Computer Science ›› 2018, Vol. 45 ›› Issue (6): 76-83.doi: 10.11896/j.issn.1002-137X.2018.06.013

• Netword & Communication • Previous Articles     Next Articles

Personalized Trustworthy Group Identifying Model Based on O2O Service-oriented Mobile Social Network

ZHU Wen-qiang   

  1. School of Software and Communication Engineering,Jiangxi University of Finance and Economics,Nanchang 330013,China
  • Received:2017-05-06 Online:2018-06-15 Published:2018-07-24

Abstract: With the quick development of mobile communication technique at present,the mobile social network is combining with O2O services more tightly than ever.Users are used to consulting their mobile social networks about those O2O services which they want to order,and submitting their feedbacks and ratings about these services to their mobile social networks after enjoyed these services.However,the mobile social networks are openness,and users can submit their feedbacks anonymously,so it is critical for users to identify the trustworthy group to check if these feedbacks are reliable.The present researches on trustworthy user group identifying are mainly focused on cloud computing and online social networks.Most of these researches use global methods to compute the trust value of users,and neglect factors such as social circles,service preferences,personal interests,and so on,so these existing researches are unfit for the O2O service-oriented personal social networks.To identify the trustworthy group in personal mobile social networks effectively,this paper proposed a trust model based on the famous Advogato model.It takes the interaction frequency,similarity of users’ social circles,similarity of users’ interests into consideration,uses the capacity-first maximum flow search method to transfer the trust flow between users to build their personal trust networks,and finally outputs the ranked trustworthy user group.The experimental results on real dataset show that the proposed trust model has superiorperformance of the prediction accuracy(Pre),missing rate(MsR) and top ranking range(Trr) while comparing to the existing group trust models.

Key words: O2O services, Trust model, Trust network, Trustworthy group identifying

CLC Number: 

  • TP393
[1]腾讯公司.移动QQ及微信用户人数统计[EB/OL].(2016-10).http://pc.qq.com/mobile.html.
[2]CNNIC.2016年第38次中国互联网络发展状况统计报告[R].北京:2016.
[3]YORK S N.Mobile Social Network[M]//Encyclopedia of Social Network Analysis and Mining.New York:Springer,2014.
[4]CCTV.2016年315晚会[EB/OL].http://315.cntv.cn/special/2016/index.shtml.
[5]LEVIEN R.Attack-Resistant Trust Metrics[M]//Computing with Social Trust.2009:121-132.
[6]AL-OUFI S,KIM H N,SADDIK A E.A group trust metric for identifying people of trust in online social networks[J].Expert Systems with Applications,2012,39(18):13173-13181.
[7]ABDELGHANI W,ZAYANI C A,AMOUS I,et al.Trust Management in Social Internet of Things:A Survey[C]//IFIP Conference on e-Business,e-Services,and e-Society.2016:187-199.
[8]LI P C,ZHONG Y S.A study of offline merchants’ acceptance of mobile O2O commerce[J].Contemporary Finance & Economi-cs,2014(9):75-87.(in Chinese)
李普聪,钟元生.移动O2O商务线下商家采纳行为研究[J].当代财经,2014(9):75-87.
[9]Advogato.Introduction about advogato trust metric[EB/OL].http://www.advogato.org/trust-metric.html.
[10]XIAO S,DONG M.Hidden semi-Markov model-based reputation management system for online to offline (O2O) e-commerce markets[J].Decision Support Systems,2015,77(C):87-99.
[11]ZOLFAGHAR K,AGHAIE A.A syntactical approach for interpersonal trust prediction in social web applications:Combining contextual and structural data[J].Knowledge-Based Systems,2012,26:93-102.
[12]WANG Y,WANG X,ZUO W L.Trust Prediction Modeling Based on Social Theories[J].Journal of Software,2014,25(12):2893-2904.(in Chinese)
王英,王鑫,左万利.基于社会学理论的信任关系预测模型[J].软件学报,2014,25(12):2893-2904.
[13]ZHANG W Y,WU B,GENG Y S,et al.Joint Rating and Trust Collective Matrix Prediction Based on Factorization[J].Acta Electronica Sinica,2016,44(7):1581-1586.(in Chinese)
张维玉,吴斌,耿玉水,等.基于协同矩阵分解的评分与信任联合预测[J].电子学报,2016,44(7):1581-1586.
[14]GAN Z B,ZENG C,MA Y,et al.C2C E-Commerce trust Algorithm Based on trust Network[J].Journal of Software,2015,26(8):1946-1959.(in Chinese)
甘早斌,曾灿,马尧,等.基于信任网络的C2C电子商务信任算法[J].软件学报,2015,26(8):1946-1959.
[15]JIANG L,XU J,ZHANG K,et al.A new evidential trust model for open distributed systems[J].Expert Systems with Applications,2012,39(3):3772-3782.
[16]LAX G,SARNÉ G M L.CellTrust:a reputation model for C2C commerce[J].Electronic Commerce Research,2008,8(4):193-216.
[17]GAN Z B,ZENG C,LI K,et al.Construction and Optimization of Trust Network in E-Commerce Environment[J].The Chinese Journal of Computers,2012,35(1):27-37.(in Chinese)
甘早斌,曾灿,李开,等.电子商务下的信任网络构造与优化[J].计算机学报,2012,35(1):27-37.
[18]JØSANG A,BHUIYAN T.Optimal Trust Network Analysis with Subjective Logic[C]//International Conference on Emerging Security Information.IEEE,2008:179-184.
[19]LI D Q,WU X C,GUO R M.Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk[J].Computer Science,2016,43(5):117-121.(in Chinese)
李道全,吴兴成,郭瑞敏.一种基于二层节点和客观风险的电子商务交易信任模型[J].计算机科学,2016,43(5):117-121.
[20]HUR J,GUO M,PARK Y,et al.Reputation-Based Collusion Detection with Majority of Colluders[J].Ieice Transactions on Information & Systems,2016,E99.D(7):1822-1835.
[21]FORD L R,FULKERSON D R.Maximal Flow Through a Network[M]//Classic Papers in Combinatorics.Boston:Birkhau-ser,2009:243-248.
[22]MARK G.The Strength of Weak Ties:A network theory revisited[J].Sociological Theory,1983,1(6):201-233.
[23]HOFFMAN K,ZAGE D,NITA-ROTARU C.A survey of attack and defense techniques for reputation systems[J].Acm Computing Surveys,2009,42(1):5515-5528.
[24]GILBERT E,KARAHALIOS K.Predicting tie strength with social media[C]//International Conference on Human Factors in Computing Systems(CHI 2009).Boston,MA,USA,2009:211-220.
[25]CANTADOR I,BRUSILOVSKY P,KUFLIK T.Second workshop on information heterogeneity and fusion in recommender systems [C]//Proceedings of the 2nd International Workshop on Information Heterogeneity and Fusion in Recommender Systems(HetRec2011).2011:387-388.
[26]KLEINBERG J.The Small-World Phenomenon:An Algorithmic Perspective[C]//ACM Symposium on Theory of Computing.2000:163-170.
[1] WU Dai-yue, LI Qiang, YU Xiang, HUANG Jun. Trust Model for P2P Based on Blockchain [J]. Computer Science, 2019, 46(12): 138-147.
[2] ZHANG Hong-bo, WANG Jia-lei, ZHANG Li-juan, LIU Zhi-hong. Trust Network Based Collaborative Filtering Recommendation Algorithm [J]. Computer Science, 2018, 45(8): 146-150.
[3] WANG Jia-lei, GUO Yao, LIU Zhi-hong. Service Recommendation Method Based on Social Network Trust Relationships [J]. Computer Science, 2018, 45(11A): 402-408.
[4] LIU Jian-sheng, YOU Zhen-xu, YUE Guang-xue, WANG Jie-tai, LIU Jian-hua. Research Progress of Network Trust [J]. Computer Science, 2018, 45(11): 13-28.
[5] LIAO Xin-kao, WANG Li-sheng, LIU Xiao-jian and XU Xiao-jie. Personalized Trust Model in Network Environment [J]. Computer Science, 2017, 44(8): 100-106.
[6] HE Ming, LIU Wei-shi and WEI Zheng. Collaborative Filtering Recommendation Based on Random Walk Model in Trust Network [J]. Computer Science, 2016, 43(6): 257-262.
[7] YOU Jing, FENG Hui and SUN Yu-qiang. Trust Evaluation and Service Selection Based on Collaborative Recommendation for Cloud Environment [J]. Computer Science, 2016, 43(5): 140-145.
[8] LI Dao-quan, WU Xing-cheng and GUO Rui-min. Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk [J]. Computer Science, 2016, 43(5): 117-121.
[9] PENG Hao, ZHAO Dan-dan, YU Yun-jie, WU Zhen-dong and WU Song-yang. Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks [J]. Computer Science, 2016, 43(10): 66-69.
[10] ZHANG Ming, XU Bo-yi and GUO Yan-lai. Review of Typical Attacks on SSL/TLS [J]. Computer Science, 2015, 42(Z6): 408-412.
[11] YANG Zhang-wei, WANG Li-ping and LAI Wen-ping. Improved Design for Trust Model on Domain Entity of Computing Grid [J]. Computer Science, 2015, 42(Z11): 386-389.
[12] WU Chun-qiong and HUANG Rong-ning. Dynamic Linear Relevance Based Access Control Model [J]. Computer Science, 2015, 42(9): 94-96.
[13] WU Hai-qin and WANG Liang-min. Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network [J]. Computer Science, 2015, 42(8): 157-160.
[14] CAO Xiao-mei and HU Wen-jie. Dynamic Role Property Based Trust Model for MP2P Networks [J]. Computer Science, 2015, 42(8): 106-111.
[15] XU Pei, LIAN Bin, SHAO Kun, CHEN Jun and AN Ning. Research on Fusion Trust Model for Decision-making [J]. Computer Science, 2015, 42(12): 157-161.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!