Trust Computing for Social Networking

Trust plays an important role in a web-based social network. Given the open and dynamic nature of such an online virtual community, trust evaluation relies on transitive relationships among the direct and indirect neighbors of an evaluator. We propose a framework to evaluate the trustworthiness of a given node (e.g., a user) based on a set of trust chains and a trust graph. We will also systematically analyze the inherent relationships between the two approaches. Many terms presented in this paper are new, including a virtual trust chain, the capacity, completeness, and degree of a trust graph, and a base trust chain set for a complete trust graph. Our contributions also include algorithms outlining novel approaches for peer trust evaluation in social networks.

[1]  Barbara Carminati,et al.  Private Relationships in Social Networks , 2007, 2007 IEEE 23rd International Conference on Data Engineering Workshop.

[2]  Indrajit Ray,et al.  A Vector Model of Trust for Developing Trustworthy Systems , 2004, ESORICS.

[3]  Ninghui Li,et al.  Beyond proof-of-compliance: security analysis in trust management , 2005, JACM.

[4]  Barbara Carminati,et al.  Rule-Based Access Control for Social Networks , 2006, OTM Workshops.

[5]  Dan S. Wallach,et al.  Extensible security architectures for Java , 1997, SOSP.

[6]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[7]  John S. Baras,et al.  Trust Evaluation in Anarchy: A Case Study on Autonomous Networks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[8]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[9]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.

[10]  Catholijn M. Jonker,et al.  Formal Analysis of Models for the Dynamics of Trust Based on Experiences , 1999, MAAMAW.

[11]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[12]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[13]  Matthew Richardson,et al.  Trust Management for the Semantic Web , 2003, SEMWEB.

[14]  Audun Jsang,et al.  Analysing topologies of transitive trust , 2003 .

[15]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[16]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[17]  Elisa Bertino,et al.  A Trust-Based Context-Aware Access Control Model for Web-Services , 2004, Proceedings. IEEE International Conference on Web Services, 2004..

[18]  Vijay Varadharajan,et al.  A Trust based Access Control Framework for P2P File-Sharing Systems , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[19]  Erik Vullings,et al.  A Trust-based Access Control Model for Virtual Organizations , 2006, 2006 Fifth International Conference on Grid and Cooperative Computing Workshops.

[20]  Seungjoon Lee,et al.  Cooperative peer groups in NICE , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).

[21]  David Manlove,et al.  Vertex and Edge Covers with Clustering Properties: Complexity and Algorithms , 2009, ACiD.

[22]  Viktor S. Grishchenko,et al.  Redefining Web-of-Trust : reputation , recommendations , responsibility and trust among peers , 2022 .