skip to main content
10.1145/1378889.1378908acmconferencesArticle/Chapter ViewAbstractPublication PagesjcdlConference Proceedingsconference-collections
research-article

Socialtrust: tamper-resilient trust establishment in online communities

Published:16 June 2008Publication History

ABSTRACT

Web 2.0 promises rich opportunities for information sharing, electronic commerce, and new modes of social interaction, all centered around the "social Web" of user-contributed content, social annotations, and person-to-person social connections. But the increasing reliance on this "social Web" also places individuals and their computer systems at risk, creating opportunities for malicious participants to exploit the tight social fabric of these networks. With these problems in mind, we propose the SocialTrust framework for tamper-resilient trust establishment in online communities. SocialTrust provides community users with dynamic trust values by (i) distinguishing relationship quality from trust; (ii) incorporating a personalized feedback mechanism for adapting as the community evolves; and (iii) tracking user behavior. We experimentally evaluate the SocialTrust framework using real online social networking data consisting of millions of MySpace profiles and relationships. We find that SocialTrust supports robust trust establishment even in the presence of large-scale collusion by malicious participants.

References

  1. K. Aberer and Z. Despotovic. Managing trust in a Peer-2-Peer information system. In CIKM, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. L. A. Adamic and E. Adar. How to search a social network. Social Networks, 27(3):187--203, July 2005.Google ScholarGoogle ScholarCross RefCross Ref
  3. L. Backstrom, D. P. Huttenlocher, J. M. Kleinberg, and X. Lan. Group formation in large social networks. In KDD, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. S. Bao, G. Xue, X. Wu, Y. Yu, B. Fei, and Z. Su. Optimizing web search using social annotations. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. E. Bertino, E. Ferrari, and A. C. Squicciarini. Trust-x: A peer-to-peer framework for trust establishment. IEEE Trans. Knowl. Data Eng., 16(7):827--842, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Boyd. Teenagers used to push Zango on MySpace. http://www.vitalsecurity.org, 2006.Google ScholarGoogle Scholar
  7. C. R. Brooks and N. Montanez. Improved annotation of the blogosphere via autotagging and hierarchical clustering. In WWW, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Caverlee and L. Liu. Countering web spam with credibility-based link analysis. In PODC, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Caverlee and S. Webb. A large-scale study of MySpace: Observations and implications for online social networks. In 2nd International Conference on Weblogs and Social Media (AAAI), 2008.Google ScholarGoogle Scholar
  10. F. Cornelli, E. Damiani, and S. D. Capitani. Choosing reputable servents in a P2P network. In WWW, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. A. Doan, R. Ramakrishnan, F. Chen, P. DeRose, Y. Lee, R. McCann, M. Sayyadian, and W. Shen. Community information management. IEEE Data Engineering Bulletin, March 2006.Google ScholarGoogle Scholar
  12. P. S. Dodds, R. Muhamad, and D. J. Watts. An experimental study of search in global social networks. Science, 301(5634):827--829, August 2003.Google ScholarGoogle ScholarCross RefCross Ref
  13. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In WWW, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. Z. Gyöngyi, H. Garcia-Molina, and J. Pedersen. Combating web spam with TrustRank. In VLDB, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. T. N. Jagatic, N. A. Johnson, M. Jakobsson, and F. Menczer. Social phishing. CACM, 50(10):94--100, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. S. Kamvar, B. Yang, and H. Garcia-Molina. Secure score management for peer-to-peer systems. Technical report, Stanford University, 2004.Google ScholarGoogle Scholar
  17. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The EigenTrust algorithm for reputation management in P2P networks. In WWW, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. G. Koutrika, F. A. Effendi, Z. Gyöngyi, P. Heymann, and H. Garcia-Molina. Combating spam in tagging systems. In AIRWeb '07: Proceedings of the 3rd international workshop on Adversarial information retrieval on the web, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. R. Kumar, J. Novak, and A. Tomkins. Structure and evolution of online social networks. In KDD, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. R. Li, S. Bao, Y. Yu, B. Fei, and Z. Su. Towards effective browsing of large scale social annotations. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. D. Liben-Nowell, J. Novak, R. Kumar, P. Raghavan, and A. Tomkins. Geographic routing in social networks. Proceedings of the National Academy of Sciences, 102(33):11623--1162, 2005.Google ScholarGoogle ScholarCross RefCross Ref
  22. S. Marti and H. Garcia-Molina. Taxonomy of trust. Computer Networks, 50(4):472--484, March 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. P. Massa and P. Avesani. Controversial users demand local trust metrics. In AAAI, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. S. Milgram. The small-world problem. Psychology Today, pages 60--67, May 1967.Google ScholarGoogle Scholar
  25. R. Monastersky. The number that's devouring science. The Chronicle of Higher Education, October 2005.Google ScholarGoogle Scholar
  26. H. Ozbay. Introduction to feedback control theory. CRC Press Inc, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. L. Page et al. The PageRank citation ranking: Bringing order to the Web. Technical report, Stanford University, 1998.Google ScholarGoogle Scholar
  28. M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In ISWC, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. S. Rubin, M. Christodorescu, V. Ganapathy, J. T. Giffin, L. Kruger, and H. Wang. An auctioning reputation system based on anomaly detection. In CCS, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. M. Sanchez. Pranksters posting fake profiles on MySpace. http://www.dfw.com/, 2006.Google ScholarGoogle Scholar
  31. M. Srivatsa, L. Xiong, and L. Liu. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In WWW, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. S. Wasserman and K. Faust. Social network analysis. Cambridge University Press, Cambridge, 1994.Google ScholarGoogle ScholarCross RefCross Ref
  33. D. J. Watts. Networks, dynamics, and the small world phenomenon. American Journal of Sociology, 105(2):493--527, 1999.Google ScholarGoogle ScholarCross RefCross Ref
  34. B. Wu, V. Goel, and B. Davison. Topical TrustRank: Using topicality to combat web spam. In WWW, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. L. Xiong and L. Liu. Supporting reputation-based trust for P2P electronic communities. TKDE, 16(7), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. S. A. Yahia, M. Benedikt, and P. Bohannon. Challenges in searching online communities. In IEEE Data Engineering Bulletin, 2007.Google ScholarGoogle Scholar
  37. B. Yu and M. P. Singh. A social mechanism of reputation management in electronic communities. In Cooperative Information Agents, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. J. Zhang, M. S. Ackerman, and L. Adamic. Expertise networks in online communities: Structure and algorithms. In WWW, 2007. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Socialtrust: tamper-resilient trust establishment in online communities

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Conferences
        JCDL '08: Proceedings of the 8th ACM/IEEE-CS joint conference on Digital libraries
        June 2008
        490 pages
        ISBN:9781595939982
        DOI:10.1145/1378889

        Copyright © 2008 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 16 June 2008

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article

        Acceptance Rates

        JCDL '08 Paper Acceptance Rate33of117submissions,28%Overall Acceptance Rate415of1,482submissions,28%

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader