Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.

Slides:



Advertisements
Similar presentations
Computer Supported Cooperative Work by an Agent Oriented Software Engineering Approach: CSCW by AOSE Darlinton Carvalho
Advertisements

Distributed Advice-Seeking on an Evolving Social Network Dept Computer Science and Software Engineering The University of Melbourne - Australia Golriz.
1 CS 6910: Advanced Computer and Information Security Lecture on 11/2/06 Trust in P2P Systems Ahmet Burak Can and Bharat Bhargava Center for Education.
Improving Peer-to-Peer Networks “Limited Reputation Sharing in P2P Systems” “Robust Incentive Techniques for P2P Networks”
Provenance in Open Distributed Information Systems Syed Imran Jami PhD Candidate FAST-NU.
Intelligent and Adaptive Systems Group Seminar 28 th September 2006.
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems Aameek Singh and Ling Liu Presented by: Korporn Panyim.
A Survey of Trust Evaluation Methods (Supervisor: Yan Wang) Name:Erden Sacan Student ID: Unit:ITEC810.
Peer-to-Peer Networks as a Distribution and Publishing Model Jorn De Boever (june 14, 2007)
A S URVEY OF TRUST MANAGEMENT AND ITS APPLICATIONS S UPERVISED BY : D R. Y AN W ANG Ravendra Singh Student-id:
CSCE 715 Ankur Jain 11/16/2010. Introduction Design Goals Framework SDT Protocol Achievements of Goals Overhead of SDT Conclusion.
Peer-to-peer archival data trading Brian Cooper Joint work with Hector Garcia-Molina (and others) Stanford University.
Trust Analysis through Relationship Identification Ronald Ashri 1, Sarvapali D. Ramchurn 1, Jordi Sabater 2, Michael Luck 1 and Nick Jennings 1 1.Intelligence,
Trust and Reputation Management in an Web-Enhanced World Zhaoyuan Zhang
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Keeping Peers Honest In EigenTrust Robert McGrew Joint work with Zoë Abrams and Serge Plotkin.
WI/AOC Related Work (supported by RGC/CA) Jiming Liu, HKBU Aug 27, 2005.
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
RETSINA: A Distributed Multi-Agent Infrastructure for Information Gathering and Decision Support The Robotics Institute Carnegie Mellon University PI:
12 -1 Lecture 12 User Modeling Topics –Basics –Example User Model –Construction of User Models –Updating of User Models –Applications.
Personalized Ontologies for Web Search and Caching Susan Gauch Information and Telecommunications Technology Center Electrical Engineering and Computer.
Conference title 1 A Few Bad Apples Are Enough. An Agent-Based Peer Review Game. Juan Bautista Cabotà, Francisco Grimaldo (U. València) Lorena Cadavid.
COMPUTER APPLICATIONS TO BUSINESS ||
Stacey Greenaway Managing Reputation and Trust in Peer-to-Peer Networks. CP4022 Research Topics in Networks and Distributed Systems. Assessment 2 Stacey.
What is Commerce? “Seller” “Buyer” Transaction Basic Computer Concepts
Reputation Prakash Kolan Liqin Zhang Venkatesh Kancherla.
Consumer Behavior, Market Research
Agent Reputation and Trust (ART) Testbed Craig Dillabaugh Fullam, K., T. Klos, G. Muller, J. Sabater, A. Schlosser,
Chapter 20: Social Service Selection Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
Social Networking and On-Line Communities: Classification and Research Trends Maria Ioannidou, Eugenia Raptotasiou, Ioannis Anagnostopoulos.
Link Recommendation In P2P Social Networks Yusuf Aytaş, Hakan Ferhatosmanoğlu, Özgür Ulusoy Bilkent University, Ankara, Turkey.
Free-riding and incentives in P2P systems name:Michel Meulpolder date:September 8, 2008 event:Tutorial IEEE P2P 2008.
1 GossipTrust for Fast Reputation Aggregation in Peer-to-Peer Networks Runfang Zhou, Kai Hwang, and Min Cai University of Southern California IEEE Transaction.
Chapter 9: Cooperation in Intrusion Detection Networks Authors: Carol Fung and Raouf Boutaba Editors: M. S. Obaidat and S. Misra Jon Wiley & Sons publishing.
Yitzchak Rosenthal P2P Mechanism Design: Incentives in Peer-to-Peer Systems Paper By: Moshe Babaioff, John Chuang and Michal Feldman.
Marketing Management Online marketing
Artificial Intelligence Techniques Internet Applications 1.
Trustworthiness Management in the Social Internet of Things
The EigenTrust Algorithm for Reputation Management in P2P Networks
Sunilkumar S. Manvi and P. Venkataram Protocol Engineering and Technology Unit, ECE Dept. Indian Institute of Science Bangalore, , INDIA
Chengjie Sun,Lei Lin, Yuan Chen, Bingquan Liu Harbin Institute of Technology School of Computer Science and Technology 1 19/11/ :09 PM.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
The roots of innovation Future and Emerging Technologies (FET) Future and Emerging Technologies (FET) The roots of innovation Proactive initiative on:
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Enabling Peer-to-Peer SDP in an Agent Environment University of Maryland Baltimore County USA.
Collaborative Information Retrieval - Collaborative Filtering systems - Recommender systems - Information Filtering Why do we need CIR? - IR system augmentation.
Examining Dynamic Trust Relationships in Autonomy-Oriented Partner Finding Department of Computer Science, HKBU, HK International WIC Institute, BJUT,
An IP Address Based Caching Scheme for Peer-to-Peer Networks Ronaldo Alves Ferreira Joint work with Ananth Grama and Suresh Jagannathan Department of Computer.
By Gianluca Stringhini, Christopher Kruegel and Giovanni Vigna Presented By Awrad Mohammed Ali 1.
E-Commerce Prof. Ir. Kudang B. Seminar, MSc, PhD Direktur Komunikasi & Sistem Informasi IPB Bogor, 12 Nopember 2008.
Consumer Behavior and Loyalty. Electronic CommercePrentice Hall © Learning about Consumer Behavior Online A Model of Consumer Behavior Online –The.
Chapter 20: Social Service Selection Service-Oriented Computing: Semantics, Processes, Agents – Munindar P. Singh and Michael N. Huhns, Wiley, 2005.
The EigenTrust Algorithm for Reputation Management in P2P Networks
Stefanos Antaris A Socio-Aware Decentralized Topology Construction Protocol Stefanos Antaris *, Despina Stasi *, Mikael Högqvist † George Pallis *, Marios.
A Simulation Study of P2P File Pollution Prevention Mechanisms Chia-Li Huang, Polly Huang Network & Systems Laboratory Department of Electrical Engineering.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Recommendation Algorithms for E-Commerce. Introduction Millions of products are sold over the web. Choosing among so many options is proving challenging.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
The EigenTrust Algorithm for Reputation Management in P2P Networks Sepandar D.Kamvar Mario T.Schlosser Hector Garcia-Molina.
Trusted P2P Transactions with Fuzzy Reputation Aggregation Authors: S. song, K. Hwang, and R. Zhou University of Southern California Yu-Kwong Kwok University.
Paper Study – Propagation of Trust in E-commerce Communities, and others YuanDa Cao (曹元大), etc. Beijing Institute of Technology Presented by Vincent Dec/2004.
Don’t Follow me : Spam Detection in Twitter January 12, 2011 In-seok An SNU Internet Database Lab. Alex Hai Wang The Pensylvania State University International.
Sybil Attacks VS Identity Clone Attacks in Online Social Networks Lei Jin, Xuelian Long, Hassan Takabi, James B.D. Joshi School of Information Sciences.
Decentralized Trust Management for Ad-Hoc Peer-to-Peer Networks Thomas Repantis Vana Kalogeraki Department of Computer Science & Engineering University.
Collaborative Filtering: Searching and Retrieving Web Information Together Huimin Lu December 2, 2004 INF 385D Fall 2004 Instructor: Don Turnbull.
SREC: A Social Behaviour Based Recommender for Online Communities
The Beta Reputation System
E-Commerce Theories & Practices
Kostas Kolomvatsos, Christos Anagnostopoulos
Presentation transcript:

Different methods and Conclusions Liqin Zhang

Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks

Rating systems Reputation is taken to be a function of the cumulative positive or negative rating for a seller or buyer Rating model – Uniform context environment: heard rating from one agent – Multiple context environment: from multiple agents Centrality-based rating: based on in/out degree of a node Preference-based rating: Consider the preferences of each member when selecting the reputable members Bayesian estimate rating: to compute reputation with recommendation of different context

Basic models: Computational model – Based on how much deeds exchanged Collaborative model – Based on recommendation from similar tasted people

Computational model[2]: If Reputation increase, trust increase If trust increase, reciprocity increase If reciprocity increase, reputation increase Reputation Net benefitReciprocityTrust Reciprocity: mutual exchange of deeds

A Collaborative reputation mechanism: Collaborative filtering – To detect patterns among opinions of different users – Make recommendation based on rating of people with similar taste Fake rating: – 1. Rate more than once – 2. Fake identity – Solve: rating from people with high reputation in network weighted more

Reputation model in peer-to-peer[11] P2P network: – peers cooperate to perform a critical function in a decentralized manner – Peers are both consumers and providers of resources – Peers can access each other directly Allow peers to represent and update their trust in other peers in open networks for sharing files

Models in peer-to-peer networks Based on recommendation from other peers – Combine with Bayesian network Based on global trust value

Method 1: Reputation based on recommendation [11]

Recomendation from different kind of peers – Different weight – Update reference’s weight Final reputation and trust is computed based on Bayesian network Solve: reputation on different aspects of a peer

Method2: based on global trust value ---Eigen Trust Algorithm[12] Decreases the number of downloads of unauthenticated files in a peer-to-peer file sharing network by assigning a unique global trust value A distributed and secure method to compute global trust values based on power iteration Peers use these global trust values to choose the peers from whom they download and share files

Reputation – Peer to Peer N/w Limited Reputation Sharing in P2P Systems[14] – Techniques based on collecting reputation information which uses only limited or no information sharing between nodes. – Effect of limited reputation information sharing in a peer-to- peer system. Efficiency Load distribution and balancing Message traffic

Reputation models in Social networks[3~10] Social network: – a representation of the relationships existing within a community Each node provide both services and referrals for services to each other

Importance of the nodes Proposal 1: all nodes are equal important Proposal 2: some nodes are important than others – Referrals from A, B, C,D,E is more important than those nodes in only local network – pivot – You may trust the referral from a friend of you than strangers – You may also need consider the your preference regarding to referral

Models in social network Reputation extracting model: – Ranking the reputation for each node in network based on their location Social ReGreT model: – Based on information collected from three dimension

Reputation models in Social networks Extracting Reputation in Multi agent systems[8] – Feedback after interaction between agents – Also consider the position of an agent in social network Node ranking: creating a ranking of reputation ratings of community members – Based on the in-degree and out-degree of a node (like Pagerank)

Reputation models in Social Networks: Social ReGreT[5]: – Analysis social relation – To identify valuable features in e-commerce – Aimed to solve the problem of referrer’s false, biased or incomplete information – Based on three dimensions of reputation If use only interaction inf. --- individual dimension(single) If also use inf. from others --- social dimension (multiple) Three dimension: – Witness reputation: from pivot agents – Neighborhood reputation: – System reputation: default reputation value based on the role played by the target agent

Conclusions Reputation is very important in electronic communities Reputation can have different notation such as “general estimate a person”, “perception that an agent has of another’s intentions and norms”… Reputation systems can be grouped according to the nature of information they give about the object of interest and how the rating is generated, 4 reputation systems are discussed

Conclusions Reputation can be classified to individual and group reputation, individual reputation can be further classified The challenge for reputation includes less feedback, negative feedback, un-honesty feedback (change name), context and location awareness An agent can be honesty, malicious, evil, selfish Discussed 7 metrics with benchmarks

Conclusions: Comparison methods Basic models: – Computation model based on how much deeds exchanged Can be used in P2P and Social network Doesn’t consider references/recommendation, weight of deeds – Collaborative model Based on the recommendation from similar tasted people Recommendation is weighted based on referrer’s reputation – avoid fake recommendation Doesn’t consider the location of referrer

Conclusions: Comparison methods In P2P network, – Bayesian network model: Based on information collected from “friends” Peers share recommendations It allows to develop different trust regarding to different aspects of the peers’ capability Overall trust need combine all aspect Doesn’t consider location

Conclusions: Comparison methods In social network: – Can consider the position of an agent, Pivot agents are more important than other agents – NodeRanking: Ranking the reputation in social network based on position Used to find the pivot – Social ReGreT model: Consider three dimension: – Witness –pivot node – Neighborhood recommendation – System value

Conclusions: The reputation computation need consider recommendation of “friends”, the position of the referrer, weight for referrer “friends” may refer to its neighborhood, or the group of people who has the similar taste, or people you trust Weight for referrer can avoid fake recommendation No models consider all of the factors

References [1]. Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks, computational%20models%20of%20trust%20and%20reputation.pdf [2]. A computation model of Trust and Reputation, [3]. Trust and Reputation Management in a Small-World Network, ICMAS Proceedings of the Fourth International Conference on MultiAgent Systems (ICMAS-2000), 2000 [4]. How Social Structure Improves Distributed Reputation Systems, [5]. Social ReGreT, a reputation model based on social relations, ACM SIGecom Exchanges Volume 3, Issue 1 Winter, 2002,Pages: 44 – 56 [6]. Detecting deception in reputation management, Proceedings of the second international joint conference on Autonomous agents and multiagent systems, 2003

References [7]. Finding others online: reputation systems for social online spaces, Proceedings of the SIGCHI conference on Human factors in computing systems: Changing our world, changing ourselves, 2002, Pages: [8]. J. Pujol and R. Sanguesa and J. Delgado, Extracting reputation in multi- agent systems by means of social network topology, In Proceedings of First International Joint pages , 2002 [9]. J. Sabater and C. Sierra,Reputation and social network analysis in multi- agent systems, Proceedings of the first international joint conference on Autonomous agents and multiagent systems: P475 – 482,2002 [10]. Trust evaluation through relationship analysis, Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems,P1005 – 1011, 2005 [11] Trust and Reputation model in peer-to-peer networks, yaw181/publications/120_wang_y.pdf

References [12] S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The Eigen Trust algorithm for reputation management in p2p networks. In Proceedings of the Twelfth International World Wide Web Conference, [13] Lars Rasmusson and Sverker Jansson, “Simulated social control. for secure internet commerce,” in New Security Paradigms ’96. September 1996 [14] S. Marti, H. Garcial-Molina, Limited Reputation Sharing in P2P Systems, ACM Conference on Electronic Commerce (EC'04) [15] Lik Mui, Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks, Ph. D Dissertation, Massachusetts Institute of Technology [16] Goecks, J. and Mynatt E.D. (2002). Enabling privacy management in ubiquitous computing environments through trust and reputation systems. Workshop on Privacy in Digital Environments: Empowering Users. Proceedings of CSCW 2002

References [17] G.L. Rein, Reputation Information Systems: A Reference Model, Proceedings of the 38th Hawaii International Conference on System Sciences