Skip to main content

2015 | OriginalPaper | Buchkapitel

Robust Aggregation of Inconsistent Information: Concepts and Research Directions

verfasst von : Aleksandar Ignjatovic, Mohsen Rezvani, Mohammad Allahbakhsh, Elisa Bertino

Erschienen in: Transparency in Social Media

Verlag: Springer International Publishing

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

Improving the reliability of information obtained from multiple sources in an automated way is today a critical need as decision-making processes and other applications heavily depend on such information. The sources can be sensors used in a wireless sensor network, multiple resources on the Internet or a large number of users of a web service or a social network. Examples of such a problem include finding a reliable rating of a product or a movie, the accurate current price of a stock or a reliable assessment of the prevailing market analysts’ sentiment about a stock. The problem arises from the fact that multiple sources often provide inconsistent information, due to differences of opinion, human or hardware errors, being out of date and, most importantly, the sources might even maliciously supply false information with an express intent to deceive. While it is clear that no aggregation procedure can strictly guarantee the accuracy of the output, in practice we must seek “the best” answer possible—the one that in the given circumstances minimizes the error or the likelihood of an error of the aggregate value. Such procedures are needed for both numerical and non-numerical data and, given the vast amount of data becoming available, should operate without a need for human judgment or an external “gold standard”. In this paper we provide a survey of solutions to this problem based on iterative filtering approaches that take into account not only the information but also the information sources and are able to assess the credibility of the information and the trustworthiness of the information sources. We also discuss future work and open research directions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
Zurück zum Zitat Allahbakhsh, M., & Ignjatovic, A. (2015). An iterative method for calculating robust rating scores. IEEE Transactions on Parallel and Distributed Systems, 26(2), 340–350.CrossRef Allahbakhsh, M., & Ignjatovic, A. (2015). An iterative method for calculating robust rating scores. IEEE Transactions on Parallel and Distributed Systems, 26(2), 340–350.CrossRef
Zurück zum Zitat Allahbakhsh, M., Ignjatovic, A., Motahari-Nezhad H.R., Benatallah, B (2015). Robust evaluation of products and reviewers in social rating systems. World Wide Web 18(1):73–109 Allahbakhsh, M., Ignjatovic, A., Motahari-Nezhad H.R., Benatallah, B (2015). Robust evaluation of products and reviewers in social rating systems. World Wide Web 18(1):73–109
Zurück zum Zitat Allahbakhsh, M., Ignjatovic, A., Benatallah, B., & Motahari-Nezhad, H. R. (2013). Robust evaluation of products and reviewers in social rating systems. WorldWide Web. Allahbakhsh, M., Ignjatovic, A., Benatallah, B., & Motahari-Nezhad, H. R. (2013). Robust evaluation of products and reviewers in social rating systems. WorldWide Web.
Zurück zum Zitat Chou, C.-T., Ignjatovic, A., & Hu, W. (2013). Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1525–1534.CrossRef Chou, C.-T., Ignjatovic, A., & Hu, W. (2013). Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1525–1534.CrossRef
Zurück zum Zitat Dai, C., Rao, F.-Y., Ghinita, G., & Bertino, E. (2011). Privacy-preserving assessment of location data trustworthiness. In Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS ’11 (pp. 231–240). Dai, C., Rao, F.-Y., Ghinita, G., & Bertino, E. (2011). Privacy-preserving assessment of location data trustworthiness. In Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS ’11 (pp. 231–240).
Zurück zum Zitat Dai, C., Rao, F.-Y., Truta, T. M., & Bertino, E. (2012). Privacy-preserving assessment of social network data trustworthiness. In CollaborateCom (pp. 97–106). Dai, C., Rao, F.-Y., Truta, T. M., & Bertino, E. (2012). Privacy-preserving assessment of social network data trustworthiness. In CollaborateCom (pp. 97–106).
Zurück zum Zitat de Kerchove, C., & Van Dooren, P. (2007). Iterative filtering for a dynamical reputation system. CoRR [abs/0711.3964]. de Kerchove, C., & Van Dooren, P. (2007). Iterative filtering for a dynamical reputation system. CoRR [abs/0711.3964].
Zurück zum Zitat De Kerchove, C., & Van Dooren, P. (2008). Reputation systems and optimization. Siam News, 41(2), 2008. De Kerchove, C., & Van Dooren, P. (2008). Reputation systems and optimization. Siam News, 41(2), 2008.
Zurück zum Zitat de Kerchove, C., & Van Dooren, P. (2010). Iterative filtering in reputation systems. The SIAM Journal on Matrix Analysis and Applications, 31(4), 1812–1834.CrossRef de Kerchove, C., & Van Dooren, P. (2010). Iterative filtering in reputation systems. The SIAM Journal on Matrix Analysis and Applications, 31(4), 1812–1834.CrossRef
Zurück zum Zitat D’Souza, N. (2011). Applications of adaptive averages: Recommendation systems. Honours Thesis, UNSW. D’Souza, N. (2011). Applications of adaptive averages: Recommendation systems. Honours Thesis, UNSW.
Zurück zum Zitat Hasan, O., Brunie, L., Bertino, E., & Shang, N. (2013). A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Transactions on Information Forensics and Security, 8(6), 949–962.CrossRef Hasan, O., Brunie, L., Bertino, E., & Shang, N. (2013). A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Transactions on Information Forensics and Security, 8(6), 949–962.CrossRef
Zurück zum Zitat Ignjatovic, A., Foo, N., & Lee, C. T. (2008). An analytic approach to reputation ranking of participants in online transactions. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI). Ignjatovic, A., Foo, N., & Lee, C. T. (2008). An analytic approach to reputation ranking of participants in online transactions. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI).
Zurück zum Zitat Ignjatovic, A., Lee, C. T., Compton, P., Cutay, C., & Guo, H. (2009). Computing marks from multiple assessors using adaptive averaging. In International Conference on Engineering Education (ICEE). Ignjatovic, A., Lee, C. T., Compton, P., Cutay, C., & Guo, H. (2009). Computing marks from multiple assessors using adaptive averaging. In International Conference on Engineering Education (ICEE).
Zurück zum Zitat Labrinidis, A., & Jagadish, H. V. (2012). Challenges and opportunities with big data. The Proceedings of the VLDB Endowment, 5(12), 2032–2033.CrossRef Labrinidis, A., & Jagadish, H. V. (2012). Challenges and opportunities with big data. The Proceedings of the VLDB Endowment, 5(12), 2032–2033.CrossRef
Zurück zum Zitat Laureti, P., Moret, L., Zhang, Y.-C., & Yu, Y.-K. (2006). Information filtering via Iterative Refinement. EPL (Europhysics Letters), 75, 1006–1012.CrossRef Laureti, P., Moret, L., Zhang, Y.-C., & Yu, Y.-K. (2006). Information filtering via Iterative Refinement. EPL (Europhysics Letters), 75, 1006–1012.CrossRef
Zurück zum Zitat Lee, C.-T., Milic-Frayling, N., Vinay, V., Rodrigues, E.M., Ignjatovic, A., & Kazai, G. (2009). Measuring system performance and topic effectiveness using generalized means with adaptive weights. In ACM Conference on Information and Knowledge Management (CIKM) (pp. 2033–2036). New York, NY, USA: ACM. Lee, C.-T., Milic-Frayling, N., Vinay, V., Rodrigues, E.M., Ignjatovic, A., & Kazai, G. (2009). Measuring system performance and topic effectiveness using generalized means with adaptive weights. In ACM Conference on Information and Knowledge Management (CIKM) (pp. 2033–2036). New York, NY, USA: ACM.
Zurück zum Zitat Lee, C.-T., Rodrigues, E.M., Kazai, G., Ignjatovic, A., & Milic-Frayling, N. (2009). Model for voter scoring and best answer selection in community q & a services. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI) (pp. 116–123). New York, NY, USA: ACM. Lee, C.-T., Rodrigues, E.M., Kazai, G., Ignjatovic, A., & Milic-Frayling, N. (2009). Model for voter scoring and best answer selection in community q & a services. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI) (pp. 116–123). New York, NY, USA: ACM.
Zurück zum Zitat Lim, H.-S., Ghinita, G., Bertino, E., & Kantarcioglu, M. (2012). A game-theoretic approach for high-assurance of data trustworthiness in sensor networks. In 2012 I.E. 28th International Conference on Data Engineering (ICDE) (pp. 1192–1203). Lim, H.-S., Ghinita, G., Bertino, E., & Kantarcioglu, M. (2012). A game-theoretic approach for high-assurance of data trustworthiness in sensor networks. In 2012 I.E. 28th International Conference on Data Engineering (ICDE) (pp. 1192–1203).
Zurück zum Zitat Lim, H.-S., Moon, Y.-S., & Bertino, E. (2010). Provenance-based trustworthiness assessment in sensor networks. In Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, DMSN ’10 (pp. 2–7). Lim, H.-S., Moon, Y.-S., & Bertino, E. (2010). Provenance-based trustworthiness assessment in sensor networks. In Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, DMSN ’10 (pp. 2–7).
Zurück zum Zitat Reznik, L., & Bertino, E. (2013). Poster: Data quality evaluation: Integrating security and accuracy. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13 (pp. 1367–1370). New York, NY, USA: ACM.CrossRef Reznik, L., & Bertino, E. (2013). Poster: Data quality evaluation: Integrating security and accuracy. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13 (pp. 1367–1370). New York, NY, USA: ACM.CrossRef
Zurück zum Zitat Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2013). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. Technical Report UNSW-CSE-TR-201319, School of Computer Science and Engineering, UNSW. Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2013). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. Technical Report UNSW-CSE-TR-201319, School of Computer Science and Engineering, UNSW.
Zurück zum Zitat Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Sec. Comput. 12(1):98–110. Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Sec. Comput. 12(1):98–110.
Zurück zum Zitat Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2014a). Credibility propagation for robust data aggregation in WSNs. Technical Report UNSW-CSE-TR-201414, School of Computer Science and Engineering, UNSW. Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2014a). Credibility propagation for robust data aggregation in WSNs. Technical Report UNSW-CSE-TR-201414, School of Computer Science and Engineering, UNSW.
Zurück zum Zitat Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2014b). Provenance-aware security risk analysis for hosts and network flows. In IEEE/IFIP Network Operations and Management Symposium (NOMS). Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2014b). Provenance-aware security risk analysis for hosts and network flows. In IEEE/IFIP Network Operations and Management Symposium (NOMS).
Zurück zum Zitat Rezvani, M., Ignjatovic, A., & Jha, S. (2013). Iterative security risk analysis for network flows based on provenance and interdependency. In IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 13) (pp. 286–288). Rezvani, M., Ignjatovic, A., & Jha, S. (2013). Iterative security risk analysis for network flows based on provenance and interdependency. In IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 13) (pp. 286–288).
Zurück zum Zitat Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.CrossRef Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.CrossRef
Zurück zum Zitat Tang, L.-A., Yu, X., Kim, S., Han, J., Hung, C.-C., & Peng, W.-C. (2010). Tru-Alarm: Trustworthiness analysis of sensor networks in cyber-physical systems. In Proceedings of the 2010 I.E. International Conference on Data Mining, ICDM ’10 (pp. 1079–1084). Tang, L.-A., Yu, X., Kim, S., Han, J., Hung, C.-C., & Peng, W.-C. (2010). Tru-Alarm: Trustworthiness analysis of sensor networks in cyber-physical systems. In Proceedings of the 2010 I.E. International Conference on Data Mining, ICDM ’10 (pp. 1079–1084).
Zurück zum Zitat Wang, X., Cheng, W., Mohapatra, P., & Abdelzaher, T. F. (2013). Artsense: Anonymous reputation and trust in participatory sensing. In INFOCOM, 2013 Proceedings IEEE (pp. 2517–2525). Wang, X., Cheng, W., Mohapatra, P., & Abdelzaher, T. F. (2013). Artsense: Anonymous reputation and trust in participatory sensing. In INFOCOM, 2013 Proceedings IEEE (pp. 2517–2525).
Zurück zum Zitat Yu, Y.-K., Zhang, Y.-C., Laureti, P., & Moret, L. (2006). Decoding information from noisy, redundant, and intentionally distorted sources. Physica A Statistical Mechanics and its Applications, 371, 732–744.CrossRef Yu, Y.-K., Zhang, Y.-C., Laureti, P., & Moret, L. (2006). Decoding information from noisy, redundant, and intentionally distorted sources. Physica A Statistical Mechanics and its Applications, 371, 732–744.CrossRef
Metadaten
Titel
Robust Aggregation of Inconsistent Information: Concepts and Research Directions
verfasst von
Aleksandar Ignjatovic
Mohsen Rezvani
Mohammad Allahbakhsh
Elisa Bertino
Copyright-Jahr
2015
DOI
https://doi.org/10.1007/978-3-319-18552-1_3