Heterogeneous network-based trust analysis: a survey

Different information sources publish information with different degrees of correctness and originality. False information can often result in considerable damage. Hence, trustworthinessof information is an important issue in this datadriven world economy. Reputation of different agents in a network has been studied earlier in a variety of domains like e-commerce, social sciences, sensor networks, and P2P networks. Recently there has been work in the data mining community on performing trust analysis based on the data provided by multiple information providers for different objects, and such agents and their provided information about data objects form a multi-typed heterogeneous network. The trust analysis under such a framework is considered as heterogeneous network-based trust analysis. This paper will survey heterogeneous network-based trust analysis models and their applications. We would conclude with a summary and some thoughts on future research in the area.

[1]  Subhash Challa,et al.  Survey of trust models in different network domains , 2010, ArXiv.

[2]  Luca de Alfaro,et al.  A content-driven reputation system for the wikipedia , 2007, WWW '07.

[3]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[4]  Yolanda Gil,et al.  Towards content trust of web resources , 2006, WWW '06.

[5]  Ming Gu,et al.  Evaluating Importance of Websites on News Topics , 2010, PRICAI.

[6]  Dan Roth,et al.  Knowing What to Believe (when you already know something) , 2010, COLING.

[7]  Elisa Bertino,et al.  Trust Evaluation of Data Provenance , 2008 .

[8]  Yizhou Sun,et al.  Apollo: Towards factfinding in participatory sensing , 2011, Proceedings of the 10th ACM/IEEE International Conference on Information Processing in Sensor Networks.

[9]  Felix Naumann,et al.  Data Fusion – Resolving Data Conflicts for Integration , 2009 .

[10]  Du Zhang,et al.  On Temporal Properties of Knowledge Base Inconsistency , 2009, Trans. Comput. Sci..

[11]  Philip S. Yu,et al.  Truth Discovery with Multiple Conflicting Information Providers on the Web , 2007, IEEE Transactions on Knowledge and Data Engineering.

[12]  Ee-Peng Lim,et al.  StereoTrust: a group based personalized trust model , 2009, CIKM.

[13]  PlaleBeth,et al.  A survey of data provenance in e-science , 2005 .

[14]  Deborah L. McGuinness,et al.  Computing trust from revision history , 2006, PST.

[15]  Divesh Srivastava,et al.  Global detection of complex copying relationships between sources , 2010, Proc. VLDB Endow..

[16]  Barbara Poblete,et al.  Information credibility on twitter , 2011, WWW.

[17]  Robin Kravets,et al.  For members only: local and robust group management in DTNS , 2010, CHANTS '10.

[18]  Subbarao Kambhampati,et al.  SourceRank: relevance and trust assessment for deep web sources based on inter-source agreement , 2011, WWW.

[19]  Elizabeth Sklar,et al.  Using argumentation to reason about trust and belief , 2012, J. Log. Comput..

[20]  Yizhou Sun,et al.  Trust analysis with clustering , 2011, WWW.

[21]  Kotagiri Ramamohanarao,et al.  ScoreFinder: A method for collaborative quality inference on user-generated content , 2010, 2010 IEEE 26th International Conference on Data Engineering (ICDE 2010).

[22]  Amélie Marian,et al.  Corroborating Answers from Multiple Web Sources , 2007, WebDB.

[23]  James P. Callan,et al.  Query-based sampling of text databases , 2001, TOIS.

[24]  Xiaoxin Yin,et al.  Semi-supervised truth discovery , 2011, WWW.

[25]  Xin Dong Solomon: seeking the truth via copying detection , 2011, BEWEB.

[26]  Divesh Srivastava,et al.  Integrating Conflicting Data: The Role of Source Dependence , 2009, Proc. VLDB Endow..

[27]  Qingzhong Li,et al.  Find Answers from Web Search Results , 2010, 2010 Seventh Web Information Systems and Applications Conference.

[28]  Elisa Bertino,et al.  High-Assurance Integrity Techniques for Databases , 2008, BNCOD.

[29]  Chao Liu,et al.  FACTO: a fact lookup engine based on web tables , 2011, WWW.

[30]  Xiao Li,et al.  Automatic extraction of clickable structured web contents for name entity queries , 2010, WWW '10.

[31]  Hector Garcia-Molina,et al.  Combating Web Spam with TrustRank , 2004, VLDB.

[32]  Rino Falcone,et al.  Principles of trust for MAS: cognitive anatomy, social importance, and quantification , 1998, Proceedings International Conference on Multi Agent Systems (Cat. No.98EX160).

[33]  D. Roth,et al.  COMPREHENSIVE TRUST METRICS FOR INFORMATION NETWORKS , 2010 .

[34]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[35]  E. Sklar,et al.  A system of argumentation for reasoning about trust , 2010 .

[36]  Yogesh L. Simmhan,et al.  A survey of data provenance in e-science , 2005, SGMD.

[37]  B. J. Fogg,et al.  The elements of computer credibility , 1999, CHI '99.

[38]  Raph Levien,et al.  Attack-Resistant Trust Metrics , 2009, Computing with Social Trust.

[39]  Dan Roth,et al.  Generalized fact-finding , 2011, WWW.

[40]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[41]  Subbarao Kambhampati,et al.  Factal: integrating deep web based on trust and relevance , 2011, WWW.

[42]  Divesh Srivastava,et al.  Truth Discovery and Copying Detection in a Dynamic World , 2009, Proc. VLDB Endow..

[43]  Divesh Srivastava,et al.  Sailing the Information Ocean with Awareness of Currents: Discovery and Application of Source Dependence , 2009, CIDR.

[44]  Jennifer Widom,et al.  Databases with uncertainty and lineage , 2008, The VLDB Journal.

[45]  Lorenzo Blanco,et al.  Probabilistic Models to Reconcile Complex Data from Inaccurate Data Sources , 2010, CAiSE.

[46]  Liu Yang,et al.  Topic-Based Computing Model for Web Page Popularity and Website Influence , 2009, Australasian Conference on Artificial Intelligence.

[47]  Elisa Bertino,et al.  An Approach to Evaluate Data Trustworthiness Based on Data Provenance , 2008, Secure Data Management.

[48]  Miguel Soriano,et al.  Public Key Infrastructure , 2004, Lecture Notes in Computer Science.

[49]  Serge Abiteboul,et al.  Corroborating information from disagreeing views , 2010, WSDM '10.

[50]  Guosun Zeng,et al.  An evidence‐based iterative content trust algorithm for the credibility of online news , 2009, Concurr. Comput. Pract. Exp..