Bayesian Network-Based Trust Model in Peer-to-Peer Networks

Size: px
Start display at page:

Download "Bayesian Network-Based Trust Model in Peer-to-Peer Networks"

Transcription

1 Bayesian Network-Based Trust Model in Peer-to-Peer Networks Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, SK, S7N 5A9, Canada {yaw181, ABSTRACT In is paper, we first review trust and reputation mechanisms from different perspectives. Then we propose a Bayesian network-based trust model and a meod for building reputation based on recommendations in peer-to-peer networks. Since trust is multi-faceted, peers need to develop differentiated trust in different aspects of oer peers capability. The peer s needs are different in different situations. Depending on e situation, a peer may need to consider its trust in a specific aspect of anoer peer s capability or in multiple aspects. Bayesian networks provide a flexible meod to present differentiated trust and combine different aspects of trust. Keywords Peer-to-peer networks, trust, reputation, Bayesian networks 1. Introduction Peer-to-peer networks are networks in which all peers cooperate wi each oer to perform a critical function in a decentralized manner [10]. All peers are bo consumers and providers of resources and can access each oer directly wiout intermediary agents. Compared wi a centralized system, a peer-to-peer (PP) system provides an easy way to aggregate large amounts of resources residing on e edge of Internet or in ad-hoc networks wi a low cost of system maintenance. PP systems have attracted increasing attention from researchers recently, but ey also bring up some problems. Since peers are heterogeneous, some peers might be benevolent in providing services. Some might be buggy and cannot provide services as ey advertise. Some might be malicious by providing bad services. Since ere is no centralized node to serve as an auority to supervise peers behaviors and punish peers at behave badly, malicious peers have an incentive to harm oer peers to get more benefit because ey can get away. Some traditional security techniques, such as service providers requiring access auorization, or consumers requiring server auentication, are used as protection from known malicious peers. However, ey cannot prevent from peers providing variable-quality service, or peers at are unknown. Mechanisms for trust and reputation can be used to help peers distinguish good from bad partners. This paper describes a trust and reputation mechanism at allows peers to discover partners who meet eir individual requirements, rough individual experience and sharing experiences wi oer peers wi similar preferences. The rest of is paper is organized as follows: section reviews trust and reputation mechanisms from different perspectives. Section 3 introduces our approach to developing a Bayesian network-based trust model and a meod for building reputation based on recommendations. The experiment design and results are presented in Section 4 and 5. Section 6 discusses related work on trust and reputation. In e last section, we present conclusions and directions for future work.. Trust and Reputation Trust and reputation mechanisms have been proposed for large open environments in e-commerce, distributed computing, recommender systems. Agents are often used to manage and reason about trust and reputation. However, ere is no universal agreement on e definition of trust and reputation in e multiagent system research community..1 Definitions and Characteristics In is paper, we adopt e following working definitions: Trust an agent s belief in anoer agent s capabilities, honesty and reliability based on its own direct experiences; Reputation an agent s belief in anoer agent s capabilities, honesty and reliability based on recommendations received from oer agents. Reputation can be centralized, computed by a trusted ird party, like a Better Business Bureau; or it can be decentralized, computed independently by each agent after asking oer agents for recommendations. Alough trust and reputation are different in how ey are developed, ey are closely related. They are bo used to evaluate an agent s trustworiness, so ey also share some common characteristics [1, 11, and 16]. Context specific. Trust and reputation bo depend on some context. For example, Mike trusts John as his doctor, but he does not trust John as a mechanic who can fix his car. So in e

2 context of seeing a doctor, John is trustwory. But in e context of fixing a car, John is untrustwory. Multi-faceted. Even in e same context, ere is a need to develop differentiated trust in different aspects of e capability of a given agent. The same applies for reputation. For instance, a customer might evaluate a restaurant from several aspects, for example, e quality of food, e price, and e service. For each aspect, she develops a kind of trust. The overall trust depends on e combination of e trusts in each aspect. While e context-specificity of trust accentuates at trust in an identical agent can be different in different situations, e characteristic, multi-faceted, emphasizes at trust has multiple aspects, which can play a role in deciding wheer an agent is trustwory to interact wi. Dynamic. Trust and reputation increase or decrease wi furer experience (direct interaction). They also decay wi time. Despite different contexts, trust can be broadly categorized by e relationships between e two involved agents [7]. Trust between a user and her agent(s) When a (personal) agent represents a human user, ere could be cases at e agent does not act as its user expects [18]. How much a user trusts her agent determines how she delegates her tasks to e agent. Trust in service provider. It measures wheer a service provider can provide trustwory services. The quality of service is e main concern in is case. Trust in references References refer to e agents at make recommendations or share eir trust values. It measures wheer an agent can provide reliable recommendations. It emphasizes e similarity in preferences and ways of judging issues between two agents. The more similar e two agents, e more ey trust each oer in making recommendations. It is important for an agent to develop trust in oer agents as references in a decentralized system, since when an agent is not sure about e trustworiness of a service provider,, it can ask for recommendations only ose few agents at it trusts most instead of asking a large number of agents, which not only helps e agent get more reliable recommendations, but also saves time and communication costs. Trust in groups An agent can trust a group of oer agents [6, 8, 1, and 19]. By modeling trust in different groups, an agent can decide to join a group at can bring it most benefit [19]. Hales [8] points at group reputation can be a powerful mechanism for e promotion of beneficent norms under e right conditions. This kind of trust is also useful in helping an agent judge anoer agent according to its trust in e group at e oer agent belongs to.. Centralized vs. Decentralized Trust and reputation mechanisms have been implemented in many systems adopting eier a centralized structure or a decentralized structure. Accordingly, e trust and reputation mechanisms used in e two kinds of systems are also different. In centralized systems, such as in ebay and onsale, which are mainly seen in e area of e-commerce, e trust and reputation mechanisms are relatively simple and have some common characteristics. A centralized node acts as e system manager responsible for collecting ratings from bo sides involved in an interaction. Agents reputations are public and global. The reputation of an agent is visible to all e oer agents. Agents reputations are built by e system. There is no explicit trust model between agents. Less communication is required between agents. An agent only communicates wi e centralized node to find out e oer agents reputations. Despite e simplicity of e centralized reputation mechanisms, empirical results show ese systems do encourage transactions between sellers and buyers. But ere are some problems. One problem is at agents are usually reluctant to give negative ratings because ey can see each oer s ratings and are afraid of revenges [15]. Anoer problem is at if an agent has a bad reputation, it can discard its old identity, choose a new one and start as a beginner, getting rid of its poor reputation. The ird problem is at agents can increase eir reputations artificially by creating fake identities and having em to give emselves high ratings [4]. The trust and reputation mechanisms used in decentralized systems, for example, peer-to-peer networks, are more complex an ose applied in centralized systems. They have e following characteristics [, 3, and 5]: There is no centralized system manager to govern trust and reputation. Subjective trust is explicitly developed by each agent. Each agent is responsible for developing its own trust in oer agents based on eir direct interactions. No global or public reputation exists. If agent A wants to know agent B s reputation, it has to proactively ask oer agents for eir evaluations of B, en synesize e ratings togeer to compute agent B s reputation. The reputation of agent B developed by A is personalized because agent A can choose which agents it will ask for evaluations of B, its trustwory friends or all known agents. Agent A can also decide how to combine e collected evaluations togeer to

3 get agent B s reputation. For example, it can only combine e evaluations coming from trusted agents. Or it can weight differently e evaluations from trusted agents, unknown agents and even untrustwory agents when it combines em togeer. A lot of communication is required between agents to exchange eir evaluations. In decentralized systems, agent A can get agent B s reputation based on its own knowledge of e trufulness of agents at make recommendations for agent B. So it is difficult for agent B to increase its reputation artificially. Since only agent A can see e recommendations, e references can express eirs feelings trufully, not worried about potential revenges. But e tradeoff is at agents have to conduct a lot of communication and computation..3 Application Areas Trust and reputation was first used in e-commerce systems to encourage transactions between strangers. The use of trust and reputation has extended to oer areas, including peer-to-peer networks, which involve a lot of uncertainty about e reliability of bo sides of interactions. E-commerce. ebay and onsale are e most famous e-commerce systems using reputation management mechanisms to help people find trustwory partners to interact wi [17]. They accumulate feedback from bo sides of each interaction and publish buyers and sellers reputations.. Users wi bad reputations will be punished because no one would like to interact wi em furer. Studies on ebay have shown at its reputation system does work and encourages interactions. Anoer application example is at trust can be used to help forming long-term coalitions consisting of customers and vendors who have compatible preferences and interests [19]. The mechanism for forming long-term coalitions suggests ree strategies to help customers and vendors decide which coalition to join: an individually oriented strategy and two socially oriented strategies. The individually oriented strategy is at a customer or vendor prefers to be in e coalition wi e vendor or customer who she trusts most. Socially oriented strategies refer to e strategies at a customer or vendor prefers to join e coalitions at she trusts most. The trust in a coalition could be a function of e cumulative trust for each member in e coalition, or a function of e number of trustwory partners in e coalition. Distributed Computing In distributed computing, security is one major concern in resource sharing. Azzedin and Maheswaran [3] propose a behavior trust model in e grid computing to help resource providers and consumers interact wi each oer more safely. The behavior trust is built on past experiences and is e result of combining togeer direct trust based on direct experiences and reputation (objective trust) based on recommendations. File Sharing PP System Cornelli [5] proposes a robust reputation mechanism in Gnutella to prevent some well-known security reats to reputation-based systems, for example, an attack by forging witnesses at give high ratings. In is approach, e reputation manager, a component of each Gnutella servant, will verify e existence of each witness by a direct connection. Information Filtering Montaner and L opez [11] suggest an opinion-based information filtering meod rough trust. Agents build eir initial trust according to e similarity between eir opinions about some common items. When discovering a new item, ey will ask eir trusted friends to make recommendations for it, en combine eir recommendations togeer and finally decide wheer to recommend e new item to e user. 3. Bayesian Network-Based Trust Model There is a lot of research on reputation [4, 1,, 3], but e study of trust has not received enough attention. 3.1 Trust Model In our model an agent builds two kinds of trust in anoer agent, say agent A and agent B respectively. The first one is e trust at agent A has in agent B s competence in providing services. The oer is e trust at agent A has in agent B s reliability in providing recommendations about oer agents. Here e reliability includes two aspects: Trufulness wheer agent B is truful in telling its information Similarity wheer agent B is similar to agent A in preferences and ways of judging issues. Reliability = Trufulness? Similarity, i.e. an agent B s reliability as a reference depends on bo being truful and similar in its preferences to e agent requesting e reference. Since agents are heterogeneous, ey may have different preferences and judge issues by different criteria. For example, some agents may consider a movie provider good because it provides movies wi high quality, while oers may consider e movie provider bad because e speed of download from it is very slow. If two agents A and B are similar in eir evaluation criteria, agent A can trust agent B s recommendations, if it knows at agent B is truful. However, if e agents have different evaluation criteria, agent A cannot trust agent B s recommendations even when agent B tells e tru. In e implementation of such a system based on trust and reputation, some issues have to be considered. 1) How does an agent model its user? The user ultimately sets e criteria by which an agent evaluates oer agents. Each

4 user has different preferences and ways of judging e quality of interaction. In order to act as its user wants, an agent has to keep learning its user s preferences and behaviors. If an agent fails to do as what its user expects, it will be useless. ) How is an interaction to be evaluated? Trust is built on e agent s direct interactions wi oer agents. For each interaction, e agent s degree of satisfaction of e interaction will directly influence its trust in e oer agent involved in e interaction. Usually, an interaction has multiple aspects and can be judged from different points of view. 3) How does an agent update its trust in anoer agent? 4) When will an agent ask for recommendations about anoer agent at it is going to interact wi? 5) How does an agent combine togeer e recommendations for a given agent coming from different references? Since e recommendations might come from trusted agents, nontrusted agents or strangers, an agent has to decide how to deal wi em. 6) How does an agent decide wheer anoer agent is trustwory to interact wi or not, according to its direct experiences or reputation, or bo? 7) How does an agent develop and update its trust in a reference at makes recommendations? 8) How many kinds of trust does an agent need to develop wi anoer agent in a single context? In most situations, agents need to develop multiple trust relationships wi each oer in order to evaluate each oer from different perspectives. For example, agent A might trust agent B in providing music files wi good quality. But agent A might not trust agent B in offering movie files wi e same quality as music files. 9) How does an agent decide whom to ask for recommendations? It can query all known agents, randomly selected few agents to query, or just its most trusted agents. Our approach will deal wi all e issues above except e first one, which is beyond our scope, alough it is important in e case when e agent is acting directly on user s behalf. We will use a peer-to-peer file sharing application as an example in e discussion, however e meod is general and can be applied to oer applications, like web-services, e-commerce, recommender systems or peer-to-peer distributed computing. In e area of file sharing in peer-to-peer networks, all e peers are bo providers and users of shared files. Each peer plays two roles, e role of file provider offering files to oer peers and e role of user searching and downloading files provided by oer peers. In order to distinguish e two roles of each peer, in e rest of paper, when a peer acts as a file provider, we call it file provider; oerwise, we call it simply agent. Agents will develop two kinds of trust, e trust in file providers competence (in providing files) and e trust in oer agents reliability in making recommendations. We assume all e agents are truful in telling eir evaluations. However, e agents may have different ways of evaluating oer agents performance, which reflects different user preferences. 3. Trust in a File Provider s Competence In a peer-to-peer network, file providers capabilities are not uniform. For example, some file providers may be connecting rough a high-speed network, while oers connect rough a slow modem. Some file providers might like music, so ey share a lot of music files. Some may be interested in movies and share more movies. Some may be very picky about file quality, so ey only keep and share files wi high quality. Therefore, e file provider s capability can be presented in various aspects, such as e download speed, file quality and file type (see Figure 1). DS Trust in a FP T FQ FT Download speed File Quality File Type Figure 1. A Bayesian Network Model The agent s needs are also different in different situations. Sometimes, it may want to know e file provider s overall capability. Sometimes it may only be interested in e file provider s capability in some particular aspect. For instance, an agent wants to download a music file from a file provider. At is time, knowing e file provider s capability in providing music files is more valuable for e agent an knowing e file provider s capability in providing movies. Agents also need to develop differentiated trust in file providers capabilities. For example, e agent who wants to download a music file from e file provider cares about wheer e file provider is able to provide e music file wi good quality at a fast speed, which involves e file provider s capabilities in two aspects, quality and speed. How does e agent combine its two separated trust representations togeer, e trust in e file provider s capability in providing music files wi good quality and e trust in e file provider s capability in providing a fast download speed, in order to decide wheer e file provider is trustwory or not? A Bayesian network provides a flexible meod to solve e problem. It is a relationship network at uses statistic meods to represent probability relationships between different values. Its eoretical foundation is e Bayes rule [14].

5 p ( h e) = p( e h). p( h) p( e) p(h) is e prior probability of hypoesis h; p(e) is e prior probability of evidence e; p(h e) is e probability of h given e; p(e h) is e probability of e given h. We will use a simple Bayesian network, a naïve Bayesian network, to represent e trust between an agent and a file provider, which is composed of a root node and several leaf nodes (see Figure 1). Every agent develops a naive Bayesian network for each file provider at it has interacted wi. Each Bayesian network has a root node T, which has two values, satisfying and unsatisfying, denoted by 1 and 0, respectively. p( represents e value of agent s overall trust in e file provider s competence in providing files. It is e percentage of interactions at are satisfying and measured by e number of satisfying interactions, m, divided by e total number of interactions, n. p(t = 0) is e percentage of not satisfying interactions. m p ( = n p ( + p( T = 0) = 1 The leaf nodes under e root node represent e file provider s capability in different aspects. Each leaf node is associated wi a conditional probability table (CPT). The node, denoted by FT, represents e set of file types. Suppose it includes five values, Music, Movie, Document, Image and Software. Its CPT is showed in table 1. It includes two columns of values. Each column follows one constraint, which corresponds to one value of e root node. The sum of values of each column is 1. Table 1. The CPT of Node FT T = 1 T = 0 Music p ( FT = " Music" p ( FT = " Music" T = 0) Movie p ( FT = " Movie" p ( FT = " Movie" T = 0) Document p ( FT = " Docu" p ( FT = " Docu" T = 0) Image p ( FT = "Im age" p ( FT = "Im age" T = 0) Software p ( FT = " Soft" p ( FT = " Soft" T = 0) p( FT = " Music" is e conditional probability wi e condition at an interaction is satisfying. It measures e probability at e file involved in an interaction is a music file, given e interaction is satisfying. It can be computed according to e following formula: p ( FT = " Music" = p( FT = " Music", p( (1) p ( FT = " Music", is e probability at interactions are satisfying and files involved are music files. m1 p( FT = " Music", = n m1 is e number of satisfying interactions when files involved are music files. p ( FT = " Music" T = 0) denotes e probability at e files are music files, given at e interactions are not satisfying. The probabilities for oer file types in Table 1 are computed in a similar way. Node DS denotes e set of download speeds. It has ree items, Fast, Medium and Slow, each of which covers a range of download speed. Node FQ denotes e set of file qualities. It also has ree items, High, Medium and Low. Its CPT is similar to e one in table 1. Here we only take ree aspects of trust into account. More relevant aspects can be added in e Bayesian network later to account for user preferences wi respect to service. Once getting nodes CPTs in a Bayesian network, an agent can compute e probabilities at e corresponding file provider is trustwory in different aspects by using Bayes rules, such as p ( T = 1 FT = " Music") e probability at e file provider is trustwory in providing music files, p ( T = 1 FQ = " High" ) e probability at e file provider is trustwory in providing files wi high quality, p ( T = 1 FT = " Music", FQ = " High" ) e probability at e file provider is trustwory in providing music files wi high quality. Agents can set various conditions according to eir needs. Each probability represents trust in an aspect of e file provider s competence. Wi e Bayesian networks, agents can infer trust in e various aspects at ey need from e corresponding probabilities. That will save agents much effort in building each trust separately, or developing new trust when conditions change. After each interaction, agents update eir corresponding Bayesian networks. 3.3 Evaluation of an Interaction Agents update eir corresponding Bayesian networks after each interaction. If an interaction is satisfying, m and n are bo increased by 1 using formula (1). If it is not satisfying, only n is increased by 1. Two main factors are considered when agents judge an interaction, e degree of eir satisfaction wi e download speed s ds and e degree of eir satisfaction wi e quality of downloaded file s fq. The overall degree of agents satisfaction wi an interaction s is computed as e following: s = wds * sds + wfq * s fq, where w ds + w fq = 1 ()

6 w ds and w fq denote weights, which indicate e importance of download speed and e importance of file quality to a particular agent (depending on e user s preferences). Each agent has a satisfaction reshold s t. If s < st, e interaction is unsatisfying; oerwise, it is satisfying. r ij = w t * k tr il l= 1 k l= 1 tr * t il lj + w s * g g t zj z= 1, where w w = 1 (3) t + s 3.4 Handling Recommendations In file sharing peer-to-peer applications users find files by using e search function. In most situations, ey get a long list of providers for an identical file. If a user happens to select an unsuitable provider, who provides files wi bad quality or slow download speed, e user will waste time and effort. If is situation happens several times, e users will be frustrated. In order to solve e problem, we use e mechanism of trust and reputation. Once an agent receives a list of file providers for a given search, it can arrange e list according to its trust in ese file providers. Then e agent chooses e most trusted file providers in e top of e list to download files from. If e agent has no interactions or only a few interactions wi e file provider, it can ask oer agents to make recommendations for it. How e agent uses e reputation and its own trust to make a decision wi which file provider to interact is an open question (question 6 in section 3). Some agents may prefer to trust eir own experience and rely on eir trust even if ey had very few interactions wi e service provider. Oers may be more cautious and rely on e reputation of e service provider. The agent can send various recommendation requests according to its needs. For example, if e agent is going to download a movie, it may care about e movie s quality. Anoer agent may care about e speed. So e request can be Does e file provider provide movies wi good qualities?. If e agent cares bo about e quality and e download speed, e request will be someing like Does e file provider have files wi good quality at a fast download speed?. When oer agents receive ese requests, ey will check eir trust-representations, i.e. eir Bayesian networks, to see if ey can answer such questions. If an agent has downloaded movies from e file provider before, it will send recommendation at contains e value p ( T = 1 FT = " Music", FQ = " High") to answer e first request or e value p ( T = 1 FT = " Music", FQ = " High", DS = " Fast" ) to answer e second request. The agent might receive several such recommendations at e same time, which may come from e trustwory acquaintances, untrustwory acquaintances, or strangers. If e references are untrustwory, e agent can discard eir recommendations immediately. Then e agent needs to combine e recommendations from trustwory references and from unknown references to get e total recommendation for e file provider: r ij is e total recommendation value for e j file provider at e i agent gets. k and g are e number of trustwory references and e number of unknown references, respectively. tril is e trust at e i user has in e l trustwory reference. t lj is e trust at e j file provider. t zj is e trust at e has in j file provider. w t and l trustwory reference has in z unknown reference ws are e weights to indicate how e user values e importance of e recommendation from trustwory references and from unknown references. Since agents often have different preferences and points of view, e agent s trustwory acquaintances are ose agents at share similar preferences and viewpoints wi e agent most of time. The agent should weight e recommendations from its trustwory acquaintances higher an ose recommendations from strangers. Given a reshold θ, if e total recommendation value is greater an θ, e agent will interact wi e file provider; oerwise, not. If e agent interacts wi e file provider, it will not only update its trust in e file provider, i.e. its corresponding Bayesian network, but also update its trust in e agents at provide recommendations by e following reinforcement learning formula: n o trij = α * trij + (1 α) * eα (4) n tr ij denotes e new trust value at e i agent has in e o j reference after e update; tr ij denotes e old trust value. α is e learning rate c a real number in e interval [0,1]. e α is e new evidence value, which can be -1 or 1. If e value of recommendation is greater an θ and e interaction wi e file provider afterwards is satisfying, e α is equal to 1. If ere is a mismatch between e recommendation and e actual experience wi e file provider, e evidence is negative, so e α is -1. Anoer way to find if an agent is reliable in making recommendations is e comparison between two agents Bayesian networks relevant to an identical file provider. When agents are idle, ey can gossip wi each oer periodically, exchange and compare eir Bayesian networks. This can help em find oer agents who share similar preferences more accurately and faster. After each comparison, e agents will update eir trusts in each oer according e formula: n o trij = β * trij + (1 β) * eβ (5)

7 The result of e comparison e β is a number in e interval [-1, 1]. β is e learning rate a real number in e interval [0,1], which follows e constraint β > α. This is because e Bayesian network collectively reflects an agent s preferences and viewpoints based on all its past interactions wi a specific file provider. Comparing e two agents Bayesian networks is tantamount to comparing all e past interactions of e two agents. The evidence e α in formula (4) is only based on one interaction. The evidence e β should affect e agent s trust in anoer agent more an e α. How do agents compare eir Bayesian networks and how is e β computed? First, we assume all agents have e same structure of Bayesian networks. We only compare e values in eir Bayesian networks. Suppose agent 1 will compare its Bayesian network wi e corresponding Bayesian network of agent. Agent 1 gets e degree of similarity between e two Bayesian networks by computing e similarity of each pair of nodes (T, DS, FQ and FT), according to e similarity measure based on Clark s distance [1], and en combining e similarity results of each pair of nodes. 4 eβ = 1 * ( w 1i * ci ), where w 11 + w1 + w13 + w14 = 1 (6) i= 1 w 1 1, 1 c1 ( v1 11 v11) ( v11 v1) + ( v v11) ( v11 + v1) = (7) hi ( v1 ijl v ijl) ( 1 + ) = 1 = 1 = j v l ijl v ijl c i, where i =, 3, 4 (8) w, w 13 and w 14 are e weights of e node T, DS, FQ, and FT, respectively, related to agent 1, which indicate e importance of ese nodes in comparing two Bayesian networks. c 1, c, c 3 and c4 are e results of comparing agent 1 and agent s CPTs about node T, DS, FQ and FT. Since e node T is e root node and it has only one column in its CPT, while oer nodes (DS, FQ, FT) are e leaf nodes and have two columns of values in eirs CPTs, we compute c 1 differently from c, c 3, and c 4. hi denotes e number of values in e corresponding node. h = 3 ; h 3 = 3 ; h 3 = 5. v111 and v11 are e values of p(t = 1) and p(t = 0) related to agent 1. v11and v1 are e values of p( and p(t = 0) related to agent. v1 ijl and v ijl are e values in agent 1 s CPTs and agent s CPTs, respectively. The idea of is metric is at agents compute not only eir trust values, eir CPTs, but also take into account eir preferences (encoded as e weights, w 11, w 1, w 13, w 14 ). So agents wi similar preferences, such as e importance of file type, quality, download speed, will weight each oer s opinions higher. 4. Experiments In order to evaluate is approach, we developed a simulation of a file sharing system in a peer-to-peer network. The system is developed on e JADE.5. For e sake of simplicity, each node in our system plays only one role at a time, eier e role of file provider or e role of an agent. Every agent only knows oer agents directly connected wi it and a few file providers at e beginning. In Figure, e circles stand for agents and e rectangles denote file providers. Every agent has an interest vector. The interest vector is composed of five elements: music, movie, image, document and software. The value of each element indicates e streng of e agent s interests in e corresponding file type. The files e agent wants to download are generated based on its interest vector. Every agent keeps two lists. One is e agent list at records all e oer agents at e agent has interacted wi and its trust values in ese agents. The oer is e file provider list at records e known file providers and e corresponding Bayesian networks representing e agent s trusts in ese file providers. Each file provider has a capability vector showing its capabilities in different aspects, i.e. providing files wi different types, qualities and download speeds. P1 P8 P P9 P7 P10 P6 P3 P4 P5 Figure. The Network Structure FP1 FP FP3 FP4 FP5 Our experiments involve 10 different file providers and 40 agents. Each agent will gossip wi oer agents periodically to exchange eir Bayesian networks. The period is 5, which means after each 5 interactions wi oer agents, e agent will gossip once. w ds = w fq = 0.5; α = 0.3; β = 0.5; w 11 = w 1 = w 13 = w 14 = 0.5. The total number of interactions is We run each configuration for 10 times and use means for e evaluation criteria. 5. Results The goal of e first experiment is to see if a Bayesian networkbased trust model helps agents to select file providers at match better eir preferences. Therefore we compare e performance (in terms of percentage of successful recommendations) of a system consisting of agents wi Bayesian network-based trust models and a system consisting of agents (wiout Bayesian networks, BN) at represent general trust, not differentiated to different aspects. Successful recommendations are ose positive

8 recommendations (obtained based on formula 3) when agents are satisfied wi interactions wi recommended file providers. If an agent gets a negative recommendation for a file provider, it will not interact wi e file provider. We have two configurations in is experiment: Trust and reputation system wi BN: e system consists of agents wi Bayesian networks-based trust models at exchange recommendations wi each oer; Trust and reputation system wiout BN: e system consists of agents at exchange recommendations, but don t model differentiated trust in file providers; Figure 3 shows at e system using Bayesian networks performs slightly better an e system wi general trust in terms of e percentage of successful recommendations. Successfuk interactions(%) Trust and reputation system wi BN Trust and reputation system wiout BN Trust system wi BN Trust system wiout BN The number of interactions Figure 4. The Comparison of Four Systems Successful recommendation(% The number of interactions Figure 3. Trust and Reputation System wi BN vs. Trust and Reputation System wiout BN The goal of e second experiment is to see if exchanging recommendation values wi oer agents helps agents to achieve better performance (defined as e percentage of successful interactions wi file provider). For e reason, we compare four configurations: Trust and reputation system wi BN; Trust and reputation system wiout BN; Trust system wi BN: e system consists of agents wi Bayesian networks-based trust models, which don t exchange recommendations wi each oer; Trust system wiout BN: e system consists of agents at have no differentiated trust models and don t exchange recommendations wi each oer. Figure 4 shows at e two systems, where agents share information wi each oer, outperform e systems, where agents do not share information. The trust system using Bayesian networks is slightly better an e trust system wiout using Bayesian networks. There is an anomaly in e case when agents do not share recommendations, since in e end of e curve, e system wiout BN perform better an e system wi BN. This could be explained wi an imprecise BN due to insufficient experience. In some sense, an agent s Bayesian network can be viewed as e model of a specified file provider from e agent s personal perspective. In our experiments, we use a very simple naive Bayesian network, which can not represent complex relationships. In e real file-sharing system, e model of file providers might be more complex and required using a more complex Bayesian network. Our Bayesian network only involves ree factors. If we build a more complex Bayesian network and add more aspects into it, e system performance might be improved. 6. Discussion and Related work How many Bayesian networks can an agent afford to maintain to represent its trust in oer agents in e networks? It depends on e size of e network and e likelihood at agents have repeated interactions. Resnick [15] empirically shows at 89.0% of all seller-buyer pairs in ebay conducted just one transaction during a five-mon period and 98.9% conducted no more an four. This situation often happens in a very large network or in large e-commerce sites. Since ere are a large number of sellers and buyers, e chance at a buyer meets e same seller is rare. But if e kind of goods being transacted is only interesting to a small group of people, for example, collectors of ancient coins, e interactions about is kind of goods happen almost exclusively in a small group. So e probability at sellers and buyers have repeated interactions will be high, and ey will be able to build

9 trust in each oer by our meod. Our approach is useful in situations where two agents can repeatedly interact wi each oer. In a small-size network, ere is no doubt at our approach is applicable. For a large network, our approach is still suitable under e condition at e smallworld phenomenon happens. The small-world phenomenon was first discovered in e 1960ies by social scientists. Milgram s experiment showed at people in e U.S. are connected by a short (average leng of 6) chain of intermediate acquaintances. Oer studies have shown at people tend to interact wi oer people in eir small world more frequently an wi people outside. The phenomenon also happens in peer-to-peer networks. Jovanovic s work [9] proves at e small-world phenomenon occurs in Gnutella. It means at agents are inclined to get files from oer agents from a small sub-community. This small subcommunity often consists of agents at have similar preferences and viewpoints. Abdul-Rahman and Hailes [1] capture e most important characteristics of trust and reputation and propose e general structure for developing trust and reputation in a distributed system. Most of e later works in e area follow eir ideas, but in different application domain, such as [3, 5, 11]. Sabater and Sierra s work [16] extends e notion of trust and reputation into social and ontological dimensions. Social dimension means at e reputation of e group at an individual belongs to also influences e reputation of e individual. Ontological dimension means at e reputation of an agent is compositional. The overall reputation is obtained as a result of e combination of e agent s reputation in each aspect. Our approach integrates ese two previous works [1, 16], and applies em to file sharing system in peer-to-peer networks. Anoer difference between our work and Sabater and Sierra s work is at we use Bayesian networks to represent trusts in different aspects, oer an e structure of ontology. Anoer difference is at we do not treat e differentiated trusts as compositional. Usually e relationship between different aspects of an agent is not just compositional, but complex and correlative. Our approach provides an easy way to present a complex and correlative relationship. Our approach is also flexible in inferring e trust of an agent for different needs. For example, sometimes we care about e overall trust. Sometimes we only need to know e trust in some specific aspect. This bears parallel wi work on distributed user modeling and purpose-based user modeling [13, 0]. Cornelli s work [5] is also in e area of file sharing in peer-to-peer networks. However, it concentrates on how to prevent e attacks to e reputation system and does not discuss how agents model and compute trust and reputation. 7. Conclusions In is paper, we first review trust and reputation mechanisms from different perspectives. Then we propose a Bayesian network-based trust model and a meod for building reputation based on recommendations in peer-to-peer networks. Bayesian networks provide a flexible meod to present e differentiated trust and combine different aspects of trust. In order to evaluate our approach, we developed a simulation of a file sharing system in a peer-to-peer network. Our experiments show at e system where agents communicate eir experiences (recommendations) outperforms e system where agents do not communicate wi each oer and at a differentiated trust adds to e performance in terms of percentage of successful interactions. Future work includes adding more aspects in e Bayesian networks, trying to find e key parameters at influence e system performance, and testing e system under oer performance measures, for example, how fast an agent can locate a trustwory service provider. Applying is approach to peer-topeer systems for computational services is particularly promising. Acknowledgements We are grateful to anonymous reviewers for eir feedbacks. This research is funded by NSERC Individual Discovery Grant to e second auor. References [1] Abdul-Rahman A. and Hailes S. Supporting trust in virtual communities. In Proceedings of e Hawai i International Conference on System Sciences, Maui, Hawaii, Jan [] Abdul-Rahman A. and Hailes S. A Distributed Trust Model. In Proceedings of e 1997 New Security Paradigms Workshop, ACM, [3] Azzedin F. and Maheswaran M. Evolving and Managing Trust in Grid Computing Systems. IEEE Canadian Conference on Electrical & Computer Engineering (CCECE '0), May 00. [4] Carter J., Bitting E. and Ghorbani A. Reputation Formalization for An Information-Sharing Multi-Agent System, Computational Intelligence, Volume 18, Number 4, November 00. [5] Cornelli F. and Damiani E. Implementing a Reputation- Aware Gnutella Servent. In Proceedings of e International Workshop on Peer-to-Peer Computing, Pisa, Italy, May 4, 00. [6] Esfandiari B. and Chandrasekharan S. On how agents make friends: Mechanisms for trust acquisition. In 4 Workshop on Deception, Fraud and Trust in Agent Societies, Montreal, Canada, 001. [7] Falcone R. and Shehory O. Trust Delegation and Autonomy: Foundations for Virtual Societies. AAMAS tutorial 1, July 16, 00. [8] Hales, D. Group Reputation Supports Beneficent Norms. The Journal of Artificial Societies and Social Simulation (JASSS) vol. 5, no. 4, 00.

10 [9] Jovanovic M. Modeling Large-scale Peer-to-Peer Networks and a Case study of Gnutella, University of Cincinnati, master esis, April 001. [10] Milojicic D. S., Kalogeraki V. and Lukose R. Peer-to-Peer Computing, Tech Report: HPL-00-57, [11] Montaner M. and L opez B. Opinion based filtering rough trust. In Proceedings of e 6 International Workshop on Cooperative Information Agents (CIA 0), Madrid (Spain), September [1] Mui L., Halberstadt A. and Mohtashemi M. Notions of reputation in multi-agents systems: A review. In Proceedings of Autonomous Agents & Multiagent Systems (AAMAS 0), 80 87, Bologna, Italy, 00.. [13] Niu X., McCalla G., Vassileva J. (to appear) Purpose-based User Modelling in a Multi-agent Portfolio Management System. In Proceedings of User Modeling UM03, Johnstown, PA, June -6, 003. [14] Heckerman, D. A Tutorial on Learning wi Bayesian Networks, Microsoft Research report MSR-TR-95-06, [15] Resnick P. and Zeckhauser R. Trust among Strangers in Internet Transactions: Empirical Analysis of ebay s Reputation System. NBER Workshop on Empirical Studies of Electronic Commerce, 000. [16] Sabater J. and Sierra C. Regret: a reputation model for gregarious societies. In 4Workshop on Deception, Fraud and Trust in Agent Societies, 001. [17] Schafer B.J. Konstan A, J, and Riedl J. "Recommender Systems in E-Commerce". ACM Conference on Electronic Commerce (EC-99), November 3-5, 1999, Denver, CO. [18] Tang T.Y, Winoto P. and Niu X. Who can I trust? Investigating trust between users and agents in a multi-agent portfolio management system. AAAI-00 Workshop on Autonomy, Delegation, and Control: From Inter-agent to Groups. Edmonton, Canada. [19] Vassileva J., Breban S. and Horsch M. Agent Reasoning Mechanism for Long-Term Coalitions Based on Decision Making and Trust. Computational Intelligence, Vol. 18, no. 4, 00. [0] Vassileva J., McCalla G. and Greer J. (accepted 17 October 001) Multi-Agent Multi-User Modeling, to appear in User Modeling and User-Adapted Interaction. [1] Yolum P. and Singh M. Locating Trustwory Services In Proceedings of e First International Workshop on Agents and Peer-to-Peer Computing (APPC), 00. [] Yu B. and Singh P. M. A social mechanism of reputation management in electronic communities. In Proceedings of Four International Workshop on Cooperative Information Agents, , 000. [3] Yu B. and Singh P. M. An Evidential Model of Distributed Reputation Management. In Autonomous Agents & Multiagent Systems (AAMAS 0), , Bologna, Italy, 00. [4] Zacharia G. Moukas A. and Maes P. Collaborative Reputation Mechanisms in Electronic Marketplaces In 3 nd Annual Hawaii International Conference on System Science (HICSS-3), 1999.

Bayesian Network-Based Trust Model

Bayesian Network-Based Trust Model Bayesian Network-Based Trust Model Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, Saskatchewan, S7N 5A9, Canada {yaw181, jiv}@cs.usask.ca Abstract We review

More information

Bayesian Network-Based Trust Model

Bayesian Network-Based Trust Model Bayesian Network-Based Trust Model Yao Wang, Julita Vassileva University of Saskatchewan, Computer Science Department, Saskatoon, Saskatchewan, S7N 5A9, Canada {yaw181, jiv}@cs.usask.ca Abstract In this

More information

Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems

Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems Jigyasu Dubey Department of Information Technology Shri Vaishnav Institute of Technology & Science Indore, India jigyasudube@yahoo.co.in

More information

Turnitin Guide for Instructors

Turnitin Guide for Instructors Contents... 1 Creating a Turnitin assignment submission point... 1 Creating a Paper Assignment... 2 Options...3 Creating a Revision Assignment... 4 Submitting papers... 4 Viewing submissions and reports

More information

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems

Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems Novel Design and Implementation of Self Organizing Trust Model for Peer - Peer Systems E. Latha M.Tech, Dept of Software Engineering (SE), Vinuthna Institute of Technology & Sciences. Abstract: This paper

More information

SuperstringRep: Reputation-enhanced Service Discovery

SuperstringRep: Reputation-enhanced Service Discovery SuperstringRep: Reputation-enhanced Service Discovery Ryan Wishart, Ricky Robinson, Jadwiga Indulska School of Information Technology and Electrical Engineering University of Queensland Brisbane, Australia

More information

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS

SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS SELF-ORGANIZING TRUST MODEL FOR PEER TO PEER SYSTEMS R. K. Prasad and Vipin Sharma 1 Department of Mechanical Engineering ABSTRACT: P A College of Engineering Nadupadavu, Mangalore, India In this implemented

More information

Trust4All: a Trustworthy Middleware Platform for Component Software

Trust4All: a Trustworthy Middleware Platform for Component Software Proceedings of the 7th WSEAS International Conference on Applied Informatics and Communications, Athens, Greece, August 24-26, 2007 124 Trust4All: a Trustworthy Middleware Platform for Component Software

More information

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation

Wireless Network Security : Spring Arjun Athreya March 3, 2011 Survey: Trust Evaluation Wireless Network Security 18-639: Spring 2011 Arjun Athreya March 3, 2011 Survey: Trust Evaluation A scenario LOBOS Management Co A CMU grad student new to Pittsburgh is looking for housing options in

More information

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks

A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile Ad hoc Networks 5th ACM Workshop on Performance Evaluation of Wireless Ad Hoc, Sensor, and Ubiquitous Networks (PE-WASUN) A Security Management Scheme Using a Novel Computational Reputation Model for Wireless and Mobile

More information

Emerging Social Networks in Peer-to-Peer Systems

Emerging Social Networks in Peer-to-Peer Systems Emerging Social Networks in Peer-to-Peer Systems Yamini Upadrashta Department of Computer Science University of Saskatchewan 57 Campus Drive Saskatoon, SK S7N 5A9 Canada ysu156@mail.usask.ca Supervisors:

More information

Graph Structure Over Time

Graph Structure Over Time Graph Structure Over Time Observing how time alters the structure of the IEEE data set Priti Kumar Computer Science Rensselaer Polytechnic Institute Troy, NY Kumarp3@rpi.edu Abstract This paper examines

More information

A prototype system for argumentation-based reasoning about trust

A prototype system for argumentation-based reasoning about trust A prototype system for argumentation-based reasoning about trust Yuqing Tang 1, Kai Cai 1, Elizabeth Sklar 1,2, and Simon Parsons 1,2 1 Department of Computer Science, Graduate Center City University of

More information

Fausto Giunchiglia and Mattia Fumagalli

Fausto Giunchiglia and Mattia Fumagalli DISI - Via Sommarive 5-38123 Povo - Trento (Italy) http://disi.unitn.it FROM ER MODELS TO THE ENTITY MODEL Fausto Giunchiglia and Mattia Fumagalli Date (2014-October) Technical Report # DISI-14-014 From

More information

Collaborative Filtering using a Spreading Activation Approach

Collaborative Filtering using a Spreading Activation Approach Collaborative Filtering using a Spreading Activation Approach Josephine Griffith *, Colm O Riordan *, Humphrey Sorensen ** * Department of Information Technology, NUI, Galway ** Computer Science Department,

More information

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY

INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY INTERNATIONAL JOURNAL OF PURE AND APPLIED RESEARCH IN ENGINEERING AND TECHNOLOGY A PATH FOR HORIZING YOUR INNOVATIVE WORK PEER-TO-PEER FILE SHARING WITH THE BITTORRENT PROTOCOL APURWA D. PALIWAL 1, PROF.

More information

Entropy-Based Recommendation Trust Model for Machine to Machine Communications

Entropy-Based Recommendation Trust Model for Machine to Machine Communications Entropy-Based Recommendation Trust Model for Machine to Machine Communications Saneeha Ahmed and Kemal Tepe 1 University of Windsor, Windsor, Ontario, Canada {ahmed13m,ktepe}@uwindsor.ca Abstract. In a

More information

second_language research_teaching sla vivian_cook language_department idl

second_language research_teaching sla vivian_cook language_department idl Using Implicit Relevance Feedback in a Web Search Assistant Maria Fasli and Udo Kruschwitz Department of Computer Science, University of Essex, Wivenhoe Park, Colchester, CO4 3SQ, United Kingdom fmfasli

More information

Complex Networks. Structure and Dynamics

Complex Networks. Structure and Dynamics Complex Networks Structure and Dynamics Ying-Cheng Lai Department of Mathematics and Statistics Department of Electrical Engineering Arizona State University Collaborators! Adilson E. Motter, now at Max-Planck

More information

A Constrained Spreading Activation Approach to Collaborative Filtering

A Constrained Spreading Activation Approach to Collaborative Filtering A Constrained Spreading Activation Approach to Collaborative Filtering Josephine Griffith 1, Colm O Riordan 1, and Humphrey Sorensen 2 1 Dept. of Information Technology, National University of Ireland,

More information

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS

A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS A CONFIDENCE MODEL BASED ROUTING PRACTICE FOR SECURE ADHOC NETWORKS Ramya. S 1 and Prof. B. Sakthivel 2 ramyasiva.jothi@gmail.com and everrock17@gmail.com 1PG Student and 2 Professor & Head, Department

More information

Project Report. An Introduction to Collaborative Filtering

Project Report. An Introduction to Collaborative Filtering Project Report An Introduction to Collaborative Filtering Siobhán Grayson 12254530 COMP30030 School of Computer Science and Informatics College of Engineering, Mathematical & Physical Sciences University

More information

Robust Relevance-Based Language Models

Robust Relevance-Based Language Models Robust Relevance-Based Language Models Xiaoyan Li Department of Computer Science, Mount Holyoke College 50 College Street, South Hadley, MA 01075, USA Email: xli@mtholyoke.edu ABSTRACT We propose a new

More information

STAR Lab Technical Report

STAR Lab Technical Report VRIJE UNIVERSITEIT BRUSSEL FACULTEIT WETENSCHAPPEN VAKGROEP INFORMATICA EN TOEGEPASTE INFORMATICA SYSTEMS TECHNOLOGY AND APPLICATIONS RESEARCH LAB STAR Lab Technical Report Benefits of explicit profiling

More information

User Contribution Measurement in Online Forum with Fraud Immunity

User Contribution Measurement in Online Forum with Fraud Immunity www.ijcsi.org 457 User Contribution Measurement in Online Forum with Fraud Immunity Guo-Ying WANG 1 and Shen-Ming QU 2 1 Information Engineering College, Zhejiang A&F University Hangzhou, 311300, China

More information

RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala Spandana* 1, Sesha Bhrgavi 2

RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala Spandana* 1, Sesha Bhrgavi 2 ISSN 2277-2685 IJESR/August 2015/ Vol-5/Issue-8/1126-1134 Teegala Spandana et.al.,/ International Journal of Engineering & Science Research RECOMMENDATION BASED P2P FILE SHARING ON DISCONNECTED MANET Teegala

More information

arxiv: v1 [cs.cr] 30 May 2014

arxiv: v1 [cs.cr] 30 May 2014 ROMEO: ReputatiOn Model Enhancing OpenID Simulator Ginés Dólera Tormo 1, Félix Gómez Mármol 1, and Gregorio Martínez Pérez 2 arxiv:1405.7831v1 [cs.cr] 30 May 2014 1 NEC Europe Ltd., Kurfürsten-Anlage 36,

More information

Multi-path based Algorithms for Data Transfer in the Grid Environment

Multi-path based Algorithms for Data Transfer in the Grid Environment New Generation Computing, 28(2010)129-136 Ohmsha, Ltd. and Springer Multi-path based Algorithms for Data Transfer in the Grid Environment Muzhou XIONG 1,2, Dan CHEN 2,3, Hai JIN 1 and Song WU 1 1 School

More information

The Comparative Study of Machine Learning Algorithms in Text Data Classification*

The Comparative Study of Machine Learning Algorithms in Text Data Classification* The Comparative Study of Machine Learning Algorithms in Text Data Classification* Wang Xin School of Science, Beijing Information Science and Technology University Beijing, China Abstract Classification

More information

Reputation and Endorsement for Web Services

Reputation and Endorsement for Web Services Reputation and Endorsement for Web Services E. Michael Maximilien North Carolina State University and IBM maxim@us.ibm.com and Munindar P. Singh North Carolina State University singh@ncsu.edu The web services

More information

Taxonomy Dimensions of Complexity Metrics

Taxonomy Dimensions of Complexity Metrics 96 Int'l Conf. Software Eng. Research and Practice SERP'15 Taxonomy Dimensions of Complexity Metrics Bouchaib Falah 1, Kenneth Magel 2 1 Al Akhawayn University, Ifrane, Morocco, 2 North Dakota State University,

More information

An Information Theoretic Approach to Ontology-based Interest Matching

An Information Theoretic Approach to Ontology-based Interest Matching An Information Theoretic Approach to Ontology-based Interest Matching aikit Koh and Lik Mui Laboratory for Computer Science Clinical Decision Making Group Massachusetts Institute of Technology waikit@mit.edu

More information

Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity Factor in Agent-Based Autonomic Computing System

Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity Factor in Agent-Based Autonomic Computing System J. Software Engineering & Applications, 2009, 2: 03-0 doi:0.4236/sea.2009.2205 Published Online July 2009 (www.scirp.org/ournal/sea) Autonomic Software Component QoS Matchmaking Algorithm Based on Fidelity

More information

Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage

Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage 1 Trust Enhanced Cryptographic Role-based Access Control for Secure Cloud Data Storage Lan Zhou,Vijay Varadharajan,and Michael Hitchens Abstract Cloud data storage has provided significant benefits by

More information

Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems

Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems Experimental-based Tool Calibration used for Assessing the Quality of e-commerce Systems Antonia Stefani, Dimitris Stavrinoudis, Michalis Xenos School of Sciences & Technology,Hellenic Open University,3

More information

Trust embedded business model of Online Service Network (OSN)

Trust embedded business model of Online Service Network (OSN) ITU Workshop on Future Trust and Knowledge Infrastructure, Phase 2 Geneva, Switzerland 1 July 2016 Trust embedded business model of Online Service Network (OSN) Minzheong Song Professor, Hansei University

More information

Scalable Middleware Environment for Agent-Based Internet Applications]

Scalable Middleware Environment for Agent-Based Internet Applications] Scalable Middleware Environment for Agent-Based Internet Applications] Benno J. Overeinder and Frances M.T. Brazier Department of Computer Science, Vrije Universiteit Amsterdam De Boelelaan 1081a, 1081

More information

A Comparative Study of Selected Classification Algorithms of Data Mining

A Comparative Study of Selected Classification Algorithms of Data Mining Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 4, Issue. 6, June 2015, pg.220

More information

Autonomic Applications for Pervasive Environments

Autonomic Applications for Pervasive Environments Autonomic Applications for Pervasive Environments Manish Parashar WINLAB/TASSL ECE, Rutgers University http://www.caip.rutgers.edu/tassl Ack: NSF (CAREER, KDI, ITR, NGS), DoE (ASCI) Pervasive Computing:

More information

An Iterative Algorithm for Trust and Reputation Management

An Iterative Algorithm for Trust and Reputation Management An Iterative Algorithm for Trust and Reputation Management Erman Ayday Atlanta, GA 3332, USA Email: erman@ece.gatech.edu Hanseung Lee Atlanta, GA 3332, USA Email: hanseung.lee@ece.gatech.edu Faramarz Fekri

More information

Recommender Systems (RSs)

Recommender Systems (RSs) Recommender Systems Recommender Systems (RSs) RSs are software tools providing suggestions for items to be of use to users, such as what items to buy, what music to listen to, or what online news to read

More information

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University

Trust in the Internet of Things From Personal Experience to Global Reputation. 1 Nguyen Truong PhD student, Liverpool John Moores University Trust in the Internet of Things From Personal Experience to Global Reputation 1 Nguyen Truong PhD student, Liverpool John Moores University 2 Outline I. Background on Trust in Computer Science II. Overview

More information

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence

A Network Intrusion Detection System Architecture Based on Snort and. Computational Intelligence 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 206) A Network Intrusion Detection System Architecture Based on Snort and Computational Intelligence Tao Liu, a, Da

More information

Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme

Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme Dynamic Self-management of Autonomic Systems: The Reputation, Quality and Credibility (RQC) Scheme Anurag Garg, Roberto Battiti, and Gianni Costanzi Dipartimento di Informatica e Telecomunicazioni, Università

More information

Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks

Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Analyzing a Human-based Trust Model for Mobile Ad Hoc Networks Pedro B. Velloso 1, Rafael P. Laufer 2, Otto Carlos M. B. Duarte 3, and Guy Pujolle 1 1 Laboratoire d Informatique de Paris 6 (LIP6) 2 Computer

More information

IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL

IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL IMPROVING THE RELEVANCY OF DOCUMENT SEARCH USING THE MULTI-TERM ADJACENCY KEYWORD-ORDER MODEL Lim Bee Huang 1, Vimala Balakrishnan 2, Ram Gopal Raj 3 1,2 Department of Information System, 3 Department

More information

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN

International Journal of Scientific & Engineering Research Volume 8, Issue 5, May ISSN International Journal of Scientific & Engineering Research Volume 8, Issue 5, May-2017 106 Self-organizing behavior of Wireless Ad Hoc Networks T. Raghu Trivedi, S. Giri Nath Abstract Self-organization

More information

The Global Cybercrime Industry

The Global Cybercrime Industry Nir Kshetri The Global Cybercrime Industry Economic, Institutional and Strategic Perspectives 4y Springer 1 The Global Cybercrime Industry and Its Structure: Relevant Actors, Motivations, Threats, and

More information

Do Social Networks Improve e-commerce? A Study on Social Marketplaces

Do Social Networks Improve e-commerce? A Study on Social Marketplaces Do Social Networks Improve e-commerce? A Study on Social Marketplaces 1 GAYATRI SWAMYNATHAN, CHRISTO WILSON, BRYCE BOE, KEVIN ALMEROTH AND BEN Y. ZHAO UC SANTA BARBARA Leveraging Online Social Networks

More information

Security Technologies for Dynamic Collaboration

Security Technologies for Dynamic Collaboration Special Issue Advanced Technologies Driving Dynamic Collaboration Featuring System Technologies Security Technologies for Dynamic Collaboration By Hiroshi MIYAUCHI,* Ayako KOMATSU, Masato KAWATSU and Masashi

More information

Personalized Information Retrieval by Using Adaptive User Profiling and Collaborative Filtering

Personalized Information Retrieval by Using Adaptive User Profiling and Collaborative Filtering Personalized Information Retrieval by Using Adaptive User Profiling and Collaborative Filtering Department of Computer Science & Engineering, Hanyang University {hcjeon,kimth}@cse.hanyang.ac.kr, jmchoi@hanyang.ac.kr

More information

A Framework for Securing Databases from Intrusion Threats

A Framework for Securing Databases from Intrusion Threats A Framework for Securing Databases from Intrusion Threats R. Prince Jeyaseelan James Department of Computer Applications, Valliammai Engineering College Affiliated to Anna University, Chennai, India Email:

More information

Correlation Based Feature Selection with Irrelevant Feature Removal

Correlation Based Feature Selection with Irrelevant Feature Removal Available Online at www.ijcsmc.com International Journal of Computer Science and Mobile Computing A Monthly Journal of Computer Science and Information Technology IJCSMC, Vol. 3, Issue. 4, April 2014,

More information

VisoLink: A User-Centric Social Relationship Mining

VisoLink: A User-Centric Social Relationship Mining VisoLink: A User-Centric Social Relationship Mining Lisa Fan and Botang Li Department of Computer Science, University of Regina Regina, Saskatchewan S4S 0A2 Canada {fan, li269}@cs.uregina.ca Abstract.

More information

Multi-Agent Programming

Multi-Agent Programming Multi-Agent Programming Brian Logan 1 School of Computer Science University of Nottingham Midlands Graduate School 8th 12th April 2013 1 Slides on Normative Organisations are from an AAMAS 2012 tutorial

More information

Technical Report CS : Incorporating Trust in Network Virtualization

Technical Report CS : Incorporating Trust in Network Virtualization Technical Report CS-2010-04: Incorporating Trust in Network Virtualization Loubna Mekouar University of Waterloo Waterloo, Canada lmekouar@bbcr.uwaterloo.ca Youssef Iraqi Khalifa University Sharjah, UAE

More information

IPMU July 2-7, 2006 Paris, France

IPMU July 2-7, 2006 Paris, France IPMU July 2-7, 2006 Paris, France Information Processing and Management of Uncertainty in Knowledge-Based Systems Conceptual Design and Implementation of the Salem Chakhar 1 and Abelkader Telmoudi 2 1

More information

How to Navigate Getting IPv4 Addresses in a Post Run-Out World. Amy Potter

How to Navigate Getting IPv4 Addresses in a Post Run-Out World. Amy Potter How to Navigate Getting IPv4 Addresses in a Post Run-Out World Amy Potter Background Traditionally RIRs (and their predecessors) were the primary source of IPv4 addresses. Prior to the introduction of

More information

Study of Trust Management Approaches in Peer to Peer System

Study of Trust Management Approaches in Peer to Peer System Research Article International Journal of Current Engineering and Technology E-ISSN 2277 4106, P-ISSN 2347-5161 2014 INPRESSCO, All Rights Reserved Available at http://inpressco.com/category/ijcet Santosh

More information

Norton s My First Device Report. October 2018

Norton s My First Device Report. October 2018 Norton s My First Device Report By October 2018 Methodology Norton s My First Device Report is an online survey of 6,986 parents aged 18+ years old, with children aged 5-16 across 10 markets, commissioned

More information

SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems

SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems SocialLink: Utilizing Social Network and Transaction Links for Effective Trust Management in P2P File Sharing Systems Kang Chen 1, Guoxin Liu 2, Haiying Shen 2 and Fang Qi 2 1 Dept. Of ECE Southern Illinois

More information

Part 11: Collaborative Filtering. Francesco Ricci

Part 11: Collaborative Filtering. Francesco Ricci Part : Collaborative Filtering Francesco Ricci Content An example of a Collaborative Filtering system: MovieLens The collaborative filtering method n Similarity of users n Methods for building the rating

More information

A Peer-to-Peer Normative System to Achieve Social Order

A Peer-to-Peer Normative System to Achieve Social Order A Peer-to-Peer Normative System to Achieve Social Order A. Grizard, Laurent Vercouter, Tiberiu Stratulat, G. Muller To cite this version: A. Grizard, Laurent Vercouter, Tiberiu Stratulat, G. Muller. A

More information

Evaluation of Organizational Designs with Network-Centric Philosophy

Evaluation of Organizational Designs with Network-Centric Philosophy Evaluation of Organizational Designs with Network-Centric Philosophy Celestine A. Ntuen, Ph.D Distinguished University Professor The Army Center for Human-Centric C2 Decision Making ntuen@ncat.edu http://gandalf.ncat.edu/ihms

More information

Core Membership Computation for Succinct Representations of Coalitional Games

Core Membership Computation for Succinct Representations of Coalitional Games Core Membership Computation for Succinct Representations of Coalitional Games Xi Alice Gao May 11, 2009 Abstract In this paper, I compare and contrast two formal results on the computational complexity

More information

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200?

How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? How to explore big networks? Question: Perform a random walk on G. What is the average node degree among visited nodes, if avg degree in G is 200? Questions from last time Avg. FB degree is 200 (suppose).

More information

A Conceptual Trust Framework for Semantic Web Agents

A Conceptual Trust Framework for Semantic Web Agents Association for Information Systems AIS Electronic Library (AISeL) AMCIS 2004 Proceedings Americas Conference on Information Systems (AMCIS) December 2004 A Conceptual Trust Framework for Semantic Web

More information

Verification of Multiple Agent Knowledge-based Systems

Verification of Multiple Agent Knowledge-based Systems Verification of Multiple Agent Knowledge-based Systems From: AAAI Technical Report WS-97-01. Compilation copyright 1997, AAAI (www.aaai.org). All rights reserved. Daniel E. O Leary University of Southern

More information

Characterizing Smartphone Usage Patterns from Millions of Android Users

Characterizing Smartphone Usage Patterns from Millions of Android Users Characterizing Smartphone Usage Patterns from Millions of Android Users Huoran Li, Xuan Lu, Xuanzhe Liu Peking University Tao Xie UIUC Kaigui Bian Peking University Felix Xiaozhu Lin Purdue University

More information

Trust is the Foundations for Computer Security

Trust is the Foundations for Computer Security Christian Damsgaard Jensen Department of Applied Mathematics and Computer Science Technical University of Denmark Christian.Jensen@imm.dtu.dk Security and Trust Computer security is sometimes divided into:

More information

WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS

WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS 1 WEB SEARCH, FILTERING, AND TEXT MINING: TECHNOLOGY FOR A NEW ERA OF INFORMATION ACCESS BRUCE CROFT NSF Center for Intelligent Information Retrieval, Computer Science Department, University of Massachusetts,

More information

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices*

Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Featuring Trust and Reputation Management Systems for Constrained Hardware Devices* Rodrigo Román, M. Carmen Fernández-Gago, Javier López University of Málaga, Spain *(Wireless Sensor Networks) Contents

More information

Flight Recommendation System based on user feedback, weighting technique and context aware recommendation system

Flight Recommendation System based on user feedback, weighting technique and context aware recommendation system www.ijecs.in International Journal Of Engineering And Computer Science ISSN:2319-7242 Volume 5 Issue 09 September 2016 Page No.17973-17978 Flight Recommendation System based on user feedback, weighting

More information

Cyber Security Strategy

Cyber Security Strategy Cyber Security Strategy Committee for Home Affairs Introduction Cyber security describes the technology, processes and safeguards that are used to protect our networks, computers, programs and data from

More information

P2P Contents Distribution System with Routing and Trust Management

P2P Contents Distribution System with Routing and Trust Management The Sixth International Symposium on Operations Research and Its Applications (ISORA 06) Xinjiang, China, August 8 12, 2006 Copyright 2006 ORSC & APORC pp. 319 326 P2P Contents Distribution System with

More information

Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks

Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks Ensuring Secure and Timely Availability of Reputation Data in Peer To Peer Networks S.Saranya 1, K.Kiruthika Devi 2 P.G Scholar, Department of Computer Science and Engineering, Nandha College of Technology,

More information

The Simulation Study of Spread and Evolution about Network Opinion on Education

The Simulation Study of Spread and Evolution about Network Opinion on Education Asian Social Science; Vol. 10, No. 10; 2014 ISSN 1911-2017 E-ISSN 1911-2025 Published by Canadian Center of Science and Education The Simulation Study of Spread and Evolution about Network Opinion on Education

More information

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks

ECS 253 / MAE 253, Lecture 8 April 21, Web search and decentralized search on small-world networks ECS 253 / MAE 253, Lecture 8 April 21, 2016 Web search and decentralized search on small-world networks Search for information Assume some resource of interest is stored at the vertices of a network: Web

More information

Defense of Trust Management Vulnerabilities in Distributed Networks

Defense of Trust Management Vulnerabilities in Distributed Networks Defense of Trust Management Vulnerabilities in Distributed Networks Yan (Lindsay) Sun, Zhu Han, and K. J. Ray Liu Department of Electrical and Computer Engineering University of Rhode Island, RI 02881

More information

Query Likelihood with Negative Query Generation

Query Likelihood with Negative Query Generation Query Likelihood with Negative Query Generation Yuanhua Lv Department of Computer Science University of Illinois at Urbana-Champaign Urbana, IL 61801 ylv2@uiuc.edu ChengXiang Zhai Department of Computer

More information

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

How to implement NIST Cybersecurity Framework using ISO WHITE PAPER. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. How to implement NIST Cybersecurity Framework using ISO 27001 WHITE PAPER Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved. Copyright 2017 Advisera Expert Solutions Ltd. All rights reserved.

More information

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing

Prevention of Black Hole Attack in AODV Routing Algorithm of MANET Using Trust Based Computing Ashish Sharma et al, / (IJCSIT) International Journal of Computer Science and Information Technologies, Vol. 5 (4), 14, 51-55 Prevention of Black Hole Attack in Routing Algorithm of MANET Using Trust Based

More information

Example 1: An algorithmic view of the small world phenomenon

Example 1: An algorithmic view of the small world phenomenon Lecture Notes: Social Networks: Models, Algorithms, and Applications Lecture 1: Jan 17, 2012 Scribes: Preethi Ambati and Azar Aliyev Example 1: An algorithmic view of the small world phenomenon The story

More information

Keywords: geolocation, recommender system, machine learning, Haversine formula, recommendations

Keywords: geolocation, recommender system, machine learning, Haversine formula, recommendations Volume 6, Issue 4, April 2016 ISSN: 2277 128X International Journal of Advanced Research in Computer Science and Software Engineering Research Paper Available online at: www.ijarcsse.com Geolocation Based

More information

Best Customer Services among the E-Commerce Websites A Predictive Analysis

Best Customer Services among the E-Commerce Websites A Predictive Analysis www.ijecs.in International Journal Of Engineering And Computer Science ISSN: 2319-7242 Volume 5 Issues 6 June 2016, Page No. 17088-17095 Best Customer Services among the E-Commerce Websites A Predictive

More information

Using semantic causality graphs to validate MAS models

Using semantic causality graphs to validate MAS models Using semantic causality graphs to validate MAS models Guillermo Vigueras 1, Jorge J. Gómez 2, Juan A. Botía 1 and Juan Pavón 2 1 Facultad de Informática Universidad de Murcia Spain 2 Facultad de Informática

More information

DARUL ARQAM Scope & Sequence Mathematics Grade 5. Revised 05/31/ st Quarter (43 Days) Resources: 1 : Aug 9-11 (3 days)

DARUL ARQAM Scope & Sequence Mathematics Grade 5. Revised 05/31/ st Quarter (43 Days) Resources: 1 : Aug 9-11 (3 days) Maematics Grade 5 1st Quarter (43 Days) st 1 : Aug 9-11 (3 days) Orientation Topic 1: Place Value Lesson 1 Lesson 5 nd 2 : Aug 14-18 rd 3 : Aug 21-25 4 : Aug 28-30 (3 days) Topic 2: Adding and Subtracting

More information

THE decentralized control architecture has been widely

THE decentralized control architecture has been widely 234 IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, VOL. 3, NO. 3, AUGUST 2007 Algorithms for Transitive Dependence-Based Coalition Formation Bo An, Zhiqi Shen, Chunyan Miao, and Daijie Cheng Abstract Coalition

More information

Schematizing a Global SPAM Indicative Probability

Schematizing a Global SPAM Indicative Probability Schematizing a Global SPAM Indicative Probability NIKOLAOS KORFIATIS MARIOS POULOS SOZON PAPAVLASSOPOULOS Department of Management Science and Technology Athens University of Economics and Business Athens,

More information

A Constrained Spreading Activation Approach to Collaborative Filtering

A Constrained Spreading Activation Approach to Collaborative Filtering A Constrained Spreading Activation Approach to Collaborative Filtering Josephine Griffith 1, Colm O Riordan 1, and Humphrey Sorensen 2 1 Dept. of Information Technology, National University of Ireland,

More information

Artificial Neuron Modelling Based on Wave Shape

Artificial Neuron Modelling Based on Wave Shape Artificial Neuron Modelling Based on Wave Shape Kieran Greer, Distributed Computing Systems, Belfast, UK. http://distributedcomputingsystems.co.uk Version 1.2 Abstract This paper describes a new model

More information

Integrating Dirichlet Reputation into Usage Control

Integrating Dirichlet Reputation into Usage Control Integrating Dirichlet Reputation into Usage Control Li Yang and Alma Cemerlic University of Tennessee at Chattanooga Cyber Security and Information Intelligence Research Workshop 2009 Motivation of the

More information

Introduction to Intelligent Agents

Introduction to Intelligent Agents Introduction to Intelligent Agents Pınar Yolum p.yolum@uu.nl Utrecht University Course Information Jointly taught with Mehdi Dastani Topics Work Schedule Grading Resources Academic Integrity Spring 2018

More information

POSTER: Point Cloud Lossless Compression

POSTER: Point Cloud Lossless Compression POSTER: Point Cloud Lossless Compression Koji Nishio Osaka Institute of Technology 1-79-1, Kitayama Hirakata, Osaka Japan(573-0196) nishio@is.oit.ac.jp Takayuki Kanaya Hiroshima International Univ. 555-36,

More information

Yiyu (Y.Y.) Yao Department of Computer Science University of Regina Regina, Sask., Canada S4S 0A2

Yiyu (Y.Y.) Yao Department of Computer Science University of Regina Regina, Sask., Canada S4S 0A2 Yiyu (Y.Y.) Yao Department of Computer Science University of Regina Regina, Sask., Canada S4S 0A2 yyao@cs.uregina.ca http://www.cs.uregina.ca/~yyao WICI The International WIC Institute Ning Zhong, Data

More information

Identity Crisis: Anonymity vs. Reputation in P2P Systems

Identity Crisis: Anonymity vs. Reputation in P2P Systems Identity Crisis: Anonymity vs. Reputation in P2P Systems Sergio Marti and Hector Garcia-Molina Stanford University Stanford, CA 94305 {smarti, hector}@cs.stanford.edu Abstract The effectiveness of reputation

More information

Domain-specific Concept-based Information Retrieval System

Domain-specific Concept-based Information Retrieval System Domain-specific Concept-based Information Retrieval System L. Shen 1, Y. K. Lim 1, H. T. Loh 2 1 Design Technology Institute Ltd, National University of Singapore, Singapore 2 Department of Mechanical

More information

A Search Theoretical Approach to P2P Networks: Analysis of Learning

A Search Theoretical Approach to P2P Networks: Analysis of Learning A Search Theoretical Approach to P2P Networks: Analysis of Learning Nazif Cihan Taş Dept. of Computer Science University of Maryland College Park, MD 2742 Email: ctas@cs.umd.edu Bedri Kâmil Onur Taş Dept.

More information

Mobile Agent Routing for Query Retrieval Using Genetic Algorithm

Mobile Agent Routing for Query Retrieval Using Genetic Algorithm 1 Mobile Agent Routing for Query Retrieval Using Genetic Algorithm A. Selamat a, b, M. H. Selamat a and S. Omatu b a Faculty of Computer Science and Information Systems, Universiti Teknologi Malaysia,

More information

A System for Identifying Voyage Package Using Different Recommendations Techniques

A System for Identifying Voyage Package Using Different Recommendations Techniques GLOBAL IMPACT FACTOR 0.238 DIIF 0.876 A System for Identifying Voyage Package Using Different Recommendations Techniques 1 Gajjela.Sandeep, 2 R. Chandrashekar 1 M.Tech (CS),Department of Computer Science

More information