Skip to main content
Erschienen in: World Wide Web 3/2018

14.08.2017

Context-aware trust network extraction in large-scale trust-oriented social networks

verfasst von: Guanfeng Liu, Yi Liu, An Liu, Zhixu Li, Kai Zheng, Yan Wang, Xiaofang Zhou

Erschienen in: World Wide Web | Ausgabe 3/2018

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent years, social networking sites have been used as a means for a rich variety of activities, such as movie recommendations and product recommendations. In order to evaluate the trust between a truster (i.e., the source) and a trustee (i.e., the target) who have no direct interaction in Online Social Networks (OSNs), the trust network between them that contains important intermediate participants, the trust relations between the participants, and the social context, has an important influence on trust evaluation. Thus, to deliver a reasonable trust evaluation result, before performing any trust evaluation (i.e., trust transitivity), the contextual trust network from a given source to a given target needs to be first extracted from the social network, where constraints on social context should also be considered to guarantee the quality of the extracted networks. However, this problem has been proved to be NP-Complete. Towards solving this challenging problem, we first present a contextual trust-oriented social network structure which takes social contextual impact factors, including trust, social intimacy degree, community impact factor, preference similarity and residential location distance into account. These factors have significant influences on both social interactions between participants and trust evaluation. Then, we present a new concept QoTN (Quality of Trust Network) and propose a social context-aware trust network extraction model. Finally, we propose a Heuristic Social Context-Aware trust Network extraction algorithm (H-SCAN-K) by extending the K-Best-First Search (KBFS) method with several proposed optimization strategies. The experiments conducted on two real datasets illustrate that our proposed model and algorithm outperform the existing methods in both algorithm efficiency and the quality of the extracted trust networks.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Adamic, L.A., Lukose, R.M., Huberman, B.A.: Local search in unstructured networks. In: Handbook of Graphs and Networks. Wiley (2005) Adamic, L.A., Lukose, R.M., Huberman, B.A.: Local search in unstructured networks. In: Handbook of Graphs and Networks. Wiley (2005)
2.
Zurück zum Zitat Adler, P.S.: Market, hierarchy, and trust: the knowledge economy and the future of capitalism. Organ. Sci. 12(12), 215–234 (2001)CrossRef Adler, P.S.: Market, hierarchy, and trust: the knowledge economy and the future of capitalism. Organ. Sci. 12(12), 215–234 (2001)CrossRef
3.
Zurück zum Zitat Baase, S., Gelder, A.: Computer Algorithms Introduction to Design and Analysis. Addison Wesley (1999) Baase, S., Gelder, A.: Computer Algorithms Introduction to Design and Analysis. Addison Wesley (1999)
4.
Zurück zum Zitat Barnett, E., Casper, M.: A definition of social environment. Am. J. Public Health 91(3), 465 (2001) Barnett, E., Casper, M.: A definition of social environment. Am. J. Public Health 91(3), 465 (2001)
5.
Zurück zum Zitat Brass, D.J.: A Socal Network Prespective on Industral/Organizational Psychology. Industrial/ Organizational Handbook (2009) Brass, D.J.: A Socal Network Prespective on Industral/Organizational Psychology. Industrial/ Organizational Handbook (2009)
6.
Zurück zum Zitat Chang, N., Liu, M.: Revisiting the ttl-based controlled flooding search: Optimality and randomization. In: MobiCom, pp. 85–99 (2004) Chang, N., Liu, M.: Revisiting the ttl-based controlled flooding search: Optimality and randomization. In: MobiCom, pp. 85–99 (2004)
7.
Zurück zum Zitat Chia, P.H., Pitsilis, G.: Exploring the use of explicit trust link for filtering recommenders: a study on epinions.com. J. Inf. Process. 19, 332–344 (2011) Chia, P.H., Pitsilis, G.: Exploring the use of explicit trust link for filtering recommenders: a study on epinions.com. J. Inf. Process. 19, 332–344 (2011)
8.
Zurück zum Zitat Choi, M.H.K., Croft, W.: Dependency trigram model for social relation extraction from news articles. In: SIGIR, pp. 1047–1048 (2012) Choi, M.H.K., Croft, W.: Dependency trigram model for social relation extraction from news articles. In: SIGIR, pp. 1047–1048 (2012)
9.
Zurück zum Zitat Christianson, B., Harbison, W.S.: Why isn’t trust transitivie?. In: International Workshop on Security Protocols, pp. 171–176 (1996) Christianson, B., Harbison, W.S.: Why isn’t trust transitivie?. In: International Workshop on Security Protocols, pp. 171–176 (1996)
10.
Zurück zum Zitat Chua, F., Lim, E.P.: Trust network inference for online rating data using generative models. In: KDD, pp. 889–898 (2010) Chua, F., Lim, E.P.: Trust network inference for online rating data using generative models. In: KDD, pp. 889–898 (2010)
11.
Zurück zum Zitat Dalton, M.: Men Who Manage. Wiley, New York (1959) Dalton, M.: Men Who Manage. Wiley, New York (1959)
13.
Zurück zum Zitat Filali, I., Huet, F.: Dynamic ttl-based search in unstructured peer-to-peer networks. In: CCGrid’10, pp. 438–447 (2010) Filali, I., Huet, F.: Dynamic ttl-based search in unstructured peer-to-peer networks. In: CCGrid’10, pp. 438–447 (2010)
14.
Zurück zum Zitat Freeh, V., Lowenthal, D.K., Pan, F., Kappiah, N., Springer, R., Rountree, B.L., Femal, M.E.: Analyzing the energy-time trade-off in high-performance computing applications. IEEE Trans. Parallel Distrib. Syst. 18(6), 835–848 (2007)CrossRef Freeh, V., Lowenthal, D.K., Pan, F., Kappiah, N., Springer, R., Rountree, B.L., Femal, M.E.: Analyzing the energy-time trade-off in high-performance computing applications. IEEE Trans. Parallel Distrib. Syst. 18(6), 835–848 (2007)CrossRef
15.
Zurück zum Zitat Gimpel, J., Karnes, K., Mctague, J., Pearson-Merkowitz, S.: Distance-decay in the political geography of friends-and-neighbors voting. Polit. Geogr. 27, 231–252 (2008)CrossRef Gimpel, J., Karnes, K., Mctague, J., Pearson-Merkowitz, S.: Distance-decay in the political geography of friends-and-neighbors voting. Polit. Geogr. 27, 231–252 (2008)CrossRef
16.
Zurück zum Zitat Gkantsidis, C., Mihail, M., Saberi, A.: Random walks in peer-to-peer networks. In: IEEE INFORCOM, pp. 120–130 (2004) Gkantsidis, C., Mihail, M., Saberi, A.: Random walks in peer-to-peer networks. In: IEEE INFORCOM, pp. 120–130 (2004)
17.
Zurück zum Zitat Golbeck, J., Hendler, J.: Inferring trust relationships in web-based social networks. ACM Trans. Internet Technol. 6(4), 497–529 (2006)CrossRef Golbeck, J., Hendler, J.: Inferring trust relationships in web-based social networks. ACM Trans. Internet Technol. 6(4), 497–529 (2006)CrossRef
18.
Zurück zum Zitat Groh, G., Hauffa, J.: Characterizing social relations via nlp-based sentiment analysis. In: AAAI Conference on Weblogs and Social Media, pp. 502–505 (2011) Groh, G., Hauffa, J.: Characterizing social relations via nlp-based sentiment analysis. In: AAAI Conference on Weblogs and Social Media, pp. 502–505 (2011)
19.
Zurück zum Zitat Iosup, A., Ostermann, S., Yigitbasi, N., Prodan, R., Fahringer, T., Epema, D.: Performance analysis of cloud computing services for many-tasks scientific computing. IEEE Trans. Parallel Distrib. Syst. 22(6), 931–945 (2011)CrossRef Iosup, A., Ostermann, S., Yigitbasi, N., Prodan, R., Fahringer, T., Epema, D.: Performance analysis of cloud computing services for many-tasks scientific computing. IEEE Trans. Parallel Distrib. Syst. 22(6), 931–945 (2011)CrossRef
20.
Zurück zum Zitat Ira, P.: Bi-Directional Search. Edinburgh University Press, Edinburgh (1971)MATH Ira, P.: Bi-Directional Search. Edinburgh University Press, Edinburgh (1971)MATH
21.
Zurück zum Zitat Korte, R.F.: Biases in decision making and implications for human resource development. Adv. Dev. Hum. Resour. 5(4), 440–457 (2003)CrossRef Korte, R.F.: Biases in decision making and implications for human resource development. Adv. Dev. Hum. Resour. 5(4), 440–457 (2003)CrossRef
22.
Zurück zum Zitat Kuter, U., Golbeck, J.: Sunny: A new algorithm for trust inference in social networks using probabilistic confidence model. In: AAAI’07, pp. 1377–1382 (2007) Kuter, U., Golbeck, J.: Sunny: A new algorithm for trust inference in social networks using probabilistic confidence model. In: AAAI’07, pp. 1377–1382 (2007)
23.
Zurück zum Zitat Lichtenstein, S., Slovic, P.: The Construction of Preference. Cambridge University Press (2006) Lichtenstein, S., Slovic, P.: The Construction of Preference. Cambridge University Press (2006)
24.
Zurück zum Zitat Liu, G., Wang, Y., Orgun, M., Lim, E.P.: A heuristic algorithm for trust-oriented service provider selection in complex social networks. In: SCC, pp. 130–137 (2010) Liu, G., Wang, Y., Orgun, M., Lim, E.P.: A heuristic algorithm for trust-oriented service provider selection in complex social networks. In: SCC, pp. 130–137 (2010)
25.
Zurück zum Zitat Liu, G., Wang, Y., Orgun, M.A.: Optimal social trust path selection in complex social networks. In: AAAI, pp. 1397–1398 (2010) Liu, G., Wang, Y., Orgun, M.A.: Optimal social trust path selection in complex social networks. In: AAAI, pp. 1397–1398 (2010)
26.
Zurück zum Zitat Liu, G., Wang, Y., Orgun, M.A.: Finding k optimal social trust paths for the selection of trustworthy service providers in complex social networks. In: ICWS, pp. 41–48 (2011) Liu, G., Wang, Y., Orgun, M.A.: Finding k optimal social trust paths for the selection of trustworthy service providers in complex social networks. In: ICWS, pp. 41–48 (2011)
27.
Zurück zum Zitat Liu, G., Wang, Y., Orgun, M.A.: Trust transitivity in complex social networks. In: AAAI, pp. 1222–1229 (2011) Liu, G., Wang, Y., Orgun, M.A.: Trust transitivity in complex social networks. In: AAAI, pp. 1222–1229 (2011)
28.
Zurück zum Zitat Liu, G., Wang, Y., Orgun, M.A.: Social Context-Aware Trust Network Discovery in Complex Contextual Social Networks. In: AAAI (2012) Liu, G., Wang, Y., Orgun, M.A.: Social Context-Aware Trust Network Discovery in Complex Contextual Social Networks. In: AAAI (2012)
29.
Zurück zum Zitat Liu, G., Wang, Y., Orgun, M.A., Lim, E.P.: Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans. Serv. Comput. doi:10.1109/ICWS.2011.81 (2011) Liu, G., Wang, Y., Orgun, M.A., Lim, E.P.: Finding the optimal social trust path for the selection of trustworthy service providers in complex social networks. IEEE Trans. Serv. Comput. doi:10.​1109/​ICWS.​2011.​81 (2011)
30.
Zurück zum Zitat Liu, G., Wang, Y., Orgun, M.A., Liu, H.: Discovering trust networks for the selection of trustworthy service providers in complex contextual social networks. In: ICWS, pp. 384–391 (2012) Liu, G., Wang, Y., Orgun, M.A., Liu, H.: Discovering trust networks for the selection of trustworthy service providers in complex contextual social networks. In: ICWS, pp. 384–391 (2012)
31.
Zurück zum Zitat Liu, G., Zheng, K., Wang, Y., Orgun, M.A., Liu, A., Zhao, L., Zhou, X.: Multi-constrained graph pattern matching in large-scale contextual social graphs. In: ICDE, pp. 351–362 (2015) Liu, G., Zheng, K., Wang, Y., Orgun, M.A., Liu, A., Zhao, L., Zhou, X.: Multi-constrained graph pattern matching in large-scale contextual social graphs. In: ICDE, pp. 351–362 (2015)
32.
Zurück zum Zitat Liu, Q., Xiang, B., Yuan, N.J., Chen, E., Xiong, H., Zheng, Y., Yang, Y.: An influence propagation view of pagerank. ACM Trans. Knowl. Discov. Data 11 (3), 30:1–30:30 (2017) Liu, Q., Xiang, B., Yuan, N.J., Chen, E., Xiong, H., Zheng, Y., Yang, Y.: An influence propagation view of pagerank. ACM Trans. Knowl. Discov. Data 11 (3), 30:1–30:30 (2017)
33.
Zurück zum Zitat Lo, D., Surian, D., Zhang, K., Lim, E.P.: Mining direct antagonistic communities in explicit trust networks. In: CIKM, pp. 1013–1018 (2011) Lo, D., Surian, D., Zhang, K., Lim, E.P.: Mining direct antagonistic communities in explicit trust networks. In: CIKM, pp. 1013–1018 (2011)
34.
Zurück zum Zitat Luhmann, N.: Trust and Power. Wiley, Chichester (1979) Luhmann, N.: Trust and Power. Wiley, Chichester (1979)
35.
Zurück zum Zitat Mansell, R., Collins, B.: Trust and Crime in Information Societies. Edward Elgar Publishing, Cheltenham (2005) Mansell, R., Collins, B.: Trust and Crime in Information Societies. Edward Elgar Publishing, Cheltenham (2005)
36.
Zurück zum Zitat Mccallum, A., Wang, X., Corrada-Emmanuel, A.: Topic and role discovery in social networks with experiments on Enron and academic email. J. Artif. Intell. Res. 30(1), 249–272 (2007) Mccallum, A., Wang, X., Corrada-Emmanuel, A.: Topic and role discovery in social networks with experiments on Enron and academic email. J. Artif. Intell. Res. 30(1), 249–272 (2007)
37.
Zurück zum Zitat Milgram, S.: The small world problem. Psychology Today 2(60), 61–67 (1967) Milgram, S.: The small world problem. Psychology Today 2(60), 61–67 (1967)
38.
Zurück zum Zitat Miller, R., Perlman, D., Brehm, S.: Intimate Relationships, 4th edn. McGraw-Hill College, Boston (2007) Miller, R., Perlman, D., Brehm, S.: Intimate Relationships, 4th edn. McGraw-Hill College, Boston (2007)
39.
Zurück zum Zitat Mislove, A., Marcon, M., Gummadi, K., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: ACM IMC, pp. 29–42 (2007) Mislove, A., Marcon, M., Gummadi, K., Druschel, P., Bhattacharjee, B.: Measurement and analysis of online social networks. In: ACM IMC, pp. 29–42 (2007)
42.
Zurück zum Zitat Sun, Y., Yu, W., Han, Z., Liu, K.: Information theoretic framework of trust modelling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24 (2), 305–317 (2006)CrossRef Sun, Y., Yu, W., Han, Z., Liu, K.: Information theoretic framework of trust modelling and evaluation for ad hoc networks. IEEE J. Sel. Areas Commun. 24 (2), 305–317 (2006)CrossRef
43.
Zurück zum Zitat Tang, J.H., Gao, H.L., Sarma, A.D.: etrust: Understanding trust evolution in an online world. In: KDD, pp. 253–261 (2012) Tang, J.H., Gao, H.L., Sarma, A.D.: etrust: Understanding trust evolution in an online world. In: KDD, pp. 253–261 (2012)
44.
Zurück zum Zitat Wang, G., Wu, J.: Multi-dimensional evidence-based trust management with multi-trusted paths. Futur. Gener. Comput. Syst. 27(5), 529–538 (2011)CrossRef Wang, G., Wu, J.: Multi-dimensional evidence-based trust management with multi-trusted paths. Futur. Gener. Comput. Syst. 27(5), 529–538 (2011)CrossRef
45.
Zurück zum Zitat Wang, Y., Varadharajan, V.: Role-based recommendation and trust evaluation. In: IEEE EEE’07, pp. 278–295 (2007) Wang, Y., Varadharajan, V.: Role-based recommendation and trust evaluation. In: IEEE EEE’07, pp. 278–295 (2007)
46.
Zurück zum Zitat Wang, Y., Li, L., Liu, G.: Social context-aware trust inference for trust enhancement in social network based recommendations on service providers. World Wide Web Journal August 18(1), 159–184 (2013)CrossRef Wang, Y., Li, L., Liu, G.: Social context-aware trust inference for trust enhancement in social network based recommendations on service providers. World Wide Web Journal August 18(1), 159–184 (2013)CrossRef
47.
Zurück zum Zitat Wren, J., Kozak, K., Johnson, K., Deakyne, S., Schilling, L., Dellavalle, R.: A survey of perceived contributions to papers based on byline position and number of authors. EMBO Rep. 8(11), 988–991 (2007)CrossRef Wren, J., Kozak, K., Johnson, K., Deakyne, S., Schilling, L., Dellavalle, R.: A survey of perceived contributions to papers based on byline position and number of authors. EMBO Rep. 8(11), 988–991 (2007)CrossRef
48.
Zurück zum Zitat Yao, Y., Tong, H., Yan, X., Xu, F., Lu, J.: Matri: A multi-aspect and transitive trust inference model. In: WWW, pp. 1467–1476 (2013) Yao, Y., Tong, H., Yan, X., Xu, F., Lu, J.: Matri: A multi-aspect and transitive trust inference model. In: WWW, pp. 1467–1476 (2013)
49.
Zurück zum Zitat Yoo, S.Y., Yang, F.L., Moon, I.: Mining social networks for personalized email prioritization. In: KDD, pp. 967–976 (2009) Yoo, S.Y., Yang, F.L., Moon, I.: Mining social networks for personalized email prioritization. In: KDD, pp. 967–976 (2009)
50.
Zurück zum Zitat Zajonc, R.: Interpersonal attraction and attitude similarity. J. Abnorm. Soc. Psychol. 62(3), 713–715 (1961)CrossRef Zajonc, R.: Interpersonal attraction and attitude similarity. J. Abnorm. Soc. Psychol. 62(3), 713–715 (1961)CrossRef
Metadaten
Titel
Context-aware trust network extraction in large-scale trust-oriented social networks
verfasst von
Guanfeng Liu
Yi Liu
An Liu
Zhixu Li
Kai Zheng
Yan Wang
Xiaofang Zhou
Publikationsdatum
14.08.2017
Verlag
Springer US
Erschienen in
World Wide Web / Ausgabe 3/2018
Print ISSN: 1386-145X
Elektronische ISSN: 1573-1413
DOI
https://doi.org/10.1007/s11280-017-0485-6

Weitere Artikel der Ausgabe 3/2018

World Wide Web 3/2018 Zur Ausgabe

Premium Partner