SlideShare ist ein Scribd-Unternehmen logo
1 von 26
© Copyright 2011 Digital Enterprise Research Institute. All rights reserved.
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Fine-Grained Trust Assertions for
Privacy Management in the
Social Semantic Web
Owen Sacco, John G. Breslin & Stefan Decker
firstname.lastname@deri.org
IEEE TrustCom 2013 – Melbourne Australia Tuesday 16th
July 2013
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Introduction
 Current Social Networks
 provide generic privacy settings for sharing information
 do not take user’s trust into account
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Introduction
In reality, we only share parts of
our information to whom we trust
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Research Contribution
In this work we focus on:
Using various methods to
automatically assert fine-grained
subjective trust values for different
Social Factors to grant or restrict
access to personal information
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Use Case
1. Alex sends a request to view John’s personal
information
2. Alex is granted access to the information which
his trust value (asserted by John) satisfies a trust
threshold (assigned by John)
 Example: Provide John’s phone number to Alex if
he has a trust level of 0.83
Social Web Platforms
...
1
2
Alex
John
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Defining Trust
In our work trust is defined as:
“a person’s subjective belief
that another person will act
responsibly and will not
misuse the information”
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Factors
 Trust judgments are influenced by Social Factors:
 Past interactions with a person
 Opinions of a person’s actions
 Other people’s opinions
 Rumours
 Psychological factors impacted over time
 Life events
 and so forth
 These can be hard to compute since the
information required is limited and unavailable in
Social Networks
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Factors
 However, we have identified several factors that
trust can be asserted from the information
available in Social Networks:
 Identity
 Profile Similarity
 Relationship type
 Reputation in a Web of Trust
 Interactions
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertion Framework
Social Web Platforms
...
Alex
JohnSocial Semantic Web Platform
Trust
Manager
1
2
1
2
3 5
4
6
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Semantic Web
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Model
 Trust values are represented in the range of [-1,1]
 1 represents absolute trust
 0 represents either uncertainty or unknown
 -1 represents absolute distrust
 Positive values less than 1 represents trust but with an
element of uncertainty
 This also applies to negative values
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Identity-based Trust
 Relies on authentication
 The WebID protocol is used as a Single Sign-On Service for
Semantic Web applications
– WebID provides users to authenticate using FOAF and X.509
certificates over SSL
 The subjective trust value is assigned to the requester
after s/he authenticates using WebID
 1 if successful, -1 if unsuccessful and 0 if aborted
 Definition 1: Identity-based Trust
Certificate(Cert,R) Profile(RP,R) Verify(Cert,RP)∧ ∧ ∧
AssertedBy(R,U) AssignTrust(IDT,R)⇒
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Profile Similarity-based Trust
 Asserting trust based on the similarities between the user
profile and the requester
 Basic information attributes are not taken into
consideration
 Attributes such as work place information, interests,
connected peers and other profile attributes are compared
 Profile similarity-based trust calculation:
– denotes profile similarity subjective trust valueτ
– m denotes the matched distinct profile attributes between
the user’s profile and the requester’s profile
– a denotes the user’s distinct profile attributes
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 2: Profile Similarity-based Trust
∀UA(Profile(RP,R) Profile(UP,U)∧ ∧
Contain(RA,RP) Contain(UA,UP) Match(RA,UA)∧ ∧ ∧
AssertedBy(R,U)) AssignTrust(PST,R)⇒
 where PST {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Relationship-based Trust
 The Social Semantic Web provides the user to enter a value
of how much s/he trusts that particular relationship type
 Definition 3: Relationship-based Trust
∀URT(Profile(UP,U) Contain(URT,UP)∧ ∧
Relationship(R,URT) AssertedBy(R,U)) AssignTrust(RLP,R)∧ ⇒
 where RLP {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Reputation-based Trust
 Consists of a trust value of a user within a Social graph
based on all trust values given by other users
 Reputation-based trust value is the weighted average value
of all trust values given to a user
– The user’s trust values assigned within a network
– The weights denotes the reputation value of the person that
assigned the trust value
 Reputation-based trust calculation:
– τ denotes reputation trust
– w denotes the reputation of the user assigning a subjective
trust value to the requester
– v denotes the requester’s subjective trust value assigned by a
user
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 4: Reputation-based Trust
SocialGraph(SG,U) Contain(R,SG) Measure(RV,SG)∧ ∧ ∧
Reputaion(RV,R) AssertedBy(R,U) AssignTrust(RPT,R)∧ ⇒
 where RPT {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Interactions-based Trust
 Consists of users sharing microblog posts, comments,
photos, videos, links and other content with their peers
 Interactions-based trust calculation:
– denotes interactions trust valueτ
– r denotes the number of interactions between the requester
and the user
– u denotes the number of all the user’s interactions in the
Social Web platform
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 5: Interactions-based Trust
∀UI(Profile(UP,U) Contain(UI,UP) Interaction(R,UI)∧ ∧ ∧
AssertedBy(R,U)) AssignTrust(INTT,R)⇒
 where INTT {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Aggregating Subjective Trust Values
 To assign a fine-grained user’s subjective trust value to a
requester
 An average of all the subjective trust values of a requester
from each social factor assigned by the user
 Aggregate subjective trust calculation:
– denotes the aggregated subjective trust valueτ
– s a subjective trust value asserted based on a social factor
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertion Ontology
(TAO)
http://vocab.deri.ie/tao
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Information Confidentiality
http://vocab.deri.ie/ppo
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Implementing Trust
Assertions
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Results
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Future Work
 To show how this model is useful for other
scenarios (for example for Recommender Systems)
 To calculate automatically Relationship-based Trust
values
 To take into account the trust values of Certificate
Authorities when calculating Identity-based Trust
 To compare our model with other state-of-the-art
models
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Thanks!
Email: owen.sacco@deri.org

Weitere ähnliche Inhalte

Was ist angesagt?

Blacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersBlacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersIAEME Publication
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsConference Papers
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...IJNSA Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsIJCSIS Research Publications
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)IAESIJEECS
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosef Gamble
 
Readymade M Tech Thesis
Readymade M Tech ThesisReadymade M Tech Thesis
Readymade M Tech Thesise2-matrix
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 

Was ist angesagt? (20)

Blacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersBlacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential users
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Disseration M.Tech
Disseration M.TechDisseration M.Tech
Disseration M.Tech
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_Security
 
Readymade M Tech Thesis
Readymade M Tech ThesisReadymade M Tech Thesis
Readymade M Tech Thesis
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 

Ähnlich wie Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web

IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET Journal
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust onlineTina Guenther
 
Trust blueprints icds 2014
Trust blueprints icds 2014Trust blueprints icds 2014
Trust blueprints icds 2014George Vanecek
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Soudé Fazeli
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationAlejandro Bellogin
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputationguestc12d53
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Logindrummondreed
 
Trustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsTrustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsPaolo Massa
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profilesHaishan Liu
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profilesHaishan Liu
 

Ähnlich wie Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web (20)

Ithet
IthetIthet
Ithet
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust online
 
Trust blueprints icds 2014
Trust blueprints icds 2014Trust blueprints icds 2014
Trust blueprints icds 2014
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p network
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix Factorization
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Trustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsTrustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust Metrics
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profiles
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profiles
 

Kürzlich hochgeladen

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Developmentchesterberbo7
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...DhatriParmar
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationdeepaannamalai16
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Association for Project Management
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxkarenfajardo43
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management SystemChristalin Nelson
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxlancelewisportillo
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleCeline George
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfPrerana Jadhav
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...Nguyen Thanh Tu Collection
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfVanessa Camilleri
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptxmary850239
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdfMr Bounab Samir
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsPooky Knightsmith
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfPatidar M
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptxmary850239
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptxDhatriParmar
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSMae Pangan
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQuiz Club NITW
 

Kürzlich hochgeladen (20)

Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 
Using Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea DevelopmentUsing Grammatical Signals Suitable to Patterns of Idea Development
Using Grammatical Signals Suitable to Patterns of Idea Development
 
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
Blowin' in the Wind of Caste_ Bob Dylan's Song as a Catalyst for Social Justi...
 
Congestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentationCongestive Cardiac Failure..presentation
Congestive Cardiac Failure..presentation
 
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
Team Lead Succeed – Helping you and your team achieve high-performance teamwo...
 
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptxGrade Three -ELLNA-REVIEWER-ENGLISH.pptx
Grade Three -ELLNA-REVIEWER-ENGLISH.pptx
 
Transaction Management in Database Management System
Transaction Management in Database Management SystemTransaction Management in Database Management System
Transaction Management in Database Management System
 
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptxQ4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
Q4-PPT-Music9_Lesson-1-Romantic-Opera.pptx
 
Multi Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP ModuleMulti Domain Alias In the Odoo 17 ERP Module
Multi Domain Alias In the Odoo 17 ERP Module
 
Narcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdfNarcotic and Non Narcotic Analgesic..pdf
Narcotic and Non Narcotic Analgesic..pdf
 
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
31 ĐỀ THI THỬ VÀO LỚP 10 - TIẾNG ANH - FORM MỚI 2025 - 40 CÂU HỎI - BÙI VĂN V...
 
ICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdfICS2208 Lecture6 Notes for SL spaces.pdf
ICS2208 Lecture6 Notes for SL spaces.pdf
 
4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx4.16.24 21st Century Movements for Black Lives.pptx
4.16.24 21st Century Movements for Black Lives.pptx
 
MS4 level being good citizen -imperative- (1) (1).pdf
MS4 level   being good citizen -imperative- (1) (1).pdfMS4 level   being good citizen -imperative- (1) (1).pdf
MS4 level being good citizen -imperative- (1) (1).pdf
 
Mental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young mindsMental Health Awareness - a toolkit for supporting young minds
Mental Health Awareness - a toolkit for supporting young minds
 
Active Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdfActive Learning Strategies (in short ALS).pdf
Active Learning Strategies (in short ALS).pdf
 
4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx4.16.24 Poverty and Precarity--Desmond.pptx
4.16.24 Poverty and Precarity--Desmond.pptx
 
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
Unraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptxUnraveling Hypertext_ Analyzing  Postmodern Elements in  Literature.pptx
Unraveling Hypertext_ Analyzing Postmodern Elements in Literature.pptx
 
Textual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHSTextual Evidence in Reading and Writing of SHS
Textual Evidence in Reading and Writing of SHS
 
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITWQ-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
Q-Factor HISPOL Quiz-6th April 2024, Quiz Club NITW
 

Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web

  • 1. © Copyright 2011 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web Owen Sacco, John G. Breslin & Stefan Decker firstname.lastname@deri.org IEEE TrustCom 2013 – Melbourne Australia Tuesday 16th July 2013
  • 2. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Introduction  Current Social Networks  provide generic privacy settings for sharing information  do not take user’s trust into account
  • 3. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Introduction In reality, we only share parts of our information to whom we trust
  • 4. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Research Contribution In this work we focus on: Using various methods to automatically assert fine-grained subjective trust values for different Social Factors to grant or restrict access to personal information
  • 5. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Use Case 1. Alex sends a request to view John’s personal information 2. Alex is granted access to the information which his trust value (asserted by John) satisfies a trust threshold (assigned by John)  Example: Provide John’s phone number to Alex if he has a trust level of 0.83 Social Web Platforms ... 1 2 Alex John
  • 6. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Defining Trust In our work trust is defined as: “a person’s subjective belief that another person will act responsibly and will not misuse the information”
  • 7. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Factors  Trust judgments are influenced by Social Factors:  Past interactions with a person  Opinions of a person’s actions  Other people’s opinions  Rumours  Psychological factors impacted over time  Life events  and so forth  These can be hard to compute since the information required is limited and unavailable in Social Networks
  • 8. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Factors  However, we have identified several factors that trust can be asserted from the information available in Social Networks:  Identity  Profile Similarity  Relationship type  Reputation in a Web of Trust  Interactions
  • 9. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertion Framework Social Web Platforms ... Alex JohnSocial Semantic Web Platform Trust Manager 1 2 1 2 3 5 4 6
  • 10. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Semantic Web
  • 11. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Model  Trust values are represented in the range of [-1,1]  1 represents absolute trust  0 represents either uncertainty or unknown  -1 represents absolute distrust  Positive values less than 1 represents trust but with an element of uncertainty  This also applies to negative values
  • 12. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Identity-based Trust  Relies on authentication  The WebID protocol is used as a Single Sign-On Service for Semantic Web applications – WebID provides users to authenticate using FOAF and X.509 certificates over SSL  The subjective trust value is assigned to the requester after s/he authenticates using WebID  1 if successful, -1 if unsuccessful and 0 if aborted  Definition 1: Identity-based Trust Certificate(Cert,R) Profile(RP,R) Verify(Cert,RP)∧ ∧ ∧ AssertedBy(R,U) AssignTrust(IDT,R)⇒
  • 13. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Profile Similarity-based Trust  Asserting trust based on the similarities between the user profile and the requester  Basic information attributes are not taken into consideration  Attributes such as work place information, interests, connected peers and other profile attributes are compared  Profile similarity-based trust calculation: – denotes profile similarity subjective trust valueτ – m denotes the matched distinct profile attributes between the user’s profile and the requester’s profile – a denotes the user’s distinct profile attributes
  • 14. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 2: Profile Similarity-based Trust ∀UA(Profile(RP,R) Profile(UP,U)∧ ∧ Contain(RA,RP) Contain(UA,UP) Match(RA,UA)∧ ∧ ∧ AssertedBy(R,U)) AssignTrust(PST,R)⇒  where PST {-1,1}∈
  • 15. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Relationship-based Trust  The Social Semantic Web provides the user to enter a value of how much s/he trusts that particular relationship type  Definition 3: Relationship-based Trust ∀URT(Profile(UP,U) Contain(URT,UP)∧ ∧ Relationship(R,URT) AssertedBy(R,U)) AssignTrust(RLP,R)∧ ⇒  where RLP {-1,1}∈
  • 16. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Reputation-based Trust  Consists of a trust value of a user within a Social graph based on all trust values given by other users  Reputation-based trust value is the weighted average value of all trust values given to a user – The user’s trust values assigned within a network – The weights denotes the reputation value of the person that assigned the trust value  Reputation-based trust calculation: – τ denotes reputation trust – w denotes the reputation of the user assigning a subjective trust value to the requester – v denotes the requester’s subjective trust value assigned by a user
  • 17. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 4: Reputation-based Trust SocialGraph(SG,U) Contain(R,SG) Measure(RV,SG)∧ ∧ ∧ Reputaion(RV,R) AssertedBy(R,U) AssignTrust(RPT,R)∧ ⇒  where RPT {-1,1}∈
  • 18. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Interactions-based Trust  Consists of users sharing microblog posts, comments, photos, videos, links and other content with their peers  Interactions-based trust calculation: – denotes interactions trust valueτ – r denotes the number of interactions between the requester and the user – u denotes the number of all the user’s interactions in the Social Web platform
  • 19. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 5: Interactions-based Trust ∀UI(Profile(UP,U) Contain(UI,UP) Interaction(R,UI)∧ ∧ ∧ AssertedBy(R,U)) AssignTrust(INTT,R)⇒  where INTT {-1,1}∈
  • 20. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Aggregating Subjective Trust Values  To assign a fine-grained user’s subjective trust value to a requester  An average of all the subjective trust values of a requester from each social factor assigned by the user  Aggregate subjective trust calculation: – denotes the aggregated subjective trust valueτ – s a subjective trust value asserted based on a social factor
  • 21. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertion Ontology (TAO) http://vocab.deri.ie/tao
  • 22. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Information Confidentiality http://vocab.deri.ie/ppo
  • 23. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Implementing Trust Assertions
  • 24. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Results
  • 25. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Future Work  To show how this model is useful for other scenarios (for example for Recommender Systems)  To calculate automatically Relationship-based Trust values  To take into account the trust values of Certificate Authorities when calculating Identity-based Trust  To compare our model with other state-of-the-art models
  • 26. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Thanks! Email: owen.sacco@deri.org

Hinweis der Redaktion

  1. Generic privacy settings – does not provide privacy settings for each part of the information SNs do not cater for trust, neither capture trust not even provide users to enter any trust information Assumes that every person in ones social graph has the same trust level Does not provide users to enter trust values for different user lists Cumbersome to manage contacts with respect to trust
  2. Unlike the state-of-the art that focuses on 1 social factor and assumes that the users manually provide a trust score
  3. We are working with personal subjective trust values Asymmetric, if I give a trust value to a person, it does not mean that person has the same trust value for myself .. Therefore each person calculates personal trust values for people
  4. identity of the requester: trust can be asserted from the credentials exchanged through authentication, profile similarity between the user and the requester: trust can be asserted by matching several profile attributes with one another, the relationship type between the user and the requester: trust can be asserted based on the importance of the relationship type, the reputation of the user within a trusted network: trust can be asserted through reputation information asserted from other entities in a Web of Trust, trust based on interactions between the user and the requester: trust can be asserted based on the number of interactions between the user and the requester over a particular period of time.
  5. “ the more similar two people were, the greater the trust between them” Attributes such as work place information, interests, projects, connected peers and other profile attributes are compared profile-similarity by calculating the relationship between the sum of matched distinct profile attributes between the user’s profile and the requester’s profile, and the total sum of all the distinct attributes within the user’s profile.