Trust-Aware Information Dissemination in Social Network

Article Preview

Abstract:

Information dissemination security is a crucial factor for social network interaction. In this paper, we present a trust-aware information dissemination algorithm for social network in order to make the nodes transmitting more trustable information. Firstly, we propose information trust computation from two aspects: entity trust of information and source trust. Two above aspects can be integrated into whole trust of information. Likewise, we propose the trust relationship comutation method among nodes. Further, we present a multiple paths trust computation method (MPTC) for information dissmination in social network. Then, we address the trust-aware information dissemination algorithm (TIDA) based on above trust computaiton. Finally, our experiments show that TIDA is a feasible and effective solution for social network information dissemination.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

2400-2404

Citation:

Online since:

October 2011

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2012 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

[1] Wing S. Chow, Lai Sheung Chan. Social network, social trust and shared goals in organizational knowledge sharing, Information & Management, Volume 45, Issue 7, (2008), Pages 458-465.

DOI: 10.1016/j.im.2008.06.007

Google Scholar

[2] Ralph Gross. Information revelation and privacy in online social networks, Proceedings of the 2005 ACM workshop on Privacy in the electronic societyNew York, NY, USA, (2005).

DOI: 10.1145/1102199.1102214

Google Scholar

[3] Cristiano Castelfranchi, Rino Falcone, Francesca Marzo. Being Trusted in a Social Network: Trust as Relational Capita, Lecture Notes in Computer Science, Volume 3986/2006, 19-32(2006).

DOI: 10.1007/11755593_3

Google Scholar

[4] A. Boukerch, L. Xu, K. EL-Khati. Trust-based security for wireless ad hoc and sensor networks, Computer Communications 30 (2007) 2413–2427.

DOI: 10.1016/j.comcom.2007.04.022

Google Scholar

[5] J. Golbeck and J. Hendler. Reputation network analysis for email filtering. In CEAS 2004, 1st Conference on Email and Anti-Spam, Mountain View, CA, (2004).

Google Scholar

[6] Gil, Y., & Ratnakar, V. (2002). Trusting information sources one citizen at a time. International Semantic Web Conference (pp.162-176). Sardinia, Italy.

DOI: 10.1007/3-540-48005-6_14

Google Scholar

[7] Kamvar, S., Schlosser, M., & Garcia-Molina, H. (2003). The EigenTrust algorithm for reputation management in P2P networks. Proceedings of the Twelfth International World Wide Web Conference.

DOI: 10.1145/775152.775242

Google Scholar

[8] Wang Y, Vassileva J. Bayesian network trust model in peer-to-peer networks. In: Moro G, ed. Proc. of the 2nd Int'l Workshop on Agents and Peer-to-Peer Computing. Berlin: Springer-Verlag, 2004. 23−34.

DOI: 10.1007/978-3-540-25840-7_3

Google Scholar

[9] M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In Proceedings of the Second International Semantic Web Conference, 2003, pages 351—368.

DOI: 10.1007/978-3-540-39718-2_23

Google Scholar

[10] M. Richardson and P. Domingos. The intelligent surfer: Probabilistic combination of link and content information in PageRank. In Proceedings of Advances in Neural Information Processing Systems 14, Cambridge, Massachusetts, Dec. (2002).

Google Scholar

[11] Bo Zhang, Yang Xiang. Integrated Trust Computation in Semantic Web, Proceeding of IEEE International Conference on Integration Technology, 2007. 3: 668-672.

DOI: 10.1109/icitechnology.2007.4290403

Google Scholar

[12] Ripeanu, M Iamntichi. Mapping the Gnutella network: Properties of Internet topology. In: ACM SIGCOMM'99. Cambridge, 1999, 251 – 262.

Google Scholar

[13] Freenet website. http: /freenet. sourceforge. net.

Google Scholar