SlideShare une entreprise Scribd logo
1  sur  26
© Copyright 2011 Digital Enterprise Research Institute. All rights reserved.
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Fine-Grained Trust Assertions for
Privacy Management in the
Social Semantic Web
Owen Sacco, John G. Breslin & Stefan Decker
firstname.lastname@deri.org
IEEE TrustCom 2013 – Melbourne Australia Tuesday 16th
July 2013
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Introduction
 Current Social Networks
 provide generic privacy settings for sharing information
 do not take user’s trust into account
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Introduction
In reality, we only share parts of
our information to whom we trust
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Research Contribution
In this work we focus on:
Using various methods to
automatically assert fine-grained
subjective trust values for different
Social Factors to grant or restrict
access to personal information
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Use Case
1. Alex sends a request to view John’s personal
information
2. Alex is granted access to the information which
his trust value (asserted by John) satisfies a trust
threshold (assigned by John)
 Example: Provide John’s phone number to Alex if
he has a trust level of 0.83
Social Web Platforms
...
1
2
Alex
John
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Defining Trust
In our work trust is defined as:
“a person’s subjective belief
that another person will act
responsibly and will not
misuse the information”
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Factors
 Trust judgments are influenced by Social Factors:
 Past interactions with a person
 Opinions of a person’s actions
 Other people’s opinions
 Rumours
 Psychological factors impacted over time
 Life events
 and so forth
 These can be hard to compute since the
information required is limited and unavailable in
Social Networks
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Factors
 However, we have identified several factors that
trust can be asserted from the information
available in Social Networks:
 Identity
 Profile Similarity
 Relationship type
 Reputation in a Web of Trust
 Interactions
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertion Framework
Social Web Platforms
...
Alex
JohnSocial Semantic Web Platform
Trust
Manager
1
2
1
2
3 5
4
6
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Semantic Web
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Model
 Trust values are represented in the range of [-1,1]
 1 represents absolute trust
 0 represents either uncertainty or unknown
 -1 represents absolute distrust
 Positive values less than 1 represents trust but with an
element of uncertainty
 This also applies to negative values
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Identity-based Trust
 Relies on authentication
 The WebID protocol is used as a Single Sign-On Service for
Semantic Web applications
– WebID provides users to authenticate using FOAF and X.509
certificates over SSL
 The subjective trust value is assigned to the requester
after s/he authenticates using WebID
 1 if successful, -1 if unsuccessful and 0 if aborted
 Definition 1: Identity-based Trust
Certificate(Cert,R) Profile(RP,R) Verify(Cert,RP)∧ ∧ ∧
AssertedBy(R,U) AssignTrust(IDT,R)⇒
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Profile Similarity-based Trust
 Asserting trust based on the similarities between the user
profile and the requester
 Basic information attributes are not taken into
consideration
 Attributes such as work place information, interests,
connected peers and other profile attributes are compared
 Profile similarity-based trust calculation:
– denotes profile similarity subjective trust valueτ
– m denotes the matched distinct profile attributes between
the user’s profile and the requester’s profile
– a denotes the user’s distinct profile attributes
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 2: Profile Similarity-based Trust
∀UA(Profile(RP,R) Profile(UP,U)∧ ∧
Contain(RA,RP) Contain(UA,UP) Match(RA,UA)∧ ∧ ∧
AssertedBy(R,U)) AssignTrust(PST,R)⇒
 where PST {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Relationship-based Trust
 The Social Semantic Web provides the user to enter a value
of how much s/he trusts that particular relationship type
 Definition 3: Relationship-based Trust
∀URT(Profile(UP,U) Contain(URT,UP)∧ ∧
Relationship(R,URT) AssertedBy(R,U)) AssignTrust(RLP,R)∧ ⇒
 where RLP {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Reputation-based Trust
 Consists of a trust value of a user within a Social graph
based on all trust values given by other users
 Reputation-based trust value is the weighted average value
of all trust values given to a user
– The user’s trust values assigned within a network
– The weights denotes the reputation value of the person that
assigned the trust value
 Reputation-based trust calculation:
– τ denotes reputation trust
– w denotes the reputation of the user assigning a subjective
trust value to the requester
– v denotes the requester’s subjective trust value assigned by a
user
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 4: Reputation-based Trust
SocialGraph(SG,U) Contain(R,SG) Measure(RV,SG)∧ ∧ ∧
Reputaion(RV,R) AssertedBy(R,U) AssignTrust(RPT,R)∧ ⇒
 where RPT {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Interactions-based Trust
 Consists of users sharing microblog posts, comments,
photos, videos, links and other content with their peers
 Interactions-based trust calculation:
– denotes interactions trust valueτ
– r denotes the number of interactions between the requester
and the user
– u denotes the number of all the user’s interactions in the
Social Web platform
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 5: Interactions-based Trust
∀UI(Profile(UP,U) Contain(UI,UP) Interaction(R,UI)∧ ∧ ∧
AssertedBy(R,U)) AssignTrust(INTT,R)⇒
 where INTT {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Aggregating Subjective Trust Values
 To assign a fine-grained user’s subjective trust value to a
requester
 An average of all the subjective trust values of a requester
from each social factor assigned by the user
 Aggregate subjective trust calculation:
– denotes the aggregated subjective trust valueτ
– s a subjective trust value asserted based on a social factor
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertion Ontology
(TAO)
http://vocab.deri.ie/tao
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Information Confidentiality
http://vocab.deri.ie/ppo
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Implementing Trust
Assertions
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Results
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Future Work
 To show how this model is useful for other
scenarios (for example for Recommender Systems)
 To calculate automatically Relationship-based Trust
values
 To take into account the trust values of Certificate
Authorities when calculating Identity-based Trust
 To compare our model with other state-of-the-art
models
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Thanks!
Email: owen.sacco@deri.org

Contenu connexe

Tendances

Blacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersBlacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersIAEME Publication
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsConference Papers
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...IJNSA Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsIJCSIS Research Publications
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)IAESIJEECS
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosef Gamble
 
Readymade M Tech Thesis
Readymade M Tech ThesisReadymade M Tech Thesis
Readymade M Tech Thesise2-matrix
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 

Tendances (20)

Blacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersBlacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential users
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Disseration M.Tech
Disseration M.TechDisseration M.Tech
Disseration M.Tech
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_Security
 
Readymade M Tech Thesis
Readymade M Tech ThesisReadymade M Tech Thesis
Readymade M Tech Thesis
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 

Similaire à Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web

IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET Journal
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust onlineTina Guenther
 
Trust blueprints icds 2014
Trust blueprints icds 2014Trust blueprints icds 2014
Trust blueprints icds 2014George Vanecek
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Soudé Fazeli
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationAlejandro Bellogin
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputationguestc12d53
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Logindrummondreed
 
Trustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsTrustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsPaolo Massa
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profilesHaishan Liu
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profilesHaishan Liu
 

Similaire à Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web (20)

Ithet
IthetIthet
Ithet
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust online
 
Trust blueprints icds 2014
Trust blueprints icds 2014Trust blueprints icds 2014
Trust blueprints icds 2014
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p network
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix Factorization
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Trustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsTrustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust Metrics
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profiles
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profiles
 

Dernier

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...JhezDiaz1
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxHumphrey A Beña
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinojohnmickonozaleda
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxPoojaSen20
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17Celine George
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxMaryGraceBautista27
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...Nguyen Thanh Tu Collection
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4MiaBumagat1
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptxiammrhaywood
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfJemuel Francisco
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSJoshuaGantuangco2
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️9953056974 Low Rate Call Girls In Saket, Delhi NCR
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYKayeClaireEstoconing
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatYousafMalik24
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxAshokKarra1
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Jisc
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Seán Kennedy
 

Dernier (20)

ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
ENGLISH 7_Q4_LESSON 2_ Employing a Variety of Strategies for Effective Interp...
 
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptxINTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
INTRODUCTION TO CATHOLIC CHRISTOLOGY.pptx
 
FILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipinoFILIPINO PSYCHology sikolohiyang pilipino
FILIPINO PSYCHology sikolohiyang pilipino
 
Raw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptxRaw materials used in Herbal Cosmetics.pptx
Raw materials used in Herbal Cosmetics.pptx
 
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptxFINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
FINALS_OF_LEFT_ON_C'N_EL_DORADO_2024.pptx
 
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptxCulture Uniformity or Diversity IN SOCIOLOGY.pptx
Culture Uniformity or Diversity IN SOCIOLOGY.pptx
 
How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17How to Add Barcode on PDF Report in Odoo 17
How to Add Barcode on PDF Report in Odoo 17
 
Science 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptxScience 7 Quarter 4 Module 2: Natural Resources.pptx
Science 7 Quarter 4 Module 2: Natural Resources.pptx
 
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
HỌC TỐT TIẾNG ANH 11 THEO CHƯƠNG TRÌNH GLOBAL SUCCESS ĐÁP ÁN CHI TIẾT - CẢ NĂ...
 
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptxLEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
LEFT_ON_C'N_ PRELIMS_EL_DORADO_2024.pptx
 
ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4ANG SEKTOR NG agrikultura.pptx QUARTER 4
ANG SEKTOR NG agrikultura.pptx QUARTER 4
 
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptxAUDIENCE THEORY -CULTIVATION THEORY -  GERBNER.pptx
AUDIENCE THEORY -CULTIVATION THEORY - GERBNER.pptx
 
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdfGrade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
Grade 9 Quarter 4 Dll Grade 9 Quarter 4 DLL.pdf
 
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTSGRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
GRADE 4 - SUMMATIVE TEST QUARTER 4 ALL SUBJECTS
 
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
call girls in Kamla Market (DELHI) 🔝 >༒9953330565🔝 genuine Escort Service 🔝✔️✔️
 
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITYISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
ISYU TUNGKOL SA SEKSWLADIDA (ISSUE ABOUT SEXUALITY
 
Earth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice greatEarth Day Presentation wow hello nice great
Earth Day Presentation wow hello nice great
 
Karra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptxKarra SKD Conference Presentation Revised.pptx
Karra SKD Conference Presentation Revised.pptx
 
Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...Procuring digital preservation CAN be quick and painless with our new dynamic...
Procuring digital preservation CAN be quick and painless with our new dynamic...
 
Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...Student Profile Sample - We help schools to connect the data they have, with ...
Student Profile Sample - We help schools to connect the data they have, with ...
 

Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web

  • 1. © Copyright 2011 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web Owen Sacco, John G. Breslin & Stefan Decker firstname.lastname@deri.org IEEE TrustCom 2013 – Melbourne Australia Tuesday 16th July 2013
  • 2. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Introduction  Current Social Networks  provide generic privacy settings for sharing information  do not take user’s trust into account
  • 3. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Introduction In reality, we only share parts of our information to whom we trust
  • 4. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Research Contribution In this work we focus on: Using various methods to automatically assert fine-grained subjective trust values for different Social Factors to grant or restrict access to personal information
  • 5. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Use Case 1. Alex sends a request to view John’s personal information 2. Alex is granted access to the information which his trust value (asserted by John) satisfies a trust threshold (assigned by John)  Example: Provide John’s phone number to Alex if he has a trust level of 0.83 Social Web Platforms ... 1 2 Alex John
  • 6. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Defining Trust In our work trust is defined as: “a person’s subjective belief that another person will act responsibly and will not misuse the information”
  • 7. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Factors  Trust judgments are influenced by Social Factors:  Past interactions with a person  Opinions of a person’s actions  Other people’s opinions  Rumours  Psychological factors impacted over time  Life events  and so forth  These can be hard to compute since the information required is limited and unavailable in Social Networks
  • 8. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Factors  However, we have identified several factors that trust can be asserted from the information available in Social Networks:  Identity  Profile Similarity  Relationship type  Reputation in a Web of Trust  Interactions
  • 9. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertion Framework Social Web Platforms ... Alex JohnSocial Semantic Web Platform Trust Manager 1 2 1 2 3 5 4 6
  • 10. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Semantic Web
  • 11. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Model  Trust values are represented in the range of [-1,1]  1 represents absolute trust  0 represents either uncertainty or unknown  -1 represents absolute distrust  Positive values less than 1 represents trust but with an element of uncertainty  This also applies to negative values
  • 12. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Identity-based Trust  Relies on authentication  The WebID protocol is used as a Single Sign-On Service for Semantic Web applications – WebID provides users to authenticate using FOAF and X.509 certificates over SSL  The subjective trust value is assigned to the requester after s/he authenticates using WebID  1 if successful, -1 if unsuccessful and 0 if aborted  Definition 1: Identity-based Trust Certificate(Cert,R) Profile(RP,R) Verify(Cert,RP)∧ ∧ ∧ AssertedBy(R,U) AssignTrust(IDT,R)⇒
  • 13. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Profile Similarity-based Trust  Asserting trust based on the similarities between the user profile and the requester  Basic information attributes are not taken into consideration  Attributes such as work place information, interests, connected peers and other profile attributes are compared  Profile similarity-based trust calculation: – denotes profile similarity subjective trust valueτ – m denotes the matched distinct profile attributes between the user’s profile and the requester’s profile – a denotes the user’s distinct profile attributes
  • 14. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 2: Profile Similarity-based Trust ∀UA(Profile(RP,R) Profile(UP,U)∧ ∧ Contain(RA,RP) Contain(UA,UP) Match(RA,UA)∧ ∧ ∧ AssertedBy(R,U)) AssignTrust(PST,R)⇒  where PST {-1,1}∈
  • 15. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Relationship-based Trust  The Social Semantic Web provides the user to enter a value of how much s/he trusts that particular relationship type  Definition 3: Relationship-based Trust ∀URT(Profile(UP,U) Contain(URT,UP)∧ ∧ Relationship(R,URT) AssertedBy(R,U)) AssignTrust(RLP,R)∧ ⇒  where RLP {-1,1}∈
  • 16. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Reputation-based Trust  Consists of a trust value of a user within a Social graph based on all trust values given by other users  Reputation-based trust value is the weighted average value of all trust values given to a user – The user’s trust values assigned within a network – The weights denotes the reputation value of the person that assigned the trust value  Reputation-based trust calculation: – τ denotes reputation trust – w denotes the reputation of the user assigning a subjective trust value to the requester – v denotes the requester’s subjective trust value assigned by a user
  • 17. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 4: Reputation-based Trust SocialGraph(SG,U) Contain(R,SG) Measure(RV,SG)∧ ∧ ∧ Reputaion(RV,R) AssertedBy(R,U) AssignTrust(RPT,R)∧ ⇒  where RPT {-1,1}∈
  • 18. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Interactions-based Trust  Consists of users sharing microblog posts, comments, photos, videos, links and other content with their peers  Interactions-based trust calculation: – denotes interactions trust valueτ – r denotes the number of interactions between the requester and the user – u denotes the number of all the user’s interactions in the Social Web platform
  • 19. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 5: Interactions-based Trust ∀UI(Profile(UP,U) Contain(UI,UP) Interaction(R,UI)∧ ∧ ∧ AssertedBy(R,U)) AssignTrust(INTT,R)⇒  where INTT {-1,1}∈
  • 20. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Aggregating Subjective Trust Values  To assign a fine-grained user’s subjective trust value to a requester  An average of all the subjective trust values of a requester from each social factor assigned by the user  Aggregate subjective trust calculation: – denotes the aggregated subjective trust valueτ – s a subjective trust value asserted based on a social factor
  • 21. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertion Ontology (TAO) http://vocab.deri.ie/tao
  • 22. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Information Confidentiality http://vocab.deri.ie/ppo
  • 23. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Implementing Trust Assertions
  • 24. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Results
  • 25. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Future Work  To show how this model is useful for other scenarios (for example for Recommender Systems)  To calculate automatically Relationship-based Trust values  To take into account the trust values of Certificate Authorities when calculating Identity-based Trust  To compare our model with other state-of-the-art models
  • 26. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Thanks! Email: owen.sacco@deri.org

Notes de l'éditeur

  1. Generic privacy settings – does not provide privacy settings for each part of the information SNs do not cater for trust, neither capture trust not even provide users to enter any trust information Assumes that every person in ones social graph has the same trust level Does not provide users to enter trust values for different user lists Cumbersome to manage contacts with respect to trust
  2. Unlike the state-of-the art that focuses on 1 social factor and assumes that the users manually provide a trust score
  3. We are working with personal subjective trust values Asymmetric, if I give a trust value to a person, it does not mean that person has the same trust value for myself .. Therefore each person calculates personal trust values for people
  4. identity of the requester: trust can be asserted from the credentials exchanged through authentication, profile similarity between the user and the requester: trust can be asserted by matching several profile attributes with one another, the relationship type between the user and the requester: trust can be asserted based on the importance of the relationship type, the reputation of the user within a trusted network: trust can be asserted through reputation information asserted from other entities in a Web of Trust, trust based on interactions between the user and the requester: trust can be asserted based on the number of interactions between the user and the requester over a particular period of time.
  5. “ the more similar two people were, the greater the trust between them” Attributes such as work place information, interests, projects, connected peers and other profile attributes are compared profile-similarity by calculating the relationship between the sum of matched distinct profile attributes between the user’s profile and the requester’s profile, and the total sum of all the distinct attributes within the user’s profile.