Nothing Special   »   [go: up one dir, main page]

skip to main content
research-article

Heterogeneous network-based trust analysis: a survey

Published: 31 August 2011 Publication History

Abstract

Different information sources publish information with different degrees of correctness and originality. False information can often result in considerable damage. Hence, trustworthinessof information is an important issue in this datadriven world economy. Reputation of different agents in a network has been studied earlier in a variety of domains like e-commerce, social sciences, sensor networks, and P2P networks. Recently there has been work in the data mining community on performing trust analysis based on the data provided by multiple information providers for different objects, and such agents and their provided information about data objects form a multi-typed heterogeneous network. The trust analysis under such a framework is considered as heterogeneous network-based trust analysis. This paper will survey heterogeneous network-based trust analysis models and their applications. We would conclude with a summary and some thoughts on future research in the area.

References

[1]
B. Thomas Adler and Luca de Alfaro. A content-driven reputation system for the wikipedia. In WWW, pages 261--270, 2007.
[2]
Raju Balakrishnan. Source rank: Relevance and trust assessment for deep web sources based on inter-source agreement. In WWW, 2011.
[3]
Raju Balakrishnan and Subbarao Kambhampati. Sourcerank: relevance and trust assessment for deep web sources based on inter-source agreement. In WWW, pages 1055--1056, 2010.
[4]
Raju Balakrishnan and Subbarao Kambhampati. Factal: Integrating deep web based on trust and relevance. In WWW, 2011.
[5]
Omar Benjelloun, Anish Das Sarma, Alon Halevy, Martin Theobald, and Jennifer Widom. Databases with uncertainty and lineage. The VLDB Journal, 17:243--264, Mar 2008.
[6]
Laure Berti-Equille, Anish Das Sarma, Xin Dong, Amélie Marian, and Divesh Srivastava. Sailing the information ocean with awareness of currents: Discovery and application of source dependence. In CIDR, 2009.
[7]
Elisa Bertino, Chenyun Dai, Hyo-Sang Lim, and Dan Lin. High-assurance integrity techniques for databases. In BNCOD, pages 244--256, 2008.
[8]
Lorenzo Blanco, Valter Crescenzi, Paolo Merialdo, and Paolo Papotti. Probabilistic models to reconcile complex data from inaccurate data sources. In CAiSE, pages 83--97, 2010.
[9]
Sergey Brin and Lawrence Page. The anatomy of a large-scale hypertextual web search engine. Computer Networks and ISDN Systems, 30:107--117, Apr 1998.
[10]
Jamie Callan and Margaret Connell. Query-based sampling of text databases. ACM Transactions on Information Systems, 19:97--130, Apr 2001.
[11]
C. Castelfranchi and R. Falcone. Principles of trust for mas: Cognitive anatomy, social importance, and quantification. In International Conference on Multi Agent Systems, pages 72--79, 1998.
[12]
Carlos Castillo, Marcelo Mendoza, and Barbara Poblete. Information credibility on twitter. In WWW, pages 675--684, 2011.
[13]
Chenyun Dai, Dan Lin, Elisa Bertino, and Murat Kantarcioglu. An approach to evaluate data trustworthiness based on data provenance. In Secure Data Management, pages 82--98, 2008.
[14]
Chenyun Dai, Dan Lin, Elisa Bertino, and Murat Kantarcioglu. Trust evaluation of data provenance. Technical Report CERIAS TR 2001-147, Purdue University, 2008.
[15]
Xin Dong, Laure Berti-Equille, Yifan Hu, and Divesh Srivastava. Global detection of complex copying relationships between sources. PVLDB, 3(1):1358--1369, 2010.
[16]
Xin Dong, Laure Berti-Equille, Yifan Hu, and Divesh Srivastava. Solomon: Seeking the truth via copying detection. PVLDB, 3(2):1617--1620, 2010.
[17]
Xin Luna Dong. Presentation for {6}, sailing the information ocean with awareness of currents, 2009.
[18]
Xin Luna Dong, Laure Berti-Equille, and Divesh Srivastava. Integrating conflicting data: The role of source dependence. PVLDB, 2(1):550--561, 2009.
[19]
Xin Luna Dong, Laure Berti-Equille, and Divesh Srivastava. Truth discovery and copying detection in a dynamic world. PVLDB, 2(1):562--573, 2009.
[20]
Xin Luna Dong and Felix Naumann. Data fusion -- resolving data conflicts for integration. PVLDB, 2(2):1654--1655, 2009.
[21]
Huitao Dou, Qingzhong Li, and Yongxin Zhang. Find answers from web search results. Web Information Systems and Applications Conference, 0:95--98, 2010.
[22]
Allison Enright. Consumers trust information found online less than offline messages. Internet Retailer, Aug 2010.
[23]
B. J. Fogg and Hsiang Tseng. The elements of computer credibility. In Proceedings of the SIGCHI conference on Human factors in computing systems: the CHI is the limit, pages 80--87, 1999.
[24]
Alban Galland, Serge Abiteboul, Amélie Marian, and Pierre Senellart. Corroborating information from disagreeing views. In WSDM, pages 131--140, 2010.
[25]
Song Gao, Yajie Miao, Liu Yang, and Chunping Li. Topic-based computing model for web page popularity and website influence. In Australasian Conference on Artificial Intelligence, pages 210--219, 2009.
[26]
Yolanda Gil and Donovan Artz. Towards content trust of web resources. Web Semantics, 5:227--239, Dec 2007.
[27]
Manish Gupta, Yizhou Sun, and Jiawei Han. Trust analysis with clustering. In WWW, 2011.
[28]
Zoltán Gyöngyi, Hector Garcia-Molina, and Jan Pedersen. Combating web spam with trustrank. In International Conference on Very large data bases (VLDB), pages 576--587, 2004.
[29]
Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In International Conference on World Wide Web, pages 640--651, 2003.
[30]
Jon M. Kleinberg. Authoritative sources in a hyperlinked environment. J. ACM, 46:604--632, Sep 1999.
[31]
H. Khac Le, J. Pasternack, H. Ahmadi, M. Gupta, Y. Sun, T. Abdelzaher, J. Han, D. Roth, B. Szymanski, and S. Adali. Apollo: Towards factfinding in participatory sensing. In ISPN, 2011.
[32]
Raph Levien. Attack resistant trust metrics. Draft of Ph.D thesis, U. C. Berkeley, 2003.
[33]
Yang Liao, Aaron Harwood, and Kotagiri Ramamohanarao. Scorefinder: A method for collaborative quality inference on user-generated content. In ICDE, pages 345--348, 2010.
[34]
Xin Liu, Anwitaman Datta, Krzysztof Rzadca, and Ee-Peng Lim. Stereotrust: a group based personalized trust model. In Proceeding of the 18th ACM conference on Information and knowledge management (CIKM), pages 7--16, 2009.
[35]
Yajie Miao, Chunping Li, Liu Yang, Lili Zhao, and Ming Gu. Evaluating importance of websites on news topics. In PRICAI, pages 182--193, 2010.
[36]
Mohammad Momani and Subhash Challa. Survey of trust models in different network domains. CoRR, abs/1010.0168, 2010.
[37]
Samuel C. Nelson and Robin Kravets. For members only: local and robust group management in dtns. In ACM workshop on Challenged networks (CHANTS), pages 5--12, 2010.
[38]
J. Pasternack and D. Roth. Knowing what to believe (when you already know something). In International Conference on Computational Linguistics (COLING), Aug 2010.
[39]
Jeff Pasternack and Dan Roth. Comprehensive trust metrics for information networks. In Army Science Conference, Dec 2010.
[40]
Jeff Pasternack and Dan Roth. Generalized factfinding. In WWW, 2011.
[41]
Yogesh L. Simmhan, Beth Plale, and Dennis Gannon. A survey of data provenance in e-science. SIGMOD Rec., 34:31--36, Sep 2005.
[42]
Yuqing Tang, Kai Cai, Elizabeth Sklar, Peter McBurney, and Simon Parsons. A system of argumentation for reasoning about trust. In EUMAS, 2010.
[43]
Jose Weise. Public key infrastructure overview. SunPS Global Security Practice, Aug 2001.
[44]
Minji Wu and Amélie Marian. Corroborating answers from multiple web sources. In WebDB, 2007.
[45]
Xiaoxin Yin, Jiawei Han, and Philip S. Yu. Truth discovery with multiple conflicting information providers on the web. IEEE Trans. Knowl. Data Eng., 20(6):796--808, 2008.
[46]
Xiaoxin Yin and Wenzhao Tan. Semi-supervised truth discovery. In WWW, 2011.
[47]
Xiaoxin Yin, Wenzhao Tan, Xiao Li, and Yi-Chin Tu. Automatic extraction of clickable structured web contents for name entity queries. In WWW, pages 991--1000, 2010.
[48]
Xiaoxin Yin, Wenzhao Tan, and Chao Liu. Facto: a fact lookup engine based on web tables. In WWW, pages 507--516, 2011.
[49]
Guosun Zeng and Wei Wang. An evidence-based iterative content trust algorithm for the credibility of online news. Concurrency and Computation: Practice and Experience, 21(15):1857--1881, 2009.
[50]
Honglei Zeng, Maher A. Alhossaini, Li Ding, Richard Fikes, and Deborah L. McGuinness. Computing trust from revision history. In PST, page 8, 2006.
[51]
Du Zhang. On temporal properties of knowledge base inconsistency. Transactions on Computational Science, 5:20--37, 2009.
[52]
Philip R. Zimmermann. The official PGP user's guide. MIT Press, Cambridge, MA, USA, 1995.

Cited By

View all

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM SIGKDD Explorations Newsletter
ACM SIGKDD Explorations Newsletter  Volume 13, Issue 1
June 2011
79 pages
ISSN:1931-0145
EISSN:1931-0153
DOI:10.1145/2031331
Issue’s Table of Contents

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 31 August 2011
Published in SIGKDD Volume 13, Issue 1

Check for updates

Author Tags

  1. challenges in trust analysis
  2. fact finding
  3. provenance
  4. source dependency
  5. trust analysis
  6. trust models
  7. truth evolution
  8. truth finder
  9. veracity analysis

Qualifiers

  • Research-article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)12
  • Downloads (Last 6 weeks)3
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2023)Examining Knowledge Extraction Processes from Heterogeneous Data SourcesBrilliant Engineering10.36937/ben.2023.47984:1(1-8)Online publication date: 8-Feb-2023
  • (2022)Towards an axiomatic approach to truth discoveryAutonomous Agents and Multi-Agent Systems10.1007/s10458-022-09569-336:2Online publication date: 1-Oct-2022
  • (2021)The Role of Text Mining in Mitigating the Threats from Fake News and Misinformation in Times of CoronaProcedia Computer Science10.1016/j.procs.2021.01.115181(149-156)Online publication date: 2021
  • (2020)An Axiomatic Approach to Truth DiscoveryProceedings of the 19th International Conference on Autonomous Agents and MultiAgent Systems10.5555/3398761.3399058(2011-2013)Online publication date: 5-May-2020
  • (2020)Named Entities and Their Role in Creating Context InformationProcedia Computer Science10.1016/j.procs.2020.09.243176(2069-2076)Online publication date: 2020
  • (2018)Algorithms for automatic ranking of participants and tasks in an anonymized contestTheoretical Computer Science10.1016/j.tcs.2018.07.014Online publication date: Jul-2018
  • (2018)Revisiting transductive support vector machines with margin distribution embeddingKnowledge-Based Systems10.1016/j.knosys.2018.04.017152:C(200-214)Online publication date: 15-Jul-2018
  • (2017)On the Need of Trustworthy Sensing and Crowdsourcing for Urban Accessibility in Smart CityACM Transactions on Internet Technology10.1145/313332718:1(1-21)Online publication date: 26-Oct-2017
  • (2017)A Neural Network Approach for Truth Discovery in Social Sensing2017 IEEE 14th International Conference on Mobile Ad Hoc and Sensor Systems (MASS)10.1109/MASS.2017.26(343-347)Online publication date: Oct-2017
  • (2017)Name usage pattern in the synonym ambiguity problem in bibliographic dataScientometrics10.1007/s11192-017-2410-2112:2(747-766)Online publication date: 1-Aug-2017
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media