Academia.eduAcademia.edu

Outline

Trust Social web Reputation

https://doi.org/10.1016/J.INS.2009.06.027

Abstract

Social information systems are a promising new paradigm for large-scale distributed information management, as evidenced by the success of large-scale information sharing communities, social media sites, and web-based social networks. But the increasing reliance on these social systems also places individuals and their computer systems at risk, creating opportunities for malicious participants to exploit the tight social fabric of these networks. With these problems in mind, this manuscript presents the SocialTrust framework for enabling trusted social information management in Internet-scale social information systems. Concretely, we study online social networks, consider a number of vulnerabilities inherent in online social networks, and introduce the SocialTrust framework for supporting tamper-resilient trust establishment. We study three key factors for trust establishment in online social networks -trust group feedback, distinguishing the user's relationship quality from trust, and tracking user behavior -and describe a principled approach for assessing each component. In addition to the SocialTrust framework, which provides a network-wide perspective on the trust of all users, we describe a personalized extension called mySocial-Trust, which provides a user-centric trust perspective that can be optimized for individual users within the network. Finally, we experimentally evaluate the SocialTrust framework using real online social networking data consisting of millions of MySpace profiles and relationships. While other trust aggregation approaches have been developed and implemented by others, we note that it is rare to find such a large-scale experimental evaluation that carefully considers the important factors impacting the trust framework. We find that SocialTrust supports robust trust establishment even in the presence of large-scale collusion by malicious participants.

References (44)

  1. K. Aberer, Z. Despotovic. Managing trust in a Peer-2-Peer information system, in: CIKM, 2001.
  2. L.A. Adamic, E. Adar, How to search a social network, Social Networks 27 (3) (2005) 187-203.
  3. L. Backstrom, D.P. Huttenlocher, J.M. Kleinberg, X. Lan, Group formation in large social networks, in: KDD, 2006.
  4. S. Bao, G. Xue, X. Wu, Y. Yu, B. Fei, Z. Su, Optimizing web search using social annotations, in: WWW, 2007.
  5. S.B. Barnes, A privacy paradox: social networking in the United States, First Monday 11 (9) (2006). September.
  6. E. Bertino, E. Ferrari, A.C. Squicciarini, Trust-x: a peer-to-peer framework for trust establishment, IEEE Transactions on Knowledge and Data Engineering 16 (7) (2004) 827-842.
  7. C. Boyd, Teenagers used to push Zango on MySpace, http://www.vitalsecurity.org, 2006.
  8. D. Boyd, Social network sites: Public, private, or what? The Knowledge Tree, 2007.
  9. C.R. Brooks, N. Montanez, Improved annotation of the blogosphere via autotagging and hierarchical clustering, in: WWW, 2006.
  10. C. Cahoon, Facebook phonies, The Buchtelite, University of Akron, December 2005.
  11. J. Caverlee, L. Liu, Countering web spam with credibility-based link analysi, in: PODC, 2007.
  12. J. Caverlee S. Webb, A large-scale study of MySpace: observations and implications for online social networks, in: Second International Conference on Weblogs and Social Media (AAAI), 2008.
  13. F. Cornelli, E. Damiani, S.D. Capitani, Choosing reputable servents in a P2P network, in: WWW, 2002.
  14. A. Doan, R. Ramakrishnan, F. Chen, P. DeRose, Y. Lee, R. McCann, M. Sayyadian, W. Shen, Community information management, IEEE Data Engineering Bulletin (March) (2006).
  15. P.S. Dodds, R. Muhamad, D.J. Watts, An experimental study of search in global social networks, Science 301 (5634) (2003) 827-829.
  16. R. Guha, R. Kumar, P. Raghavan, A. Tomkins, Propagation of trust and distrust, in: WWW, 2004.
  17. Z. Gyöngyi H. Garcia-Molina, Link spam alliances, in: VLDB, 2005.
  18. Z. Gyöngyi, H. Garcia-Molina, J. Pedersen, Combating web spam with TrustRank, in: VLDB, 2004.
  19. T.N. Jagatic, N.A. Johnson, M. Jakobsson, F. Menczer, Social phishing, CACM 50 (10) (2007) 94-100.
  20. S. Kamvar, B. Yang, H. Garcia-Molina, Secure score management for peer-to-peer systems, Technical Report, Stanford University, 2004.
  21. S.D. Kamvar, M.T. Schlosser, H. Garcia-Molina, The EigenTrust algorithm for reputation management in P2P networks, in: WWW, 2003.
  22. G. Koutrika, F.A. Effendi, Z. Gyöngyi, P. Heymann, H. Garcia-Molina, Combating spam in tagging systems, in: AIRWeb'07: Proceedings of the Third International Workshop on Adversarial Information Retrieval on the Web, 2007.
  23. R. Kumar, J. Novak, A. Tomkins, Structure and evolution of online social networks, in: KDD, 2006.
  24. R. Li, S. Bao, Y. Yu, B. Fei, Z. Su, Towards effective browsing of large scale social annotations, in: WWW, 2007.
  25. D. Liben-Nowell, J. Novak, R. Kumar, P. Raghavan, A. Tomkins, Geographic routing in social networks, Proceedings of the National Academy of Sciences 102 (33) (2005) 11623-11628.
  26. S. Marti, H. Garcia-Molina, Taxonomy of trust, Computer Networks 50 (4) (2006) 472-484.
  27. P. Massa, P. Avesani, Controversial users demand local trust metrics, in: AAAI, 2005.
  28. S. Milgram, The small-world problem, Psychology Today (March) (1967) 60-67.
  29. R. Monastersky, The number that's devouring science, The Chronicle of Higher Education, October 2005.
  30. E. Nussbaum, Kids, the internet, and the end of privacy, New York Magazine, February 2007.
  31. H. Ozbay, Introduction to Feedback Control Theory, CRC Press Inc., 1999.
  32. L. Page, S. Brin, R. Motwani, T. Winograd, The PageRank citation ranking: bringing order to the Web, Technical Report, Stanford University, 1998.
  33. M. Richardson, R. Agrawal, P. Domingos, Trust management for the semantic web, in: ISWC, 2003.
  34. S. Rubin, M. Christodorescu, V. Ganapathy, J.T. Giffin, L. Kruger, H. Wang, An auctioning reputation system based on anomaly detection, in: CCS, 2005.
  35. M. Sanchez. Pranksters posting fake profiles on MySpace. http://www.dfw.com/, 2006.
  36. M. Srivatsa, L. Xiong, L. Liu, TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks, in: WWW, 2005.
  37. S. Wasserman, K. Faust, Social Network Analysis, Cambridge University Press, Cambridge, 1994.
  38. D.J. Watts, Networks, dynamics, and the small world phenomenon, American Journal of Sociology 105 (2) (1999) 493-527.
  39. D.J. Watts, P.S. Dodds, M.E.J. Newman, Identity and search in social networks, Science 296 (2002) 1302-1305.
  40. B. Wu, V. Goel, B. Davison, Topical TrustRank: using topicality to combat web spam, in: WWW, 2006.
  41. L. Xiong, L. Liu, Supporting reputation-based trust for P2P electronic communities, TKDE 16 (7) (2004).
  42. S.A. Yahia, M. Benedikt, P. Bohannon, Challenges in searching online communities, IEEE Data Engineering Bulletin (2007).
  43. B. Yu, M.P. Singh, A social mechanism of reputation management in electronic communities, Cooperative Information Agents (2000).
  44. J. Zhang, M.S. Ackerman, L. Adamic, Expertise networks in online communities: structure and algorithms, in: WWW, 2007.