Computer Science ›› 2018, Vol. 45 ›› Issue (11): 13-28.doi: 10.11896/j.issn.1002-137X.2018.11.002

• Surveys • Previous Articles     Next Articles

Research Progress of Network Trust

LIU Jian-sheng1, YOU Zhen-xu1, YUE Guang-xue1,2, WANG Jie-tai2, LIU Jian-hua2   

  1. (Department of Science,Jiangxi University of Science and Technology,Ganzhou,Jiangxi 341000,China)1
    (Department of Mathematics and Information Engineering,Jiaxing University,Jiaxing,Zhejiang 314000,China)2
  • Received:2018-01-05 Published:2019-02-25

Abstract: The rapid development of Internet provides people with a free and open way of interaction.Internet services have become an important part of populace’s daily life.How to evaluate the trustworthiness of characterizing node interaction has become one of the core issues in network applications.Due to the anonymity,randomness and dynamic characteristics of open network environment,users face many risks in choosing the target node in the network for interaction.The trust evaluation mechanism based on node interaction becomes an effective strategy mechanism to suppress the malicious and fake behaviors of network.First of all,this paper outlined the related properties of trust,and formally defined and constructed the trust network according to the interactive behavior among network nodes and the characte-ristics of their trust relationship.Then,this paper analyzed the framework of trust mechanism,and discussed the research focuses and security threats of trust mechanism in P2P networks,e-commerce and social networks.At last,this paper focused on the comparison and analysis of typical trust models in different fields,detailed the effectiveness and shortcomings of anti-attack,and proposed the research direction of future trust mechanisms in terms of improving the model algorithm and enhancing the anti-attack capability of model.

Key words: Malicious attack, Network interaction, Trust mechanism, Trust model

CLC Number: 

  • TP393
[1]BEATTY P,REAY I,DICK S,et al.Consumer trust in e-commerce web sites:A meta-study[J].Acm Computing Surveys,2011,43(3):1-46.
[2]YOU J,SHANGGUAN J L,XU S K,et al.Distributed dynamic trust management model based on trust reliability[J].Journal of Software,2017,28(9):2354-2369.(in Chinese)
游静,上官经伦,徐守坤,等.考虑信任可靠度的分布式动态信任管理模型[J].软件学报,2017,28(9):2354-2369.
[3]ROUSSEAU D M,SITKIN S B,BURT R S,et al.Not so diffe- rent after all:Across-discipline view of trust [J].Academy of Management Review,1998,23(3):393-404.
[4]MCKNIGHT D H,CHERVANY N L.The meanings of trust [R].University of Minnesota,1996.
[5]MCKNIGHT D H,CHOUDHURY V,KACMAR C.Trust in e-commerce vendors:a two-stage model[C]∥Twenty First In-ternational Conference on Information Systems.DBLP,2000:532-536.
[6]MCKNIGHT D H,CHERVANY N L.What trust means in ecommerce customer relationship:an interdisciplinary concep-tual typology [J].International Journal of Electronic Commerce,2001,6(2):35-59.
[7]GAMBETTA D.Can we trust trust [J].Trust:Making and Breaking Cooperative Relations,2000,1(13):213-237.
[8]SHERCHAN W,NEPAL S,PARIS C.A survey of trust in social networks [J].ACM Computing Surveys (CSUR),2013,45(4):1-33.
[9]SCHOORMAN F D,MAYER R C,DAVIS J H.An integrative model of organizational trust:Past,present,and future[J].Academy of Management Review,1995,20(3):709-734.
[10]JSANG A,ISMAIL R,BOYD C.A survey of trust and reputation systems for online service provision [J].Decision Support Systems,2007,43(2):618-644.
[11]WANG X F.Research on the tactics representation and quantitative model of trust management [D].Changsha:National University of Defense Technology,2009.(in Chinese)
王晓峰.信任管理的策略表示与量化模型研究[D].长沙:国防科学技术大学,2009.
[12]HUANG J,FOX M S.An ontology of trust:formal semantics and transitivity[C]∥International Conference on Electronic Commerce:the New E-Commerce-Innovations for Conquering Current Barriers,Obstacles and Limitations to Conducting Successful Business on the Internet.DBLP,2006:259-270.
[13]LI X Y,GUI X L.Research on dynamic trust model for large scale distributed environment[J].Journal of Software,2007,18(6):1510-1521.(in Chinese)
李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521.
[14]LI Y J,DAI Y F.Research on trust mechanism for peer-to-peer network[J].Chinese Journal of Computers,2010,33(3):390-405.(in Chinese)
李勇军,代亚非.对等网络信任机制研究[J].计算机学报,2010,33(3):390-405.
[15]LIANG Z Q,SHI W S.PET:A Personalized trust model with reputation and risk evaluation for P2P resource sharing[C]∥Proceeding of 38th Annual Hawaii International Conference on System Sciences.Piscataway:IEEE Computer Society,2005:201-211.
[16]TANG W,CHEN Z.Research of subjective trust management model based on the fuzzy set theory[J].Journal of Software,2003,14(8):1401-1408.(in Chinese)
唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.
[17]AUDUN J.Alogic for uncertain probabilities[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2001,9(3):279-311.
[18]XU J.A Survey of Trust Modeling of Uncertainty Theory[J].Microcomputer Systems,2017,38(1):100-106.(in Chinese)
徐军.不确定性理论的信任建模研究综述[J].小型微型计算机系统,2017,38(1):100-106.
[19]GAN Z B,ZENG C,LI K,et al.Construction and optimization of trust network in e-commerce environment[J].Chinese Journal of Computers,2012,35(1):27-37.
[20]GAN Z B,ZENG C,MA Y,et al.C2C e-commerce trust algorithm based on trust network[J].Journal of Software,2015,26(8):1946-1959.(in Chinese)
甘早斌,曾灿,马尧,等.基于信任网络的C2C电子商务信任算法[J].软件学报,2015,26(8):1946-1959.
[21]WANG J P,SUN B,NIU X X,et al.Distributed trust model based on parameter modeling [J].Journal on Communications,2013,34(4):47-59.(in Chinese)
汪京培,孙斌,钮心忻,等.基于参数建模的分布式信任模型[J].通信学报,2013,34(4):47-59.
[22]MARSH S P.Formalising trust as a computational concept [D].Stirling:University of Stirling,1994.
[23]BLAZE M,FEIGENBAUM J,LACY J.Decentralized trust management[C]∥17’th Symposium on Security and Privacy.IEEE Computer Society Press,1996:164-173.
[24]WINSBOROUGH W H,SEAMONS K E,JONES V E.Automated Trust Negotiation[M].North Carolina State University at Raleigh,2000.
[25]WINSBOROUGH W H,LI N.Towards practical automated trust negotiation[C]∥Michael J B,ed.International Workshop on Policies for Distributed Systems and Networks.Washington:IEEE Computer Society Press,2002:92-103.
[26]LIAO Z S,JIN H,LI C S,et al.Automated trust negotiation and its development trend[J].Journal of Software,2006,17(9):1933-1948.(in Chinese)
廖振松,金海,李赤松,等.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948.
[27]LI J X,HUAI J P,LI X X.Research on automated trust negotiation[J].Journal of Software,2006,17(1):124-133.(in Chinese)
李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133.
[28]DUMA C,SHAHMEHRI N,CARONNI G.Dynamic trust metrics for peer-to-peer systems[C]∥Sixteenth International Workshop on Database and Expert Systems Applications,2005.IEEE,2005:776-781.
[29]ZHANG H B,WANG Y,ZHANG X Z.Transaction similarity-based contextual trust evaluation in e-commerce and e-service environments[C]∥Proc.of the 9th Int’l Conf.on Web Service.Washington:IEEE Computer Society Press,2011:500-507.
[30]LIU Y C,LIANG Y H.P2P Dynamic Trust Model Based on Contextual Factors [J].Journal of Communication,2016,37(8):34-45.(in Chinese)
刘义春,梁英宏.基于上下文因素的P2P动态信任模型[J].通信学报,2016,37(8):34-45.
[31]DELLAROCAS C.Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior[C]∥ACM Conference on Electronic Commerce.ACM,2000:150-157.
[32]WHITBY A,JOSANG A,INDULSKA J.Filtering out unfair ratings in Bayesian reputation systems [J].The Icfain Journal of Management Research,2005,4(2):48-64.
[33]JIANSHU W,CHUNYAN M,ANGELA G.An entropy-based approach to protecting rating systems from unfair testimonies [J].Ieice Transactions on Information and Systems,2006,89(9):2502-2511.
[34]YANG Y,SUN Y L,REN J,et al.Building trust in online rating systems through signal modeling[C]∥IEEE ICDCS Workshop Trust Reputat.Manage,Toronto,ON,Canada,2007.
[35]LAURETI P,MORET L,ZHANG Y C,et al.Information filtering via iterative refinement [J].EPL(Europhysics Letters),2006,75(6):1006.
[36]ZHANG J,COHEN R.A personalized approach to address unfair ratings in multiagent reputation systems[C]∥AAMAS06 Workshop on Trust in Multi agent Systems.May 2006.
[37]YANG Y,SUN Y L,KAY S,et al.Defending online reputation systems against collaborative unfair raters through signal mode-ling and trust[C]∥ACM Symposium on Applied Computing.ACM,2009:1308-1315.
[38]LIU Y,SUN Y.Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis[C]∥IEEE Second International Conference on Social Computing.IEEE,2010:65-72.
[39]YOU W,LIU L,XIA M.Reputation inflation detection in a Chinese C2C market [J].Electronic Commerce Research and Applications,2011,10(5):510-519.
[40]KARL A,ZORAN D.Managing trust in a Peer-2-Peer information system[C]∥Proceeding of the 10th International Confe-rence on Information and Knowledge Management.Atlanta,Georgia,USA,2001:310-317.
[41]HUANG J N,SONG J X,LIU W D,et al.A Survey of Peer-to-Peer Network Reputation Mechanisms[J].Small Microcomputer Systems,2006,27(7):1175-1181.(in Chinese)
黄金能,宋佳兴,刘卫东,等.对等网络信誉机制研究综述[J].小型微型计算机系统,2006,27(7):1175-1181.
[42]KAMVAR S.The EigenTrust algorithm for reputation management in P2P networks [C]∥12th International World Wide Web Conference.2003:640-651.
[43]ZHOU R F,KAI H W.PowerTrust:a robust and scalable reputation system for trusted peer-to-peer computing [J].IEEE Transaction on Parallel and Distributed Systems,2007,18(4):460-473.
[44]XIONG L,LIU L.PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities [J].IEEE Transactions on Knowledge Data Engineering,2004,16(7):843-857.
[45]WANG Y,VASSILEVA J.Bayesian network trust model in peer-to-peer networks[C]∥Moro G,ed.Proc.of the 2nd Int’l workshop on Agents and Peer-to-Peer Computing.Berlin:Springer Verlag,2004:23-34.
[46]BETH T,BORCHERDING M,KLEIN B.Valuation of trust in open network[C]∥European Symposium on Research in Security (ESORICS).Springer Verlag,1994:3-18.
[47]TIAN C Q,ZOU S H,TIAN H R,et al.A new trust model based on reputation and risk evaluation for P2P networks[J].Journal of Electronics & Information Technology,2007,29(7):1628-1632.(in Chinese)
田春岐,邹仕洪,田慧蓉,等.一种基于信誉和风险评价的分布式P2P信任模型[J].电子与信息学报,2007,29(7):1628-1632.
[48]MA X,GAN Z B,LU H W,et al.A method of predicting potential trust relationships in e-commerce[J].Computer Science,2014,12(41):138-142.(in Chinese)
马霄,甘早斌,鲁宏伟,等.电子商务中的一种潜在信任关系预测方法[J].计算机科学,2014,12(41):138-142.
[49]YU B,SINGH M P.An evidential model of distributed reputation management [C]∥Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems:Part 1.ACM,2002:294-301.
[50]ZHANG S B,XU C X.Study on the trust evaluation approach based on cloud model[J].Chinese Journal of Computers,2013,36(2):422-431.
[51]GAN Z B,DING Q,LI K,et al.Reputation-based multi-dimensional trust algorithm[J].Journal of Software,2011,22(10):2401-2411.(in Chinese)
甘早斌,丁倩,李开,等.基于声誉的多维度信任计算算法[J].软件学报,2011,22(10):2401-2411.
[52]MA Y.Research on trust network discovery and trust fusion in online social networks [D].Wuhan:Huazhong University of Science and Technology,2014.(in Chinese)
马尧.在线社会网络的信任网络发现与信任融合研究[D].武汉:华中科技大学,2014.
[53]AL-OUFI S,KIM H N,SADDIK A E.A group trust metric for identifying people of trust in online social networks[J].Expert Systems with Applications,2012,39(18):13173-13181.
[54]WANG G,GUI X L.Selection of trading nodes in social net- works and calculation of trust relationship [J].Journal of Computer,2013,36(2):368-383.(in Chinese)
王刚,桂小林.社会网络中交易节点的选取及其信任关系计算方法[J].计算机学报,2013,36(2):368-383.
[55]QIAO X Q,YANG C,LI X F,et al.A Method for Computing Trust Based on User Context in Social Networks [J].Journal of Software,2011,34(12):2403-2412.(in Chinese)
乔秀全,杨春,李晓峰,等.社交网络中一种基于用户上下文的信任度计算方法[J].软件学报,2011,34(12):2403-2412.
[56]TIAN J F,WU L J.Multinomial subjective logic based extended trust propagation model [J].Journal on Communications,2013,34(5):12-19.
[57]LIU G,YANG Q,WANG H,et al.Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic[C]∥Proceedings of the International Conference on Computer Communications.IEEE,2014:1698-1706.
[58]CERUTTI F,TONIOLO A,OREN N,et al.Subjective logic ope- rators in trust assessment:an empirical study[J].Information Systems Frontiers,2015,17(4):743-762.
[59]XU J,ZHONG Y S,ZHU W Q.A Multidimensional Trust Transfer Model Based on Intuitionistic Fuzzy Theory[J].Journal of Chinese Computer Systems,2015,36(12):2714-2718.(in Chinese)
徐军,钟元生,朱文强.一种基于直觉模糊理论的多维信任传递模型[J].小型微型计算机系统,2015,36(12):2714-2718.
[60]ZHANG B,ZHANG H,LI M Z,et al.Trust Traversal:A trust link detection scheme in social network [J].Computer Networks,2017,120:105-125.
[61]CHEN T,ZHU Q,ZHOU M,et al.Trust-Based recommendation algorithm in social network[J].Journal of Software,2017,28(3):721-731.(in Chinese)
陈婷,朱青,周梦,等.社交网络环境下基于信任的推荐算法[J].软件学报,2017,28(3):721-731.
[62]WANG R Q,JIANG Y L,LI Y X,et al.A Collaborative Filtering Recommendation Algorithm Based on Multiple Social Trusts [J].Journal of Computer Research and Development,2016,53(6):1389-1399.(in Chinese)
王瑞琴,蒋云良,李一啸,等.一种基于多元社交信任的协同过滤推荐算法[J].计算机研究与发展,2016,53(6):1389-1399.
[1] HUANG Ting-ting, FENG Feng. Study on Optimization of Heterogeneous Data Fusion Model in Wireless Sensor Network [J]. Computer Science, 2020, 47(11A): 339-344.
[2] WU Dai-yue, LI Qiang, YU Xiang, HUANG Jun. Trust Model for P2P Based on Blockchain [J]. Computer Science, 2019, 46(12): 138-147.
[3] QU Guang-qiang, SUN Bin. Study on Trustworthy Backtracking Mechanism of Experimental Teaching Fund Based on Blockchain [J]. Computer Science, 2019, 46(11A): 553-556.
[4] ZHU Wen-qiang. Personalized Trustworthy Group Identifying Model Based on O2O Service-oriented Mobile Social Network [J]. Computer Science, 2018, 45(6): 76-83.
[5] LIAO Xin-kao, WANG Li-sheng, LIU Xiao-jian and XU Xiao-jie. Personalized Trust Model in Network Environment [J]. Computer Science, 2017, 44(8): 100-106.
[6] XU Xue-fei, LI Jian-hua, YANG Ying-hui and GUO Rong. Military Aeronautical Communication Spectrum Sharing Trust Mechanism Based on Cloud Model [J]. Computer Science, 2016, 43(9): 169-174.
[7] SHU Jian and LIANG Chang-yong. Dynamic Trust Model Based on DS Evidence Theory under Cloud Computing Environment [J]. Computer Science, 2016, 43(8): 105-109.
[8] YOU Jing, FENG Hui and SUN Yu-qiang. Trust Evaluation and Service Selection Based on Collaborative Recommendation for Cloud Environment [J]. Computer Science, 2016, 43(5): 140-145.
[9] LI Dao-quan, WU Xing-cheng and GUO Rui-min. Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk [J]. Computer Science, 2016, 43(5): 117-121.
[10] PENG Hao, ZHAO Dan-dan, YU Yun-jie, WU Zhen-dong and WU Song-yang. Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks [J]. Computer Science, 2016, 43(10): 66-69.
[11] ZHANG Ming, XU Bo-yi and GUO Yan-lai. Review of Typical Attacks on SSL/TLS [J]. Computer Science, 2015, 42(Z6): 408-412.
[12] CHEN Hao and HUANG Hai-ping. Key Management Scheme of Wireless Sensor Network Based on Trust Evaluation Algorithm between Nodes [J]. Computer Science, 2015, 42(Z6): 395-398.
[13] YANG Zhang-wei, WANG Li-ping and LAI Wen-ping. Improved Design for Trust Model on Domain Entity of Computing Grid [J]. Computer Science, 2015, 42(Z11): 386-389.
[14] WU Chun-qiong and HUANG Rong-ning. Dynamic Linear Relevance Based Access Control Model [J]. Computer Science, 2015, 42(9): 94-96.
[15] WU Hai-qin and WANG Liang-min. Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network [J]. Computer Science, 2015, 42(8): 157-160.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!