This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
RLM: A General Model for Trust Representation and Aggregation
Jan.-March 2012 (vol. 5 no. 1)
pp. 131-143
Xiaofeng Wang, National University of Defense Technology, Changsha
Ling Liu, Georgia Institute of Technology, Atlanta
Jinshu Su, The National University of Defense Technology,China, Changsha
Reputation-based trust systems provide important capability in open and service-oriented computing environments. Most existing trust models fail to assess the variance of a reputation prediction. Moreover, the summation method, widely used for reputation feedback aggregation, is vulnerable to malicious feedbacks. This paper presents a general trust model, called RLM, for a more comprehensive and robust reputation evaluation. Concretely, we define a comprehensive reputation evaluation method based on two attributes: reputation value and reputation prediction variance. The reputation predication variance serves as a quality measure of the reputation value computed based on aggregation of feedbacks. For feedback aggregation, we propose the novel Kalman aggregation method, which can inherently support robust trust evaluation. To defend against malicious and coordinated feedbacks, we design the Expectation Maximization algorithm to autonomously mitigate the influence of a malicious feedback, and further apply the hypothesis test method to resist malicious feedbacks precisely. Through theoretical analysis, we demonstrate the robustness of the RLM design against adulating and defaming attacks, two popular types of feedback attacks. Our experiments show that the RLM model can effectively capture the reputation's evolution and outperform the popular summation-based trust models in terms of both accuracy and attack resilience. Concretely, under the attack of collusive malicious feedbacks, RLM offers higher robustness for the reputation prediction and a lower false positive rate for the malicious feedback detection.

[1] A. Jϕsang, R. Ismail, and C. Boyd, "A Survey of Trust and Reputation Systems for Online Service Provision," Decision Support Systems, vol. 43, no. 2, pp. 618-644, 2007.
[2] J. Golbeck, "Weaving a Web of Trust," Science, vol. 321, no. 5896, pp. 1640-1641, 2008.
[3] K. Hoffman, D. Zage, and C. Nita-Rotaru, "A Survey of Attack and Defense Techniques for Reputation Systems," ACM Computing Surveys, vol. 14, no. 4, 2009.
[4] D. Stern, R. Herbrich, and T. Graepel, "Matchbox: Large Scale Online Bayesian Recommendations," Proc. 18th Int'l Conf. World Wide Web (WWW), 2009.
[5] L. Xiong and L. Liu, "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities," IEEE Trans. Knowledge and Data Eng., vol. 16, no. 7, pp. 843-857, July 2004.
[6] R. Zhou and K. Hwang, "PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing," IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 4, pp. 460-473, Apr. 2007.
[7] S. Song, K. Hwang, and Y.K. Kwok, "Risk-Resilient Heuristics and Genetic Algorithms for Security-Assured Grid Job Scheduling," IEEE Trans. Computers, vol. 55, no. 6, pp. 703-719, June 2006.
[8] Y. Zhang and Y. Fang, "A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks?" IEEE Trans. Parallel and Distributed Systems, vol. 18, no. 8, pp. 1134-1145, Aug. 2007.
[9] A. Whitby, A. Jϕsang, and J. Indulska, "Filtering Out Unfair Ratings in Bayesian Reputation Systems," Proc. Int'l Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS), 2004.
[10] Y. Wang and M.P. Singh, "Trust Representation and Aggregation in Distributed Agent Systems," Proc. Int'l Conf. Artificial Intelligence (AAAI), 2006.
[11] B. Yu and M.P. Singh, "Detecting Deception in Reputation Management," Proc. Int'l Joint Conf. Autonomous Agents and Multiagent Systems (AAMAS), 2003.
[12] U. Kuter and J. Golbeck, "SUNNY: A New Algorithm for Trust Inference in Social Networks Using Probabilistic Confidence Models," Proc. Int'l Conf. Artificial Intelligence (AAAI), 2007.
[13] J. Golbeck and J. Hendler, "Inferring Trust Relationships in Web-Based Social Networks," ACM Trans. Internet Technology, vol. 6, no. 4, pp. 497-529, 2006.
[14] M. Raya, P. Papadimitratos, V.D. Gligor, J.P. Hubaux, "On DataCentric Trust Establishment in Ephemeral Ad Hoc Networks," Proc. IEEE INFOCOM, 2008.
[15] S. Kamvar, M. Schlosser, and H. Garcia-Molina, "The Eigentrust Algorithm for Reputation Management in P2P Networks," Proc. 12th Int'l Conf. World Wide Web (WWW), May 2003.
[16] M. Srivatsa, L. Xiong, and L. Liu, "TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks," Proc. 14th Int'l Conf. World Wide Web (WWW), May 2005.
[17] J.M. Morris, "The Kalman Filter: A Robust Estimator for Some Classes of Linear Quadratic Problems," IEEE Trans. Information Theory, vol. 22, no. 5, pp. 526-534, Sept. 1976.
[18] C. Atkeson, A. Moore, and S. Schaal, "Locally Weighted Learning," Artificial Intelligence Rev., vol. 11, pp. 11-73, Apr. 1997.
[19] P.S. Maybeck, Stochastic Models, Estimation, and Control Volume 2 (Mathematics in Science and Engineering). Academic, 1979.
[20] A. Dempster, N. Laird, and D. Rubin, "Maximum Likelihood from Incomplete Data via the EM Algorithm," J. Royal Statistical Soc. Series B, vol. 39, no. 1, pp. 1-38, 1977.
[21] W.Y. Chen, D. Zhang, and E.Y. Chang, "Combinational Collaborative Filtering for Personalized Community Recommendation," Proc. ACM Int'l Conf. Knowledge Discovery and Data Mining, 2009.
[22] J. Ting, A. D'Souza, and S. Schaal, "Bayesian Regression with Input Noise for High Dimensional Data," Proc. ACM 23rd Int'l Conf. Machine Learning, 2006.
[23] P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood, "The Value of Reputation on eBay: A Controlled Experiment," Experimental Economics, vol. 9, no. 2, pp. 79-101, 2006.
[24] W. Conner, A. Iyengar, T. Mikalsen, I. Rouvellou, and K. Nahrstedt, "A Trust Management Framework for Service-Oriented Environments," Proc. 18th Int'l Conf. World Wide Web (WWW), 2009.
[25] R. Andersen et al., "Trust-Based Recommendation Systems: An Axiomatic Approach," Proc. 17th Int'l Conf. World Wide Web (WWW), 2008.
[26] H. Yu, P. Gibbons, M. Kaminsky, and F. Xiao, "A Near-Ooptimal Social Network Defense against Sybil Attacks?" Proc. IEEE Symp. Security and Privacy, 2008.
[27] Z. Liang and W. Shi, "Analysis of Ratings on Trust Inference in Open Environments," Elsevier Performance Evaluation, vol. 65, no. 2, pp. 99-128, 2008.
[28] X. Wang, W. Ou, and J. Su, "A Reputation Inference Model Based on Linear Hidden Markov Process," Proc. ISECS Int'l Colloquium Computing, Comm., Control, and Management, 2009.

Index Terms:
Trust model, accuracy assessment, malicious feedback, robustness.
Citation:
Xiaofeng Wang, Ling Liu, Jinshu Su, "RLM: A General Model for Trust Representation and Aggregation," IEEE Transactions on Services Computing, vol. 5, no. 1, pp. 131-143, Jan.-March 2012, doi:10.1109/TSC.2010.56
Usage of this product signifies your acceptance of the Terms of Use.