Browse > Article
http://dx.doi.org/10.3837/tiis.2017.06.025

TSTE: A Time-variant Stochastic Trust Evaluation Model in Social Networks  

Li, Jingru (School of Electronic Information and Communications, Huazhong University of Science and Technology)
Yu, Li (School of Electronic Information and Communications, Huazhong University of Science and Technology)
Zhao, Jia (Wuhan Zhongyuan Electronics Group Co., Ltd.)
Luo, Chao (Wuhan Zhongyuan Electronics Group Co., Ltd.)
Zheng, Jun (School of Electronic Information and Communications, Huazhong University of Science and Technology)
Publication Information
KSII Transactions on Internet and Information Systems (TIIS) / v.11, no.6, 2017 , pp. 3273-3308 More about this Journal
Abstract
Building appropriate trust evaluation models is an important research issue for security guarantee in social networks. Most of the existing works usually consider the trust values at the current time slot, and model trust as the stochastic variable. However, in fact, trust evolves over time, and trust is a stochastic process. In this paper, we propose a novel time-variant stochastic trust evaluation (TSTE) model, which models trust over time and captures trust evolution by a stochastic process. Based on the proposed model, we derive the time-variant bound of untrustworthy probability, which provides stochastic trust guarantee. On one hand, the time-variant trust level of each node can be measured by our model. Meanwhile, by tolerating nodes with relatively poor performance, our model can effectively improve the node resource utilization rate. Numerical simulations are conducted to verify the accuracy and consistency of the analytical bounds on distinguishing misbehaved nodes from normal ones. Moreover, simulation results on social network dataset show the tradeoff between trust level and resource utilization rate, and verify that the successful transmission rate can be improved by our model.
Keywords
Trust evaluation model; Time-variant; Stochastic trust guarantee; Social networks;
Citations & Related Records
연도 인용수 순위
  • Reference
1 H. Hu, Jin. Guo, J. Chen, "Modeling online social networks based on preferential linking," Chinese Physics B, vol. 21, no. 11, pp. 118902, 2012.   DOI
2 R. Lu, X. Lin, Z. Shi, J. Shao, "Plam: A privacy-preserving framework for local-area mobile social networks," INFOCOM, pp. 763-771, 2014.
3 F. Hao, G. Min, M. Lin, C. Luo, L. Yang, "Mobifuzzytrust: An efficient fuzzy trust inference mechanism in mobile social networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 11, pp. 2944-2955, 2014.   DOI
4 X. Liang, X. Lin, X. Shen, "Enabling trustworthy service evaluation in service-oriented mobile social networks," IEEE Transactions on Parallel and Distributed Systems, vol. 25, no. 2, pp. 310-320, 2014.   DOI
5 W. Sherchan, S. Nepal, C. Paris, "A survey of trust in social networks," ACM Computing Surveys (CSUR), vol. 45, no. 4, pp. 47, 2013.
6 M. Sirivianos, K. Kim, X. Yang, "Socialfilter: Introducing social trust to collaborative spam mitigation," INFOCOM, pp. 2300-2308, 2011.
7 G. Wang, F. Musau, S. Guo, M. Abdullahi, "Neighbor similarity trust against sybil attack in p2p e-commerce," IEEE Transactions on Parallel and Distributed Systems, pp. 1, 2014.
8 L. Cutillo, R. Molva, T. Strufe, "Safebook: A privacy-preserving online social network leveraging on real-life trust," IEEE Communications Magazine, vol. 47, no. 12, pp. 94-101, 2009.   DOI
9 R. Gross, A. Acquisti, "Information revelation and privacy in online social networks," in Proc. of ACM CONFERENCE of the 2005 ACM Workshop on Privacy in the Electronic Society, WPES '05, pp. 71-80, 2005.
10 A. L. Young, A. Quan-Haase, "Information revelation and internet privacy concerns on social network sites: A case study of facebook," in Proc. of ACM CONFERENCE of the Fourth International Conference on Communities and Technologies, pp. 265-274, 2009.
11 G. Liu, Q. Yang, H. Wang, X. Lin, M. Wittie, "Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic," INFOCOM, pp. 1698-1706, 2014.
12 D. Khodyakov, "Trust as a process a three-dimensional approach," Sociology, vol. 41, no. 1, pp. 115-132, 2007.   DOI
13 Tavakolifard, M., Almeroth, K.C., "Social computing: an intersection of recommender systems, trust/reputation systems, and social networks," IEEE Network, vol. 26, no. 4, pp. 53-58, 2012.   DOI
14 W. Jiang, J. Wu, G. Wang, H. Zheng, "Fluidrating: A time-evolving rating scheme in trust-based recommendation systems using fluid dynamics," INFOCOM, pp. 1707-1715, 2014.
15 L. Yu, J. Li, Z. Liu, "Semiring trust model based on adaptive forgetting scheme," Journal of Electronics and Information Technology, vol. 33, no. 1, pp. 175-179, 2011. (in Chinese).   DOI
16 X. Li, F. Zhou, X. Yang, "Scalable feedback aggregating (sfa) overlay for large-scale p2p trust management," IEEE Transactions on Parallel and Distributed Systems, vol. 23, no. 10, pp. 1944-1957, 2012.   DOI
17 V. Arnaboldi, M. L. Gala, A. Passarella, M. Conti, "The role of trusted relationships on content spread in distributed online social networks," in Proc. of The Second Workshop on Large Scale Distributed Virtual Environments on Clouds and P2P (LSDVE 2014), 2014.
18 X. Chen and L. Wang, "A Cloud-Based Trust Management Framework for Vehicular Social Networks," in Proc. of IEEE Access, vol. 5, no. , pp. 2967-2980, 2017.
19 W. Jiang, J. Wu, F. Li, G. Wang and H. Zheng, "Trust Evaluation in Online Social Networks Using Generalized Network Flow," IEEE Transactions on Computers, vol. 65, no. 3, pp. 952-963, March 1 2016.   DOI
20 G. Han, J. Jiang, L. Shu, J. Niu, H.-C. Chao, "Management and applications of trust in wireless sensor networks: A survey," Journal of Computer and System Sciences, vol. 80, no. 3, pp. 602-617, 2014.   DOI
21 L. V. Orman, "Bayesian inference in trust networks," ACM Transactions on Management Information Systems (TMIS), vol. 4, no. 2, pp. 7, 2013.
22 Y. L. Sun, W. Yu, Z. Han, K. R. Liu, "Information theoretic framework of trust modeling and evaluation for ad hoc networks," IEEE Journal on Selected Areas in Communications, vol. 24, no. 2, pp. 305-317, 2006.   DOI
23 A. Pentland, N. Eagle, D. Lazer, "Inferring social network structure using mobile phone data," in Proc. of the National Academy of Sciences (PNAS), vol. 106, no. 36, pp. 15274-15278, 2009.
24 N. Welton, A. Ades, "Estimation of markov chain transition probabilities and rates from fully and partially observed data: uncertainty propagation, evidence synthesis, and model calibration," Medical Decision Making, vol. 25, no.6, pp. 633-645, 2005.   DOI
25 B. Craig, P. Sendi, "Estimation of the transition matrix of a discrete-time Markov chain," Health Economics, vol. 11, no.1, pp. 33-42, 2002.   DOI
26 Y. Jiang, Y. Liu, "Stochastic network calculus," Springer, 2008.
27 J. Tang, H. Gao, H. Liu, A. Das Sarma, "etrust: Understanding trust evolution in an online world," in Proc. of ACM Proceedings of the 18th ACM SIGKDD international conference on Knowledge discovery and data mining, pp. 253-261, 2012.
28 C. Huang, Z. Yan, N. Li and M. Wang, "Secure Pervasive Social Communications Based on Trust in a Distributed Way," IEEE Access, vol. 4, pp. 9225-9238, 2016.   DOI
29 Z. Yan and M. Wang, "Protect Pervasive Social Networking Based on Two-Dimensional Trust Levels," IEEE Systems Journal, vol. 11, no. 1, pp. 207-218, March 2017.   DOI
30 L. Zhao, J. Cai, H. Zhang, "Radio-efficient adaptive modulation and coding: green communication perspective," in Proc. of IEEE 73rd Vehicular Technology Conference (VTC Spring), pp. 1-5, 2011.
31 Y. Jiang, "A basic stochastic network calculus," ACM SIGCOMM Computer Communication Review, Vol. 36, pp. 123-134, 2006.   DOI
32 J.-Y. Le Boudec, P. Thiran, "Network calculus: a theory of deterministic queuing systems for the internet," Springer, Vol. 2050, 2001.
33 J. Li, R. Li, J. Kato, "Future trust management framework for mobile ad hoc networks," IEEE Communications Magazine, vol. 46, no. 4, pp. 108-114, 2008.   DOI
34 A. Josang, R. Ismail, C. Boyd, "A survey of trust and reputation systems for online service provision," Decision support systems, vol. 43, no. 2, pp. 618-644, 2007.   DOI
35 Z. Li, H. Shen, "Soap: A social network aided personalized and effective spam filter to clean your e-mail box," INFOCOM, pp. 1835-1843, 2011.
36 V. Sharma; I. You; R. Kumar; P. Kim, "Computational offloading for efficient trust management in pervasive online social networks using osmotic computing," IEEE Access , vol.PP, no.99, pp.1-1, 2017.
37 S. Trifunovic, F. Legendre, C. Anastasiades, "Social trust in opportunistic networks," in Proc. of INFOCOM IEEE Conference on Computer Communications Workshops, pp. 1-6, 2010.
38 S. Nepal, W. Sherchan, C. Paris, "Strust: a trust model for social networks," in Proc. of IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (TrustCom), pp. 841-846, 2011.
39 L. Li, A. Scaglione, A. Swami, Q. Zhao, "Consensus, polarization and clustering of opinions in social networks," IEEE Journal on Selected Areas in Communications, vol. 31, no. 6, pp. 1072-1083, 2013.   DOI
40 F. Liu, X. Li, Y. Ding, H. Zhao, X. Liu, Y. Ma, B. Tang, "A social network-based trust-aware propagation model for p2p systems," Knowledge-Based Systems, vol. 41, pp. 8-15, 2013.   DOI
41 B.-J. Chang, S.-L. Kuo, "Markov chain trust model for trust-value analysis and key management in distributed multicast manets," IEEE Transactions on Vehicular Technology, vol. 58, no. 4, pp. 1846-1863, 2009.   DOI
42 H. Yu, Z. Shen, C. Miao, C. Leung, D. Niyato, "A survey of trust and reputation management systems in wireless communications," in Proc. of the IEEE, vol. 98, no. 10, pp. 1755-1772, 2010.   DOI
43 F. Zhang, Z.-P. Jia, H. Xia, X. Li, H.-M. Sha Edwin, "Node trust evaluation in mobile ad hoc networks based on multi-dimensional fuzzy and markov scgm (1, 1) model," Computer Communications, vol. 35, no. 5, pp. 589-596, 2012.   DOI
44 Y. L. Sun, Z. Han, K. R. Liu, "Defense of trust management vulnerabilities in distributed networks," IEEE Communications Magazine, vol. 46, no. 2, pp. 112-119, 2008.   DOI
45 Y. Jiang, "A note on applying stochastic network calculus," in Proc. of SIGCOMM, Vol. 10, pp. 16-20, May, 2010.