Path Length and Trust Quality-based Trust Aggregation with

Journal of Computational Information Systems 10: 23 (2014) 10293–10305
Available at http://www.Jofcis.com
Path Length and Trust Quality-based Trust Aggregation
with Intuitionistic Fuzzy Set
Jun XU 1,2,∗,
1 College
Yuansheng ZHONG 1
of Information Technology, Jiangxi University of Finance and Economics, Nanchang 330013,
China
2 Modern
Economics & Management College of JXUFE, Nanchang 330013, China
Abstract
In social networks, users may find increasing challenges in estimating trust scores for users that do not
directly connect each other. In this paper, firstly, since trust is subjective in nature and intuitionistic
fuzzy sets (IFSs) are most suited for capturing subjective, we represent trust score by IFSs and study
IFSs-based trust aggregated approaches. Then, based on length and trust quality of path, we propose
several hybrid path weight incorporating aggregation strategies. The experiments demonstrate that the
proposed aggregators can effectively improve prediction accuracy.
Keywords: Path Length; Trust Quality; Trust Aggregation; Intuitionistic Fuzzy Sets (IFS); Social
Networks
1
Introduction
With the ever-increasingly web technology, online social networks have become main stream
application, in which people can share information and interact with each other, such as MySpace
and Facebook. However, the success of the online interactions depends on trust that members
have with each other as well as with the service provider. Therefore, trust is an important
element in online social networks [1]. Social networks in which the entities can express their
trust or distrust statements in each other are called trust networks. Trust networks, used to
measure trust relationships between members (called entities in this context) have been studied
in many literatures. In this paper, we pay attention to the trust evaluation between entities which
don’t know each other. Currently, few of trust metrics have been developed in literature for this
problem. Roughly, they may be divided into two categories, which are briefly reviewed in the
following, respectively.
The first type is global trust metrics [2]. It computes a trust score that approximates how much
the graph as a whole build a global trust value for the specific user. Kamvar et al. [3] presented
a distributed and secure method to compute global trust value for a peer by calculating the left
∗
Corresponding author.
Email address: [email protected] (Jun XU).
1553–9105 / Copyright © 2014 Binary Information Press
DOI: 10.12733/jcis12662
December 1, 2014
10294
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
principal eigenvector of a matrix of normalized local trust values. Aberer et al. [4] developed
an approach that addresses the problem of reputation-based trust management at both the data
management and semantic level, and assess trust by computing an agent reputation from its
former interactions with other agents. Suryanarayana et al. [5] model a P2P network as a directed
graph. They use the trust inference in the direct graph to infer indirect remote trust. Zhou and
Wang et al. [6] proposed a gossip-based reputation system (Gossip Trust) for fast aggregation of
global reputation scores.
The second type is local trust metrics [2]. It considers the personalized webs of trust, represented
as node to node relationship. It calculates trust score between a source node and a destination
by trust propagation rule. Golbeck [7] combined TidalTrust algorithm to consider the shortest
and strongest trust paths. Though this method decrease the time complexity of the algorithm
but it may negatively impact the coverage of the trust metrics. Avesani et al. [8] implemented
MoleTrust algorithm to be used in Molesking application. The Moletrust trust metric considers
those users who are at a distance not more than the trust propagation horizon. Wierzowiecki
and Wierzbicki [9] presented CloseLook algorithm which is based on the principle of limiting
the amount of computation by selecting the best paths to propagate trust, and by stopping the
trust propagation using scope parameters that can limit the number of considered nodes. Tao et
al. [10] proposed a subjective trust model based on cloud model which can deal with uncertainty
of information in open networks. Chakraborty and karform [11] integrated the path length and
decay of direct trust values along the trust path into trust propagation algorithms based on simple
multiplicative strategy.
The aforementioned two types of methods seem to be effective for modeling trust. However,
they have two main disadvantages that the most of the methods seldom considered vagueness and
uncertainty of trust, and path quality. In the case of vagueness and uncertainty of trust, victor
et al. [12] and Josang et al. [13] who built trust model by using the bi-lattice and probabilistic
approach, respectively. Especially recently, verbiest [14] introduce and evaluate several path
length incorporating aggregation strategies. The simulation experiments demonstrate that using
path length weights improve the aggregation result. Currently, none of them takes into account
the quality of the paths.
In this paper, we propose a new trust model based on intuitionistic fuzzy set (IFS) [15], which
is a generalization of the concept of fuzzy set [16] whose basic component is only a membership
function. The IFS may describe imprecise information more abundant and flexible than the fuzzy
set. Moreover, as the quality of path gets poor or path gets longer, it may be deemed to be less
trustworthy. Therefore, we introduce path length and quality into trust aggregation strategy.
And test the usefulness of the strategy on the Advogato dataset.
The rest of the paper is organized as follows. Section 2 recalls preliminaries and introduces
necessary concepts on trust metrics. In Section 3, we present several path weight-based trust
aggregation operators. In Section 4, we introduce calculating method of path length weight and
path quality weight, while the trust degree of agents is computed using SNA in Section 5. We
evaluate the performance of our proposed method on the basis of a data set from Advogato in
Section 6. Finally, we conclude in Section 7.
2
Preliminaries
According to the proposal in [17], we treat a trust network as a directed graph with the entities
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
10295
as nodes, and the trust relationships as edges.
2.1
Intuitionistic fuzzy set
Definition 1 [15] Let X be a universe of discourse. An IFS over X is an expression given by
A = {< x, uA (x), vA (x) > |x ∈ X}, in which uA : X → [0, 1], vA : X → [0, 1] with the condition
0 ≤ uA (x) + vA (x) ≤ 1 for all x ∈ X. uA (x) and vA (x) denote the membership degree and the
non-membership degree of the element x ∈ A, respectively. We call πA (x) = 1 − uA (x) − vA (x)
the degree of hesitation (or uncertainty) of element x to A.
According to the study in [18], for an IFS A = {< uA (x), vA (x) > |x ∈ X}, the couples
< uA (x), vA (x) > is called an intuitionistic fuzzy number (IFN). For convenience, we denote an
IFN by < u, v >, where 0 ≤ u ≤ 1, 0 ≤ v ≤ 1 and u + v ≤ 1. Let T be the set of all the IFNs.
2.2
Possibility degree
Possibility degree of two intuitionistic fuzzy numbers (IFNs) not only reflects the comparison of
two IFNs, but also reflects the degree of one is larger than another. We extend the possibility
degree method of interval valued numbers to IFNs and define a possibility degree expression to
compare two IFNs.
Definition 2 Let α1 =< µ1 , v1 >, α2 =< µ2 , v2 > be two IFNs, the possibility degree of two IFNs
can be denoted as follows.
{
{
} }
1 − v2 − µ1
p(α1 ≻ α2 ) = max 1 − max
,0
(1)
π1 + π2
where π1 and π2 are hesitation degree of α1 and α2 , respectively.
2.3
Lattice-based approach
Definition 3 (Trust network) A trust network is a pair (A, R) in which A is the set of entities
and R is a function A × A → [0, 1]2 = T . For each couple (x, y) of entities in A, trust score
R(x, y) = T .
In this paper, as showed in [17], we represent trust score between entities as an IFN < u, v >→
[0, 1]2 = T , in which u corresponds to a trust degree, v to a distrust degree, and π = 1 − u − v to
hesitation degree. According to the define in [19], the trust score space is embedded in a lattice
L∗ = {< u, v >∈ [0, 1]2 |u + v ≤ 1}
< u1 , v1 >≤L∗ < u2 , v2 >⇔ u1 ≤ u2 and v1 ≥ v2
.
The trust scores <1, 0> and <0, 1> are respectively the biggest and the smallest value of L∗ ,
corresponding to full trust and full distrust. For additional details, we refer to [17].
10296
2.4
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
Trust metrics
In a trust network (A, R), assume two connected agents x ∈ A and y ∈ A, but not directly.
However, two such agents may indirectly be connected to each other through a path in the
network. In order to calculate the trust score of x in y, usually including the trust metrics
propagation and aggregation.
2.4.1
Trust propagation
Despite trust is not perfectly transitive, it can be propagated between users [1]. Consider a trust
path p in a trust network as (x, z1 , · · · , zm−1 , y) where z1 , · · · , zm−1 are the agents between agents
x and y, such that α1 =< u1 , v1 > is the direct trust score of x in z1 , αi =< ui , vi > is the direct
trust score of zi−1 in zi for all i ∈ 1, · · · , m − 2 and αm =< um , vm > is the direct trust score
of zm−1 in y. We can then estimate a trust score along the path (x, z1 , · · · , zm−1 , y) from x to y.
The iterative multiplication strategy for trust propagation is discussed in [20]. In this section, we
define the propagation operator by
P rop(x, z1 , · · · , zm−1 , y) = α1 ⊗ α2 ⊗ · · · ⊗ αm−1 ⊗ αm
(2)
for all < u1 , v1 > and < um , vm > in L∗ .
According to multiplication algorithm of IFS [21], Eq. (2) can be rewritten as follows:
Pr op(x, z1 , · · · , zm−1 , y) =<
m
∏
ui , 1 −
i=1
2.4.2
m
∏
(1 − vi ) >
(3)
i=1
Trust aggregation
When there are several paths linking two agents, each path has its own trust score. We need to
integrate the information provided by each of those paths. Consider n paths linking agents x and
y, qi =< ui , vi > (i = 1, 2, · · · , n) be the trust score, created by the i-th path. Victor et al. [12]
defined basic trust aggregators motivated by a set of boundary conditions. Inspired by this work,
the trust aggregators are defined as follows:
Definition 4 (TMAX). The trust degree maximizing trust aggregator TMAX is defined as
T M AX(x, y) =< max(u1 , · · · un ), max(u1 + v1 , · · · un + vn ) − max(u1 , · · · un ) >
(4)
Definition 5 (DMAX). The distrust degree maximizing trust aggregator DMAX is defined as
DM AX(x, y) =< max(u1 + v1 , · · · un + vn ) − max(v1 , · · · vn ), max(v1 , · · · vn ) >
(5)
Definition 6 (HMAX). The hesitation degree maximizing trust aggregator HMAX is defined as
HM AX(x, y) =< min(u1 , · · · un ), min(v1 , · · · vn ) >
(6)
Definition 7 (TSMAX). The trust score maximizing trust aggregator TSMAX is defined as
T SM AX(x, y) =< max(u1 , · · · un ), min(v1 , · · · vn ) >
Obviously, these results of trust aggregators are also IFNs.
(7)
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
3
10297
Advanced Trust Aggregation Operators
Since the above trust aggregators are too extreme, they are not very comprehensive. In some
cases, users might care more about some reliable trust scores because they aggregated along more
trusted or shorter paths. In this section, we propose three families of aggregation operators such
as the path weighted averaging (PWA) operator, the ordered weighted averaging (OWA) operator
and the induced OWA (IOWA) operator.
3.1
PWA operators for trust scores
Definition 8 Let qi =< ui , vi > (i = 1, 2, · · · , n) be a collection of trust scores, obtained by
propagating n paths linking agents x and y, and let P W A : (L∗ )n → L∗ . If
P W A(x, y) = w1 q1 ⊕ w2 q2 ⊕ · · · ⊕ wn qn
(8)
then the function PWA is called path weighted averaging (PWA) operator, where Wp = (w1 ,
w2 , · · · , wn ) is the path
∑ weight vector based on length and quality of path, such that ∀i ∈ {1, 2, · · · ,
n}, wi ∈ [0, 1] and ni=1 wi = 1. The computation of weight can refer to the expression (12).
According to addition algorithm of IFS [21], Eq. (8) can be rewritten as follows:
P W A(x, y) =< 1 −
n
∏
(1 − ui ) ,
i=1
3.2
wi
n
∏
viwi >
(9)
i=1
OWA operators for trust scores
Definition 9 Let qi =< ui , vi > (i = 1, 2, · · · , n) be a collection of trust scores, obtained by
propagating n paths linking agents x and y. An ordered weighted averaging operator of dimension
n is a mapping ∑
OW A : (L∗ )n → L∗ , such that w = (w1 , w2 , · · · , wn )T , with wi ∈ [0, 1](i =
1, 2, · · · , n) and ni=1 wi = 1, and
OW A(x, y) = w1 qσ(1) ⊕ w2 qσ(2) ⊕ · · · ⊕ wn qσ(n)
(10)
where qσ(i) is the i-th largest of the qi . w = (w1 , w2 , · · · , wn )T can be determined by the normal
distribution based method [23]. It can relieve the influence of unfair arguments on the decision
results by weighting these arguments with small values.
3.3
IOWA operators for trust scores
Another strategy to incorporate path weight is use IOWA operators [24], which is an extension of
the OWA operator. The main difference is that the reordering step of the IOWA is not according
to their values but rather using order-inducing variables. Inspired by this work, we can define the
path weight incorporating aggregator P IOW A as follows:
Definition 10 Let qi =< ui , vi > (i = 1, 2, · · · , n) be a collection of trust scores, obtained by
propagating n paths linking agents x and y. An induced ordered weighted averaging operator
10298
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
of dimension n is a mapping ∑
P IOW A : (L∗ )n → L∗ , such that w = (w1 , w2 , · · · , wn )T , with
wi ∈ [0, 1](i = 1, 2, · · · , n) and ni=1 wi = 1, and
P IOW A(x, y) = w1 b1 ⊕ w2 b2 ⊕ · · · ⊕ wn bn
(11)
where bi is the qi value of the OWA pair < ui , qi > having the ith largest ui , and ui in < ui , qi > is
referred to as the order inducing variable according to path weight and qi as the argument variable.
4
Path Weight
In order to address the refinement of trust aggregator, we propose the hybrid path weights, which
combine path length weights and path quality weights between two agents. Path length weight
is derived from the inverse of length by adopting Verbiest and Victor’s [14] computation method.
Path quality weight is measured according to the trust degree of each path between two agents.
Generally speaking, it is difficult to decide automatically the weights of path length and quality.
Some special situations should be considered, for example, there is only path length or path
quality, so the final weight is defined in as follow:

W l i × W qi


W l ̸= ∅, W q ̸= ∅



 W li + W q i
W l ̸= ∅, W q = ∅
W p i = W li
(12)


W qi
W l = ∅, W q ̸= ∅



1/n
W l = ∅, W q = ∅
in which W li ∈ [0, 1] is the path length weight. W qi ∈ [0, 1] returns the quality of a path. These
details will be discussed in the next section. In Eq. (12), four cases are discussed.
From both path length and path quality perspectives, the trust aggregation is derived not only
by the opinion of length decay, but also by those of the path reliability. Therefore, the PWA
operator reduces to a path hybrid weighted averaging (PHWA) operator:
P HW A(x, y) = wp1 q1 ⊕ wp2 q2 ⊕ · · · ⊕ wpn qn
where wpi =
(13)
W li ×W qi
.
W li +W qi
In the same way, the PIOWA operator reduces to a path hybrid ordered weighted averaging
operator (PH-IOWA).
When only path length weight exists, the final weight is equal path length weight. The PWA
operator reduces to a path length weighted averaging (PLWA) operator:
P LW A(x, y) = wl1 q1 ⊕ wl2 q2 ⊕ · · · ⊕ wln qn .
(14)
When only path quality weight exists, the final weight is equal path quality weight. The PWA
operator reduces to a path quality weighted averaging (PQWA) operator:
P QW A(x, y) = wq1 q1 ⊕ wq2 q2 ⊕ · · · ⊕ wqn qn .
(15)
Similarly, the PIOWA operator reduces to a path quality ordered weighted averaging operator
(PQ-IOWA).
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
10299
When both path length and path quality weight do not exist, which means each path linking
agents x and y is equally important. The PWA operator reduces to an average (AV) operator:
1
AV (x, y) = (q1 ⊕ q2 ⊕ · · · ⊕ qn ).
(16)
n
4.1
Factor based on path length
In social network, people tend to trust others with shorter paths. As shown in [14], there was
a negative correlation between trust score and path length; the more close two agents were,
the greater the trust score between them. Consider n paths linking agents x and y, we call
pi (i = 1, 2, · · · , n) the path length of the i-th path. We define path length weight as:
λ
λ + pi − 1
wli = n
(i = 1, 2, · · · , n)
∑
λ
λ + pi − 1
i=1
(17)
where λ denotes the decay factors and is used to control the decay speed.
Intermediate agents
A
S
B
T
C
Source agent
Target agent
D
Fig. 1: Social network
4.2
Factor based on path quality
Since several paths may exist between two nonadjacent agents, such as the path S → C → T and
S → A → B → T in Fig. 1. The source agent can evaluate the trustworthiness of the target agent
based on the trust information between the intermediate agents along the path [1]. In general,
intermediate agents along the path which have higher trust degree can give more trustworthiness
to the target agent. Therefore, we propose a new concept, Path Trust Quality (PTQ) as follows.
Definition 11 Path Trust Quality (PTQ) is the ability to guarantee a certain level of trustworthiness in trust propagation along a path, taking average trust degree of intermediate agents along
a path as attribute. Consider a trust path pi (i = 1, · · · , n) in a trust network have t intermediate
agents z1 , · · · , zt (zj ∈ E) between agents x and y, the PTQ weight is calculated as in Eq. (18),
1∑
T D zj
t j=1
t
wqi =
t
n
∑
1∑
i=1
t
j=1
TD
(i = 1, 2, · · · , n)
zj
(18)
10300
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
in which T Dzj is the trust degree of the intermediate agent zj , illustrated in Section 5.
5
Trust Degree Based on Social Network Analysis
Before aggregating trust scores of paths, it is necessarily to determine the weights associate to each
path. In most trust aggregation problems, they counted the length of path, but not its quality.
However, according to Definition 2, PTQ is associated with average trust degree of intermediate
agents. Therefore, trust degree should be regarded as a reliable source to be used in deriving
aggregation weights for paths. Social Network Analysis (SNA) is the study of social relationships
between entities, and entities can be individuals, group, or communities [22]. It makes us able to
research properties of networks including centrality, prestige and trust relationship. Accordingly,
a method is given below for measuring the trust degree of an agent with the concepts of SNA.
5.1
In-degree centrality value
In a directed graph, in-degree is the extent to which an actor receives information about another
actor from the other actors. According to social network theory, an actor with high in-degree has
high prestige, since many other actors seek to direct him ties. He also has more power, because he
can influence other actors as far as his opinions are taken into account. Therefore, the in-degree
of centrality can be applied in our study.
Definition 12 Let G = (E, L) be a directed graph composed of nodes E = {e1 , · · · , em } and
edges L = {l1 , · · · , lq } representing directed lines between nodes, ω = {ω1L , · · · , ωqL } be the set of
intuitionistic fuzzy assessments of the corresponding lines, SL = (Skh )m×m be the sociomatrix of
the graph G = (E, L), then the in-degree centrality value of node is defined as follow:
1 ∑
Skh
=
m − 1 k=1
m
L
DD
(eh )
5.2
(19)
Computing trust degree
According to the Definition 3, the trust degree of each node is computed as follows:
Definition 13 Let G = (E, L) be a directed graph representing the trust relationship between
L
L
agents E = {e1 , · · · , em } and {DD
(e1 ), · · · , DD
(eh )} be the set of in-degree centrality values. The
trust degree of agents eh can be computed as:
1 ∑
L
L
TD =
p(CD
(eh ) ≻ CD
(ek ))
m − 1 k=1
m
h
L
L
L
L
in which p(CD
(eh ) ≻ CD
(ek )) is possibility degree of CD
(eh ) ≥ CD
(ek ).
(20)
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
6
10301
Experimental Evaluation
In this chapter, we conduct experiments on our proposed hybrid path weight aggregation (PHWA)
strategies, and compare them to other classical counterparts presented in the literatures [14], for
evaluating their performance. All aggregators compared in our experiments are described in
Table 1. Besides conventional operators we used the average AV, which serves as a baseline for
the HPWA.
Table 1: Overview of trust aggregators used in experiments
TMAX
Trust degree maximizing
DMAX
Distrust degree maximizing
HMAX
Hesitation degree maximizing
TSMAX
Trust score maximizing
AV
Average of trust and distrust degree
PLWA
Path length weight average
PQWA
Path quality weight average
PHWA
Hybrid path weight average based on length and quality
PQ-IOWA Uses path quality dependent order to rank trust scores before applying OWA
weight vector to them
PH-IOWA
6.1
Uses both path length and path quality dependent order to rank trust scores
before applying OWA weight vector to them
Data set
In our experiment, we collected the Advogato data set downloaded from Trustlet.org on May 19th
2012. Advogato.org is an online community site of free software development. On Advogato users
can rate each other on 4 different levels: Observer, Apprentice, Journeyer, and Master and the
Advogato trust metric uses this information in order to assign a trust score to every user. These
ratings among members constitute a rich trust network of 7431 users and 56615 trust ratings.
The distribution of trust values is listed in Table 2. The average degree is 7.62. The average path
length is 3.78. The average clustering coefficient is 0.13.
Since Advogato data is not exactly equal to our trust score space setting, we translate the trust
statements to IFNs can be found in Table 2.
6.2
Setup
To evaluate the performance of our proposed method, we use the 1000 leave-one-out method, in
which a direct trust score is taken out of the trust network and then estimate it by applying our
proposed aggregator. In order to study the impact of aggregators, we use the same propagation
operator. Moreover, we consider only paths of maximal length h = 3 and the coverage is 64.32%.
10302
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
Table 2: Distribution and translation of trust in the data set
Trust statements
IFNs
#
%
Master
< 0.95, 0.05>
12370 29.20
Journeyer
< 0.70, 0.25>
18580 43.86
Apprentice
< 0.40, 0.50>
6300
14.87
Observer
< 0.25, 0.70>
5110
12.07
After obtaining all pairs of the real and predict trust score, we can calculate the mean absolute
error (MAE) between the two variables for evaluating the accuracy of trust estimation. The trust
score MAE is given as follows:
N
1 ∑
M AE =
|ui − u′i | + |vi − vi′ |
N i=1
(21)
where < ui , vi > is real trust score and < u′i , vi′ > is the predicted trust score.
6.3
Results
MAE
First, we compare the performance of the basic trust aggregators introduced in Section 4.2. The
experiment result is shown in Fig. 2. There is small difference among TSMAX, TMAX and
HMAX, which performs better than DMAX.
Fig. 2: MAE for basic trust aggregators
Next, we study the effect of the path length and path quality dependent trust aggregators.
Fig. 3 shows that PLWA and PQWA perform better than AV. Both path length factor and path
quality factor can improve the simple AV. In general, the hybrid of path length factor and path
quality factor, PHWA, performs slightly better than PLWA. Note that when λ < 0.8, PHWA
also performs better than PQWA. These implies that considering both the path length factor and
path quality factor in aggregating the trust score can have better improvement of the aggregation
result than the method considering only path length or path quality. Similar study can be made
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
10303
0$(
for the MAE of OWA, PQ-IOWA and PH-IOWA in Fig. 4. The accuracy of PH-IOWA is better
than that of PQ-IOWA and OWA. These results confirm that it is necessary to give the greater
weight to the shortest paths and the best quality paths. We have also tried to examine that
the hybrid path weight incorporating to our aggregator can improve the accuracy of trust score
predictions.
λ
Fig. 3: MAE for weighted average operators PLWA, PQWA and PHWA compared to the classical av-
MAE
erage AV
Fig. 4: MAE for ordered weighted averaging operators PH-IOWA, PQ-IOWA and OWA
7
Conclusion
In this paper, we built upon previous work in which trust scores are represented by an intuitionistic
fuzzy relation. It is characterized by trust degree, distrust degree and hesitancy degree. Based on
these element boundary conditions, we proposed some basic trust aggregators, such as TMAX,
DMAX, HMAX and TSMAX. However, since trust scores propagated along longer or poor paths
may lead to big error, they should be considered less important than other trust scores during
the trust aggregation process. From this perspective, we introduced other families of aggregation
10304
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
operator with path length weight and path quality weight. The path length weight is defined by
the inverses of the path lengths of the trust scores. The path quality weight is obtained by using
trust degree of intermediate agents, via its representation using an SNA methodology approach.
Through an experiment on the Advogato trust network, we showed that trust scores propagated
along longer paths or poor quality paths indeed contain more errors than others. Furthermore,
we learned that the accuracy of aggregation is improved using the PHWA strategy.
Acknowledgement
The research developed in this paper is supported by the National Natural Science Foundation
of China (Nos. 71361012, 71061006), the Natural Science Foundation of Jiangxi Province of
China (No. 20132BAB201050), the Colleges Humanities Social Science Research Project of Jiangxi
Province of China (No. JC1338).
References
[1]
Golbeck J, Hendler J. Inferring binary trust relationships in web-based social networks [J]. ACM
Transactions on Internet Technology (TOIT), 2006, 6 (4): 497-529.
[2]
Ziegler C N, Lausen G. Spreading activation models for trust propagation [C]. E-Technology,
e-Commerce and e-Service, 2004 IEEE International Conference on. IEEE, 2004: 83-97.
[3]
Kamvar S D, Schlosser M T, Garcia-Molina H. The eigentrust algorithm for reputation management in p2p networks [C]. Proceedings of the 12th international conference on World Wide Web.
ACM, 2003: 640-651.
[4]
Aberer K, Despotovic Z. Managing trust in a peer-2-peer information system [C]. Proceedings
of the tenth international conference on Information and knowledge management. ACM, 2001:
310-317.
[5]
Suryanarayana G, Diallo M H, Erenkrantz J R, et al. Architectural support for trust models
in decentralized applications [C]. Proceedings of the 28th international conference on Software
engineering. ACM, 2006: 52-61.
[6]
Zhou R, Hwang K, Cai M. Gossiptrust for fast reputation aggregation in peer-to-peer networks
[J]. Knowledge and Data Engineering, IEEE Transactions on, 2008, 20 (9): 1282-1295.
[7]
Golbeck J A. Computing and applying trust in web-based social networks, Ph.D. Thesis, 2005.
[8]
Avesani P, Massa P, Tiella R. A trust-enhanced recommender system application: Moleskiing [C].
Proceedings of the 2005 ACM symposium on Applied computing. ACM, 2005: 1589-1593.
[9]
Wierzowiecki G, Wierzbicki A. Efficient and correct trust propagation using closelook [C]. Web
Intelligence and Intelligent Agent Technology (WI-IAT), 2010 IEEE/WIC/ACM International
Conference on. IEEE, 2010, 1: 676-681.
[10] Limin TAO, Decai HUANG, Libin HONG. Research on Subjective Trust Model Based on Cloud
Model for Open Networks. Journal of Computational Information Systems, 2011, 7 (13): 48444854.
[11] Partha Sarathi Chakraborty, Sunil Karform, Designing Trust Propagation Algorithms based on
Simple Multiplicative Strategy for Social Networks, Procedia Technology, Volume 6, 2012, Pages
534-539, ISSN 2212-0173.
J. Xu et al. /Journal of Computational Information Systems 10: 23 (2014) 10293–10305
10305
[12] Victor P, Cornelis C, De Cock M, et al. Gradual trust and distrust in recommender systems [J].
Fuzzy Sets and Systems, 2009, 160 (10): 1367-1382.
[13] Jøsang A, Marsh S, Pope S. Exploring different types of trust propagation [M]. Trust management.
Springer Berlin Heidelberg, 2006: 179-192.
[14] Verbiest N, Cornelis C, Victor P, et al. Trust and distrust aggregation enhanced with path length
incorporation [J]. Fuzzy Sets and Systems, 2012, 202: 61-74.
[15] K. T. Atanassov. Intuitionistic fuzzy sets, Fuzzy Sets Systems. 20 (1) (1996) 87-96.
[16] L. A. Zadeh, Fuzzy sets, Information and control, 18 (1965) 338-353.
[17] De Cock M, Da Silva P P. A many valued representation and propagation of trust and distrust
[M]. Fuzzy Logic and Applications. Springer Berlin Heidelberg, 2006: 114-120.
[18] Xu Z. Intuitionistic preference relations and their application in group decision making [J]. Information Sciences, 2007, 177 (11): 2363-2379.
[19] Deschrijver G, Cornelis C, Kerre E. Intuitionistic fuzzy connectives revisited [C]. 9th International Conference on Information Processing and Management of Uncertainty in Knowledge-Based
Systems (IPMU 2002). 2002: 1839-1844.
[20] Hasan O, Brunie L, Pierson J M. Evaluation of the iterative multiplication strategy for trust
propagation in pervasive environments [C]. Proceedings of the 2009 international conference on
Pervasive services. ACM, 2009: 49-54.
[21] Xu Z. Intuitionistic fuzzy aggregation operators [J]. Fuzzy Systems, IEEE Transactions on, 2007,
15 (6): 1179-1187.
[22] McGuire H A, Markus M J, Kionga-Kamau P M, et al. Social network analysis: U. S. Patent
Application 13/777, 203 [P], 2013-2-26.
[23] Xu Z. An overview of methods for determining OWA weights [J]. International Journal of Intelligent
Systems, 2005, 20 (8): 843-865.
[24] Yager R. R, Filev D. P, Induced ordered weighted averaging operators [J]. IEEE Transaction on
Systems, Man and Cybernetics, 1999, 29, 141-150.