Managing Trust in Social Networks

ABSTRACT The huge diffusion of Web-based social networks increases the risks for users, including identity theft, personalized phishing, and malware. Effective mechanisms for trust evaluation can help to identify malicious users and contrast these risks. In this paper, we propose an approach to evaluate trust based on the history of the activity of each user. This guarantees robustness (it is difficult to be artificially reproduced by an attacker) and is reliable (as it does not rely on user-generated tags or keyword but it makes an analysis of users' conversation).

[1]  Sebastian Ryszard Kruk,et al.  D-FOAF: Distributed Identity Management with Access Rights Delegation , 2006, ASWC.

[2]  Cynthia Dwork,et al.  Wherefore art thou r3579x?: anonymized social networks, hidden patterns, and structural steganography , 2007, WWW '07.

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  Yao-Hua Tan,et al.  Trust and Deception in Virtual Societies , 2001, Springer Netherlands.

[5]  C. Castelfranchi,et al.  Social Trust : A Cognitive Approach , 2000 .

[6]  P. Bearman,et al.  Chains of Affection: The Structure of Adolescent Romantic and Sexual Networks1 , 2004, American Journal of Sociology.

[7]  Kirsten Swearingen,et al.  Beyond Algorithms: An HCI Perspective on Recommender Systems , 2001 .

[8]  Azadeh Iranmehr,et al.  Trust Management for Semantic Web , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[9]  Rino Falcone,et al.  Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).

[10]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[11]  Li Ding,et al.  How the Semantic Web is Being Used: An Analysis of FOAF Documents , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[12]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[13]  Laszlo Zsolnai,et al.  The rationality of trust20051Russell Hardin. The rationality of trustTrust and Trustworthiness. New York: Russell Sage Foundation 2002.: Trust and Trustworthiness , 2005 .

[14]  Brian Davis,et al.  Trust Models for Community Aware Identity Management , 2006 .

[15]  Yaniv,et al.  Advice Taking in Decision Making: Egocentric Discounting and Reputation Formation. , 2000, Organizational behavior and human decision processes.

[16]  Leyla Bilge,et al.  All your contacts are belong to us: automated identity theft attacks on social networks , 2009, WWW '09.

[17]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[18]  Kevin Borders,et al.  Social networks and context-aware spam , 2008, CSCW.

[19]  Lee Trepanier,et al.  Trust in Society , 2004 .

[20]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[21]  Georg Lausen,et al.  Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[22]  M. Consalvo,et al.  Fono, David, and Raynes-Goldie, Kate. . Hyperfriends and Beyond: Friendship and Social Norms on LiveJournal. , 2006 .

[23]  Alessandro Acquisti,et al.  Information revelation and privacy in online social networks , 2005, WPES '05.

[24]  Yin Pan,et al.  A social approach to security: Using social networks to help detect malicious web content , 2010, 2010 IEEE International Conference on Intelligent Systems and Knowledge Engineering.

[25]  Alexander Aiken,et al.  Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.

[26]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[27]  Rashmi R. Sinha,et al.  Comparing Recommendations Made by Online Systems and Friends , 2001, DELOS.