Flow-based reputation with uncertainty: evidence-based subjective logic

The concept of reputation is widely used as a measure of trustworthiness based on ratings from members in a community. The adoption of reputation systems, however, relies on their ability to capture the actual trustworthiness of a target. Several reputation models for aggregating trust information have been proposed in the literature. The choice of model has an impact on the reliability of the aggregated trust information as well as on the procedure used to compute reputations. Two prominent models are flow-based reputation (e.g., EigenTrust, PageRank) and subjective logic-based reputation. Flow-based models provide an automated method to aggregate trust information, but they are not able to express the level of uncertainty in the information. In contrast, subjective logic extends probabilistic models with an explicit notion of uncertainty, but the calculation of reputation depends on the structure of the trust network and often requires information to be discarded. These are severe drawbacks. In this work, we observe that the ‘opinion discounting’ operation in subjective logic has a number of basic problems. We resolve these problems by providing a new discounting operator that describes the flow of evidence from one party to another. The adoption of our discounting rule results in a consistent subjective logic algebra that is entirely based on the handling of evidence. We show that the new algebra enables the construction of an automated reputation assessment procedure for arbitrary trust networks, where the calculation no longer depends on the structure of the network, and does not need to throw away any information. Thus, we obtain the best of both worlds: flow-based reputation and consistent handling of uncertainties.

[1]  Vijay Varadharajan,et al.  MobileTrust: a trust enhanced security architecture for mobile agent systems , 2010, International Journal of Information Security.

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Kamal Kant Bharadwaj,et al.  Fuzzy computational models for trust and reputation systems , 2009, Electron. Commer. Res. Appl..

[4]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[5]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[6]  Jun Wang,et al.  TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.

[7]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[8]  Pascal Poupart,et al.  The Advisor-POMDP: A Principled Approach to Trust through Reputation in Electronic Markets , 2005, PST.

[9]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[10]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[11]  Touhid Bhuiyan,et al.  Analysing Trust Transitivity and the Effects of Unknown Dependence , 2010 .

[12]  Harro Heuser Funktionalanalysis : Theorie und Anwendung , 1986 .

[13]  Patrick Schweitzer,et al.  On Beta Models with Trust Chains , 2013, IFIPTM.

[14]  Audun Jøsang,et al.  Optimal Trust Network Analysis with Subjective Logic , 2008, 2008 Second International Conference on Emerging Security Information, Systems and Technologies.

[15]  Max Mühlhäuser,et al.  CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper) , 2011, TRUST.

[16]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[17]  R JenningsNicholas,et al.  An integrated trust and reputation model for open multi-agent systems , 2006 .

[18]  Tiago P. Peixoto,et al.  Trust Transitivity in Social Networks , 2010, PloS one.

[19]  Nicola Zannone,et al.  Impact of ICT on Home Healthcare , 2012, HCC.

[20]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[21]  Sandro Etalle,et al.  GEM: A distributed goal evaluation algorithm for trust management , 2012, Theory and Practice of Logic Programming.

[22]  Markus Reichstein,et al.  The model–data fusion pitfall: assuming certainty in an uncertain world , 2011, Oecologia.

[23]  Audun Jøsang,et al.  Trust Transitivity and Conditional Belief Reasoning , 2012, IFIPTM.

[24]  Audun Jøsang,et al.  The consensus operator for combining beliefs , 2002, Artif. Intell..

[25]  Elena Console,et al.  Data Fusion , 2009, Encyclopedia of Database Systems.

[26]  Nicola Zannone,et al.  A reference model for reputation systems , 2014, Decis. Support Syst..

[27]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[28]  P. Vannoorenberghe,et al.  Strategies for combining conflicting dogmatic beliefs , 2003, Sixth International Conference of Information Fusion, 2003. Proceedings of the.

[29]  Xinming Ou,et al.  Prioritizing intrusion analysis using Dempster-Shafer theory , 2011, AISec '11.

[30]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[31]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[32]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[33]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[34]  Alexandru Iosup,et al.  TRIBLER: a social-based peer-to-peer system: Research Articles , 2008 .

[35]  Audun Jøsang,et al.  Simplification and analysis of transitive trust networks , 2006, Web Intell. Agent Syst..

[36]  Shlomo Moran,et al.  The stochastic approach for link-structure analysis (SALSA) and the TKC effect , 2000, Comput. Networks.

[37]  Wenchang Shi,et al.  Using new fusion operations to improve trust expressiveness of subjective logic , 2011, Wuhan University Journal of Natural Sciences.

[38]  Kari Sentz,et al.  Combination of Evidence in Dempster-Shafer Theory , 2002 .

[39]  Nir Oren,et al.  Subjective logic operators in trust assessment: an empirical study , 2013, Inf. Syst. Frontiers.

[40]  Johan A. Pouwelse,et al.  Leveraging node properties in random walks for robust reputations in decentralized networks , 2013, IEEE P2P 2013 Proceedings.

[41]  Ling Liu,et al.  Systematic analysis of centralized online reputation systems , 2012, Decis. Support Syst..

[42]  L. Smeltzer The Meaning and Origin of Trust in Buyer-Supplier Relationships , 1997 .

[43]  Nicola Zannone,et al.  Perceived risk assessment , 2008, QoP '08.

[44]  Philippe Smets,et al.  Analyzing the combination of conflicting belief functions , 2007, Inf. Fusion.

[45]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[46]  Antonino Simone,et al.  Flow-Based Reputation: More than Just Ranking , 2012, Int. J. Inf. Technol. Decis. Mak..

[47]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.