Interaction-based Reputation Model in Online Social Networks

Izzat Alsmadi, Dianxiang Xu, Jin-Hee Cho

2016

Abstract

Due to the proliferation of using various online social media, individual users put their privacy at risk by posting and exchanging enormous amounts of messages or activities with other users. This causes a serious concern about leaking private information out to malevolent entities without users’ consent. This work proposes a reputation model in order to achieve efficient and effective privacy preservation in which a user’s reputation score can be used to set the level of privacy and accordingly to determine the level of visibility for all messages or activities posted by the users. We derive a user’s reputation based on both individual and relational characteristics in online social network environments. We demonstrate how the proposed reputation model can be used for automatic privacy assessment and accordingly visibility setting for messages / activities created by a user.

References

  1. Akbas, M. I., Avula, R. N., Bassiouni, M. A., and Turgut, D. (2013). Social network generation and friend ranking based on mobile phone data. In Proceedings of the International Conference on Communications, pages 1444-1448.
  2. Buskens, V. (1998). The social structure of trust. Social Networks, 20(3):265-289.
  3. Caverlee, J., Liu, L., , and Webb, S. (2008). Social trust: Tamper-resilient trust establishment in online communities. In Proceedings of the 8th ACM/IEEECS Joint Conference on Digital Libraries (JCDL08), pages 104-114.
  4. Cho, J., Swami, A., and Chen, I. (2011). A survey of trust management in mobile ad hoc networks. IEEE Communications Surveys and Tutorials, 13(4):562-583.
  5. Ferlander, S. (2003). The Internet, social capital and local community. Technical report, University of Sterling.
  6. Ganzaroli, A. (2002). Creating trust between local and global systems. Technical report, Erasmus University Rotterdam.
  7. Gao, H., Chen, Y., Lee, K., Palsetia, D., and Choudhary, A. N. (2012). Towards online spam filtering in social networks. In Proceedings of the Network and Distributed System Security Symposium (NDSS).
  8. Grabner-Krauter, S. (2009). Web 2.0 social networks: The role of trust. Journal of Business Ethics, 90:505-522.
  9. Grabner-Krauter, S. and Bitter, S. (2015). Trust in online social networks: A multifaceted perspective. Forum for Social Economics, 44(1):48-68.
  10. Granovetter, M. (1992). Problems of explanation in economic sociology. Technical report, Harvard Business School Press, Boston, MA, USA.
  11. Hang, W. C. and Singh, M. P. (2010). Trust based recommendation based on graph similarities.
  12. Hardin, R. (2002). Trust and Trustworthiness. Russell Sage Foundation.
  13. Hossmann, T., Legendre, F., Nomikos, G., and Spyropoulos, T. (2011). Stumbl: Using facebook to collect rich datasets for opportunistic networking research. In Proceedings of IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks(WOWMOM), pages 1-6.
  14. Hussain, F. K. and Chang, E. (2007). An overview of the interpretations of trust and reputation. In The Third Advanced International Conference on Telecommunications (AICT 2007).
  15. Jones, J. J., Settle, J. E., Bond, R. M., Fariss, C. J., Marlow, C., and Fowler, J. H. (2013). Trust in online social networks: A multifaceted perspective. Plos One Journal.
  16. Jøsang, A. and Pope, S. (2005). Semantic constraints for trust transitivity. Proceedings of Asia-Pacific Conf. of Conceptual Modeling, 3.
  17. Kavanaugh, A., Reese, D. D., Carroll, J. M., and Rosson, M. (2005). Weak ties in networked communities. The Information Society: An International Journal, 21(2):119-131.
  18. Khambatti, M., Dasgupta, P., and Ryu, K. D. (2004). A rolebased trust model for peer-to-peer communities and dynamic coalitions. In IEEE Information Assurance Workshop.
  19. Mansfield-Devine, S. (2008). Anti-social networking: Exploiting the trusting environment of web 2.0. Network Security, 2008(11):4-7.
  20. Marti, S., Ganesan, P., and Garcia-Molina, H. (2005). Sprout: P2p routing with social networks. In Current Trends in Database Technology-EDBT. Springer Berlin Heidelberg.
  21. Merriam and Webster Dictionary (2015). Trust and Reputation Definition.
  22. Murphy, J. (2006). Building trust in economic space. Progress in Human Geography, 30(4):427-450.
  23. Nguyen, T., Chen, M., and Szymanski, B. (2013). Analyzing the proximity and interactions of friends in communities in gowalla. In Proceedings of IEEE 13th International Conference Data Mining Workshops, pages 1036-1044, Dallas, Texas, USA.
  24. Richardson, M., Agrawal, A., and Domingos, P. (2003). Trust management for the semantic web. In Proceedings of the Second International Semantic Web Conference, Sanibel Island, Florida.
  25. Traud, A. L., Mucha, P. J., and Porter, M. A. (2011). Social structure of facebook networks. Physica A, 391(16):4165-4180.
  26. Woolcook, M. (2001). The place of social capital in understanding social and economic outcomes. Canadian Journal of Policy Research, 2(1).
  27. Zhang, Y., Chen, H., and Wu, Z. (2006). A social networkbased trust model for the semantic web. In Proceedings of the 6th International Conference on Autonomic and Trusted Computing, pages 183-192.
Download


Paper Citation


in Harvard Style

Alsmadi I., Xu D. and Cho J. (2016). Interaction-based Reputation Model in Online Social Networks . In Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP, ISBN 978-989-758-167-0, pages 265-272. DOI: 10.5220/0005668302650272


in Bibtex Style

@conference{icissp16,
author={Izzat Alsmadi and Dianxiang Xu and Jin-Hee Cho},
title={Interaction-based Reputation Model in Online Social Networks},
booktitle={Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,},
year={2016},
pages={265-272},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005668302650272},
isbn={978-989-758-167-0},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 2nd International Conference on Information Systems Security and Privacy - Volume 1: ICISSP,
TI - Interaction-based Reputation Model in Online Social Networks
SN - 978-989-758-167-0
AU - Alsmadi I.
AU - Xu D.
AU - Cho J.
PY - 2016
SP - 265
EP - 272
DO - 10.5220/0005668302650272