DOI QR코드

DOI QR Code

TSTE: A Time-variant Stochastic Trust Evaluation Model in Social Networks

  • Li, Jingru (School of Electronic Information and Communications, Huazhong University of Science and Technology) ;
  • Yu, Li (School of Electronic Information and Communications, Huazhong University of Science and Technology) ;
  • Zhao, Jia (Wuhan Zhongyuan Electronics Group Co., Ltd.) ;
  • Luo, Chao (Wuhan Zhongyuan Electronics Group Co., Ltd.) ;
  • Zheng, Jun (School of Electronic Information and Communications, Huazhong University of Science and Technology)
  • Published : 2017.06.30

Abstract

Building appropriate trust evaluation models is an important research issue for security guarantee in social networks. Most of the existing works usually consider the trust values at the current time slot, and model trust as the stochastic variable. However, in fact, trust evolves over time, and trust is a stochastic process. In this paper, we propose a novel time-variant stochastic trust evaluation (TSTE) model, which models trust over time and captures trust evolution by a stochastic process. Based on the proposed model, we derive the time-variant bound of untrustworthy probability, which provides stochastic trust guarantee. On one hand, the time-variant trust level of each node can be measured by our model. Meanwhile, by tolerating nodes with relatively poor performance, our model can effectively improve the node resource utilization rate. Numerical simulations are conducted to verify the accuracy and consistency of the analytical bounds on distinguishing misbehaved nodes from normal ones. Moreover, simulation results on social network dataset show the tradeoff between trust level and resource utilization rate, and verify that the successful transmission rate can be improved by our model.

Keywords

References

  1. H. Hu, Jin. Guo, J. Chen, "Modeling online social networks based on preferential linking," Chinese Physics B, vol. 21, no. 11, pp. 118902, 2012. https://doi.org/10.1088/1674-1056/21/11/118902
  2. R. Lu, X. Lin, Z. Shi, J. Shao, "Plam: A privacy-preserving framework for local-area mobile social networks," INFOCOM, pp. 763-771, 2014.
  3. F. Hao, G. Min, M. Lin, C. Luo, L. Yang, "Mobifuzzytrust: An efficient fuzzy trust inference mechanism in mobile social networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 2944-2955, 2014. https://doi.org/10.1109/TPDS.2013.309
  4. X. Liang, X. Lin, X. Shen, "Enabling trustworthy service evaluation in service-oriented mobile social networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 310-320, 2014. https://doi.org/10.1109/TPDS.2013.37
  5. W. Sherchan, S. Nepal, C. Paris, "A survey of trust in social networks," ACM Computing Surveys (CSUR), vol. 45, no. 4, pp. 47, 2013.
  6. M. Sirivianos, K. Kim, X. Yang, "Socialfilter: Introducing social trust to collaborative spam mitigation," INFOCOM, pp. 2300-2308, 2011.
  7. G. Wang, F. Musau, S. Guo, M. Abdullahi, "Neighbor similarity trust against sybil attack in p2p e-commerce," IEEE Transactions on Parallel and Distributed Systems, pp. 1, 2014.
  8. L. Cutillo, R. Molva, T. Strufe, "Safebook: A privacy-preserving online social network leveraging on real-life trust," IEEE Communications Magazine, vol. 47, no. 12, pp. 94-101, 2009. https://doi.org/10.1109/MCOM.2009.5350374
  9. R. Gross, A. Acquisti, "Information revelation and privacy in online social networks," in Proc. of ACM CONFERENCE of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES '05, pp. 71-80, 2005.
  10. A. L. Young, A. Quan-Haase, "Information revelation and internet privacy concerns on social network sites: A case study of facebook," in Proc. of ACM CONFERENCE of the Fourth International Conference on Communities and Technologies, pp. 265-274, 2009.
  11. G. Liu, Q. Yang, H. Wang, X. Lin, M. Wittie, "Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic," INFOCOM, pp. 1698-1706, 2014.
  12. J. Tang, H. Gao, H. Liu, A. Das Sarma, "etrust: Understanding trust evolution in an online world," in Proc. of ACM Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 253-261, 2012.
  13. Tavakolifard, M., Almeroth, K.C., "Social computing: an intersection of recommender systems, trust/reputation systems, and social networks," IEEE Network, vol. 26, no. 4, pp. 53-58, 2012. https://doi.org/10.1109/MNET.2012.6246753
  14. W. Jiang, J. Wu, G. Wang, H. Zheng, "Fluidrating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics," INFOCOM, pp. 1707-1715, 2014.
  15. L. Yu, J. Li, Z. Liu, "Semiring trust model based on adaptive forgetting scheme," Journal of Electronics and Information Technology, vol. 33, no. 1, pp. 175-179, 2011. (in Chinese). https://doi.org/10.3724/SP.J.1146.2010.00221
  16. D. Khodyakov, "Trust as a process a three-dimensional approach," Sociology, vol. 41, no. 1, pp. 115-132, 2007. https://doi.org/10.1177/0038038507072285
  17. X. Li, F. Zhou, X. Yang, "Scalable feedback aggregating (sfa) overlay for large-scale p2p trust management," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1944-1957, 2012. https://doi.org/10.1109/TPDS.2012.26
  18. V. Arnaboldi, M. L. Gala, A. Passarella, M. Conti, "The role of trusted relationships on content spread in distributed online social networks," in Proc. of The Second Workshop on Large Scale Distributed Virtual Environments on Clouds and P2P (LSDVE 2014), 2014.
  19. X. Chen and L. Wang, "A Cloud-Based Trust Management Framework for Vehicular Social Networks," in Proc. of IEEE Access, vol. 5, no. , pp. 2967-2980, 2017.
  20. W. Jiang, J. Wu, F. Li, G. Wang and H. Zheng, "Trust Evaluation in Online Social Networks Using Generalized Network Flow," IEEE Transactions on Computers, vol. 65, no. 3, pp. 952-963, March 1 2016. https://doi.org/10.1109/TC.2015.2435785
  21. C. Huang, Z. Yan, N. Li and M. Wang, "Secure Pervasive Social Communications Based on Trust in a Distributed Way," IEEE Access, vol. 4, pp. 9225-9238, 2016. https://doi.org/10.1109/ACCESS.2017.2647824
  22. Z. Yan and M. Wang, "Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels," IEEE Systems Journal, vol. 11, no. 1, pp. 207-218, March 2017. https://doi.org/10.1109/JSYST.2014.2347259
  23. V. Sharma; I. You; R. Kumar; P. Kim, "Computational offloading for efficient trust management in pervasive online social networks using osmotic computing," IEEE Access , vol.PP, no.99, pp.1-1, 2017.
  24. S. Trifunovic, F. Legendre, C. Anastasiades, "Social trust in opportunistic networks," in Proc. of INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1-6, 2010.
  25. S. Nepal, W. Sherchan, C. Paris, "Strust: a trust model for social networks," in Proc. of IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 841-846, 2011.
  26. Z. Li, H. Shen, "Soap: A social network aided personalized and effective spam filter to clean your e-mail box," INFOCOM, pp. 1835-1843, 2011.
  27. L. Li, A. Scaglione, A. Swami, Q. Zhao, "Consensus, polarization and clustering of opinions in social networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 6, pp. 1072-1083, 2013. https://doi.org/10.1109/JSAC.2013.130609
  28. F. Liu, X. Li, Y. Ding, H. Zhao, X. Liu, Y. Ma, B. Tang, "A social network-based trust-aware propagation model for p2p systems," Knowledge-Based Systems, vol. 41, pp. 8-15, 2013. https://doi.org/10.1016/j.knosys.2012.12.005
  29. G. Han, J. Jiang, L. Shu, J. Niu, H.-C. Chao, "Management and applications of trust in wireless sensor networks: A survey," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 602-617, 2014. https://doi.org/10.1016/j.jcss.2013.06.014
  30. L. V. Orman, "Bayesian inference in trust networks," ACM Transactions on Management Information Systems (TMIS), vol. 4, no. 2, pp. 7, 2013.
  31. Y. L. Sun, W. Yu, Z. Han, K. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 305-317, 2006. https://doi.org/10.1109/JSAC.2005.861389
  32. F. Zhang, Z.-P. Jia, H. Xia, X. Li, H.-M. Sha Edwin, "Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and markov scgm (1, 1) model," Computer Communications, vol. 35, no. 5, pp. 589-596, 2012. https://doi.org/10.1016/j.comcom.2011.10.007
  33. L. Zhao, J. Cai, H. Zhang, "Radio-efficient adaptive modulation and coding: green communication perspective," in Proc. of IEEE 73rd Vehicular Technology Conference (VTC Spring), pp. 1-5, 2011.
  34. Y. Jiang, Y. Liu, "Stochastic network calculus," Springer, 2008.
  35. Y. Jiang, "A basic stochastic network calculus," ACM SIGCOMM Computer Communication Review, Vol. 36, pp. 123-134, 2006. https://doi.org/10.1145/1151659.1159929
  36. J.-Y. Le Boudec, P. Thiran, "Network calculus: a theory of deterministic queuing systems for the internet," Springer, Vol. 2050, 2001.
  37. J. Li, R. Li, J. Kato, "Future trust management framework for mobile ad hoc networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 108-114, 2008. https://doi.org/10.1109/MCOM.2008.4481349
  38. A. Josang, R. Ismail, C. Boyd, "A survey of trust and reputation systems for online service provision," Decision support systems, vol. 43, no. 2, pp. 618-644, 2007. https://doi.org/10.1016/j.dss.2005.05.019
  39. H. Yu, Z. Shen, C. Miao, C. Leung, D. Niyato, "A survey of trust and reputation management systems in wireless communications," in Proc. of the IEEE, vol. 98, no. 10, pp. 1755-1772, 2010. https://doi.org/10.1109/JPROC.2010.2059690
  40. Y. L. Sun, Z. Han, K. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Communications Magazine, vol. 46, no. 2, pp. 112-119, 2008. https://doi.org/10.1109/MCOM.2008.4473092
  41. B.-J. Chang, S.-L. Kuo, "Markov chain trust model for trust-value analysis and key management in distributed multicast manets," IEEE Transactions on Vehicular Technology, vol. 58, no. 4, pp. 1846-1863, 2009. https://doi.org/10.1109/TVT.2008.2005415
  42. Y. Jiang, "A note on applying stochastic network calculus," in Proc. of SIGCOMM, Vol. 10, pp. 16-20, May, 2010.
  43. A. Pentland, N. Eagle, D. Lazer, "Inferring social network structure using mobile phone data," in Proc. of the National Academy of Sciences (PNAS), vol. 106, no. 36, pp. 15274-15278, 2009.
  44. N. Welton, A. Ades, "Estimation of markov chain transition probabilities and rates from fully and partially observed data: uncertainty propagation, evidence synthesis, and model calibration," Medical Decision Making, vol. 25, no.6, pp. 633-645, 2005. https://doi.org/10.1177/0272989X05282637
  45. B. Craig, P. Sendi, "Estimation of the transition matrix of a discrete-time Markov chain," Health Economics, vol. 11, no.1, pp. 33-42, 2002. https://doi.org/10.1002/hec.654