RTBIMS: Accuracy enhancement in Iterative Multiplication Strategy for computing propagated trust

Trust Management (TM) systems are frameworks for managing security in decentralized environments. However computing the trust value is a challenge when the source entity has no experience of previous direct interaction with the sink. A popular way to estimate the trust value in this case is trust propagation. It suggests evaluating the trust value between two nodes based on the information received from intermediate nodes between them. As we often use a number between 0 and 1 to represent the trust value, the Iterative Multiplication Strategy (IMS) is usually used to estimate the value of propagated trust. In this paper we introduce RTBIMS, an accuracy-enhanced version of IMS. In our algorithm, we first calculate recommendation trust for each intermediate node based on its trustworthiness in judgments and similarity between its views and the source ones. We then use these values in the multiplication chain. We have examined RTBIMS on a popular trust dataset (Advogato) and the results show that its accuracy in evaluating trust is much higher than the basic IMS.

[1]  Li Ding,et al.  Modeling and Evaluating Trust Network Inference , 2004 .

[2]  Paolo Massa,et al.  Page-reRank: using trusted links to re-rank authority , 2005, The 2005 IEEE/WIC/ACM International Conference on Web Intelligence (WI'05).

[3]  Lionel Brunie,et al.  Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments , 2009, ICPS '09.

[4]  N. Shahmehri,et al.  An Integration of Reputation-based and Policy-based Trust Management , 2005 .

[5]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[6]  Lionel Brunie,et al.  Authentication and Access Control Using Trust Collaboration in Pervasive Grid Environments , 2007, GPC.

[7]  Wolfgang Nejdl,et al.  Security and Trust Issues in Semantic Grids , 2005, Semantic Grid.

[8]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[9]  Katherine J. Stewart,et al.  Effects of hypertext links on trust transfer , 2003, ICEC '03.

[10]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[11]  Katherine J. Stewart,et al.  Transference as a means of building trust in World Wide Web sites , 1999, ICIS.

[12]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[13]  York Sure-Vetter,et al.  Semantic Grid - The convergence of technologies , 2006, J. Web Semant..

[14]  Charles J. Kacmar,et al.  Developing and Validating Trust Measures for e-Commerce: An Integrative Typology , 2002, Inf. Syst. Res..

[15]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[16]  Lionel Brunie,et al.  Access Control in Ubiquitous Environments Based on Subjectivity Eliminated Trust Propagation , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[17]  Paolo Avesani,et al.  Controversial Users Demand Local Trust Metrics: An Experimental Study on Epinions.com Community , 2005, AAAI.

[18]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[19]  S Hailes,et al.  Using Recommendations for Managing Trust in Distributed Systems , 1997 .

[20]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[21]  David G. Kirkpatrick,et al.  Linear Time Euclidean Distance Algorithms , 1995, IEEE Trans. Pattern Anal. Mach. Intell..