R. Likert “Technique for the Measurement of Attitudes, A” , 2022, The SAGE Encyclopedia of Research Design.

[62]  Azzedine Boukerche,et al.  A security management scheme using a novel computational reputation model for wireless and mobile ad hoc networks , 2008, PE-WASUN '08.

[63]  Paolo Avesani,et al.  Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.

[64]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[65]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[66]  Timothy W. Finin,et al.  Developing Secure Agent Systems Using Delegation Based Trust Management , 2002, AAMAS 2002.

[67]  Marianne Winslett,et al.  Negotiating Trust on the Web , 2002, IEEE Internet Comput..