An Investigation into Trust & Reputation for Agent-Based Virtual Organisations

Trust is a prevalent concept in human society. In essence, it concerns our reliance on the actions of our peers, and the actions of other entities within our environment. For example, we may rely on our car starting in the morning to get to work on time, and on the actions of our fellow drivers, so that we may get there safely. For similar reasons, trust is becoming increasingly important in computing, as systems, such as the Grid, require computing resources to work together seamlessly, across organisational and geographical boundaries (Foster et al., 2001). In this context, the reliability of resources in one organisation cannot be assumed from the point of view of another. Moreover, certain resources may fail more often than others, and for this reason, we argue that software systems must be able to assess the reliability of different resources, so that they may choose which resources to rely upon. With this in mind, our goal here is to develop a mechanism by which software entities can automatically assess the trustworthiness of a given entity (the trustee). In achieving this goal, we have developed a probabilistic framework for assessing trust based on observations of a trustee's past behaviour. Such observations may be accounted for either when they are made directly by the assessing party (the truster), or by a third party (reputation source). In the latter case, our mechanism can cope with the possibility that third party information is unreliable, either because the sender is lying, or because it has a different world view. In this document, we present our framework, and show how it can be applied to cases in which a trustee's actions are represented as binary events; for example, a trustee may cooperate with the truster, or it may defect. We place our work in context, by showing how it constitutes part of a system for managing coalitions of agents, operating in a grid computing environment. We then give an empirical evaluation of our method, which shows that it outperforms the most similar system in the literature, in many important scenarios.

[1]  James C. Spohrer,et al.  KidSim: programming agents without a programming language , 1994, CACM.

[2]  Volker Roth,et al.  Outlier Detection with One-class Kernel Fisher Discriminants , 2004, NIPS.

[3]  Shigeo Abe DrEng Pattern Classification , 2001, Springer London.

[4]  Vic Barnett,et al.  Outliers in Statistical Data , 1980 .

[5]  E. Friedman,et al.  The Social Cost of Cheap Pseudonyms , 2001 .

[6]  Bernhard Schölkopf,et al.  Support Vector Method for Novelty Detection , 1999, NIPS.

[7]  D. Titterington,et al.  Minimum Covering Ellipses , 1980 .

[8]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[9]  Graham J. G. Upton,et al.  A Dictionary of Statistics , 2002 .

[10]  Nicholas R. Jennings,et al.  Brain Meets Brawn: Why Grid and Agents Need Each Other , 2004, Towards the Learning Grid.

[11]  D. Hearn,et al.  The Minimum Covering Sphere Problem , 1972 .

[12]  Jianhua Shao,et al.  A Quality of Service Management Framework Based on User Expectations , 2003, ICSOC.

[13]  Frank Adelstein,et al.  Fundamentals of Mobile and Pervasive Computing , 2004 .

[14]  Christophe Croux,et al.  Location adjustment for the minimum volume ellipsoid estimator , 2002, Stat. Comput..

[15]  Muthucumaru Maheswaran,et al.  Evolving and managing trust in grid computing systems , 2002, IEEE CCECE2002. Canadian Conference on Electrical and Computer Engineering. Conference Proceedings (Cat. No.02CH37373).

[16]  P. Rousseeuw,et al.  A fast algorithm for the minimum covariance determinant estimator , 1999 .

[17]  Eric R. Ziegel,et al.  Applied Multivariate Data Analysis , 2002, Technometrics.

[18]  Alexander J. Smola,et al.  Learning with kernels , 1998 .

[19]  Luc Pronzato,et al.  ACCELERATION OF D-OPTIMUM DESIGN ALGORITHMS BY REMOVING NON-OPTIMAL SUPPORT POINTS , 2002 .

[20]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[21]  Thomas T. Tran,et al.  Improving user satisfaction in agent-based electronic marketplaces by reputation modelling and adjustable product quality , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[22]  Richard S. Sutton,et al.  Reinforcement Learning: An Introduction , 1998, IEEE Trans. Neural Networks.

[23]  Colin Campbell,et al.  A Linear Programming Approach to Novelty Detection , 2000, NIPS.

[24]  Nello Cristianini,et al.  Kernel Methods for Pattern Analysis , 2004 .

[25]  F. B. Vernadat,et al.  Decisions with Multiple Objectives: Preferences and Value Tradeoffs , 1994 .

[26]  B. Misztal Trust in Modern Societies: The Search for the Bases of Social Order , 1996 .

[27]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[28]  Christopher M. Bishop,et al.  Novelty detection and neural network validation , 1994 .

[29]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[30]  S. Buchegger,et al.  A Robust Reputation System for Mobile Ad-hoc Networks , 2003 .

[31]  Anja Vogler,et al.  An Introduction to Multivariate Statistical Analysis , 2004 .

[32]  Peter Szolovits,et al.  Ratings in Distributed Systems: A Bayesian Approach , 2002 .

[33]  Muthucumaru Maheswaran,et al.  Integrating trust into grid resource management systems , 2002, Proceedings International Conference on Parallel Processing.

[34]  Peter Norvig,et al.  Artificial Intelligence: A Modern Approach , 1995 .

[35]  Boi Faltings,et al.  Towards Incentive-Compatible Reputation Management , 2002, Trust, Reputation, and Security.

[36]  Nicholas R. Jennings,et al.  Computational-Mechanism Design: A Call to Arms , 2003, IEEE Intell. Syst..

[37]  Rino Falcone,et al.  A Fuzzy Approach to a Belief-Based Trust Computation , 2002, Trust, Reputation, and Security.

[38]  John B. Kidd,et al.  Decisions with Multiple Objectives—Preferences and Value Tradeoffs , 1977 .

[39]  Nicholas R. Jennings,et al.  Intelligent agents: theory and practice , 1995, The Knowledge Engineering Review.

[40]  Alun D. Preece,et al.  CONOISE: Agent-Based Formation of Virtual Organisations , 2003, SGAI Conf..

[41]  C. Harris,et al.  Sparse model identification using orthogonal forward regression with basis pursuit and D-optimality , 2004 .

[42]  Judea Pearl,et al.  Probabilistic reasoning in intelligent systems - networks of plausible inference , 1991, Morgan Kaufmann series in representation and reasoning.

[43]  James A. Hendler,et al.  The Semantic Web" in Scientific American , 2001 .

[44]  David J. Olive Applications of Robust Distances for Regression , 2002, Technometrics.

[45]  Sarvapali D. Ramchurn,et al.  Minimising intrusiveness in pervasive computing environments using multi-agent negotiation , 2004, The First Annual International Conference on Mobile and Ubiquitous Systems: Networking and Services, 2004. MOBIQUITOUS 2004..

[46]  L. Joseph,et al.  Bayesian Statistics: An Introduction , 1989 .

[47]  Robert P. W. Duin,et al.  Support vector domain description , 1999, Pattern Recognit. Lett..

[48]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[49]  N. Luhmann,et al.  Trust: Making and Breaking Cooperative Relations , 1990 .

[50]  C. Croux,et al.  Principal Component Analysis Based on Robust Estimators of the Covariance or Correlation Matrix: Influence Functions and Efficiencies , 2000 .

[51]  C. Croux,et al.  Influence Function and Efficiency of the Minimum Covariance Determinant Scatter Matrix Estimator , 1999 .

[52]  Ian Foster,et al.  The Grid 2 - Blueprint for a New Computing Infrastructure, Second Edition , 1998, The Grid 2, 2nd Edition.

[53]  Nicholas R. Jennings,et al.  Cooperative Information Sharing to Improve Distributed Learning , 2004 .

[54]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[55]  Bernhard Schölkopf,et al.  Extracting Support Data for a Given Task , 1995, KDD.

[56]  Nello Cristianini,et al.  On the Eigenspectrum of the Gram Matrix and Its Relationship to the Operator Eigenspectrum , 2002, ALT.

[57]  Stephen Hailes,et al.  A distributed trust model , 1998, NSPW '97.

[58]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[59]  Vladimir Vapnik,et al.  Statistical learning theory , 1998 .

[60]  Jianhua Shao,et al.  Incorporating QoS Specifications in Service Discovery , 2004, WISE Workshops.

[61]  John Goodier,et al.  A Dictionary of Statistics , 2003 .

[62]  C. Sierra,et al.  REGRET: A reputation model for gregarious societies , 2001 .

[63]  L. Devroye,et al.  Detection of Abnormal Behavior Via Nonparametric Estimation of the Support , 1980 .

[64]  Lotfi A. Zadeh,et al.  Fuzzy Sets , 1996, Inf. Control..

[65]  Julita Vassileva,et al.  Bayesian network-based trust model , 2003, Proceedings IEEE/WIC International Conference on Web Intelligence (WI 2003).

[66]  Dieter Gollmann,et al.  Computer Security , 1979, Lecture Notes in Computer Science.

[67]  Ian T. Foster,et al.  The Anatomy of the Grid: Enabling Scalable Virtual Organizations , 2001, Int. J. High Perform. Comput. Appl..

[68]  Hung T. Nguyen,et al.  Probability for statistics , 1989 .

[69]  K. Suzanne Barber,et al.  Belief Revision Process Based on Trust: Agents Evaluating Reputation of Information Sources , 2000, Trust in Cyber-societies.

[70]  L. A. Zadeh,et al.  Fuzzy logic and approximate reasoning , 1975, Synthese.

[71]  D. Titterington Estimation of Correlation Coefficients by Ellipsoidal Trimming , 1978 .

[72]  Sarvapali D. Ramchurn,et al.  Trust-based mechanism design , 2004, Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent Systems, 2004. AAMAS 2004..

[73]  Chrysanthos Dellarocas,et al.  Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.

[74]  Lionel Tarassenko,et al.  A System for the Analysis of Jet Engine Vibration Data , 1999, Integr. Comput. Aided Eng..

[75]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[76]  Peng Sun,et al.  Computation of Minimum Volume Covering Ellipsoids , 2002, Oper. Res..

[77]  Charles P. Pfleeger,et al.  Security in computing , 1988 .

[78]  Diego Gambetta Can We Trust Trust , 2000 .

[79]  Luc Pronzato,et al.  Kantorovich-type inequalities for operators via D-optimal design theory , 2005 .

[80]  Munindar P. Singh,et al.  Detecting deception in reputation management , 2003, AAMAS '03.

[81]  Ami Marowka,et al.  The GRID: Blueprint for a New Computing Infrastructure , 2000, Parallel Distributed Comput. Pract..

[82]  C. O'Connor An introduction to multivariate statistical analysis: 2nd edn. by T. W. Anderson. 675 pp. Wiley, New York (1984) , 1987 .

[83]  Alun D. Preece,et al.  Agent-based virtual organisations for the Grid , 2005, AAMAS '05.

[84]  P. Rousseeuw Least Median of Squares Regression , 1984 .

[85]  Jordi Sabater-Mir,et al.  Social ReGreT, a reputation model based on social relations , 2001, SECO.

[86]  R. L. Keeney,et al.  Decisions with Multiple Objectives: Preferences and Value Trade-Offs , 1977, IEEE Transactions on Systems, Man, and Cybernetics.

[87]  W. D. Ray Applied Multivariate Data Analysis: Vol. 1, Regression and Experimental Design , 1992 .

[88]  Nicholas R. Jennings,et al.  Polynomial algorithms for clearing multi-unit single-item and multi-unit combinatorial reverse auctions , 2002, ECAI.

[89]  Peter J. Rousseeuw,et al.  Robust Regression and Outlier Detection , 2005, Wiley Series in Probability and Statistics.

[90]  A. Jøsang Subjective Evidential Reasoning � , 2002 .

[91]  David G. Stork,et al.  Pattern Classification (2nd ed.) , 1999 .

[92]  Nicholas R. Jennings,et al.  Supporting formation and operation of virtual organisations in a grid environment , 2004 .

[93]  Robert P. W. Duin,et al.  Novelty Detection Using Self-Organizing Maps , 1997, ICONIP.

[94]  P. Dasgupta Trust as a commodity , 1988 .

[95]  D. Titterington Optimal design: Some geometrical aspects of D-optimality , 1975 .

[96]  G. Elfving Optimum Allocation in Linear Regression Theory , 1952 .

[97]  Manfred K. Warmuth,et al.  The Weighted Majority Algorithm , 1994, Inf. Comput..

[98]  S. Roberts Novelty detection using extreme value statistics , 1999 .

[99]  Stephen P. Boyd,et al.  Determinant Maximization with Linear Matrix Inequality Constraints , 1998, SIAM J. Matrix Anal. Appl..

[100]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.