SlideShare une entreprise Scribd logo
1  sur  15
Télécharger pour lire hors ligne
Trust Evaluation through
  User Reputation and
  Provenance Analysis
      Davide Ceolin, Paul Groth,
  Willem Robert van Hage, Archana
   Nottamkandath, Wan Fokkink
Outline
● Problem Definition
● Trust estimates as probability distributions
● Reputation-based trust
● Provenance-based trust
● Combining reputation- and provenance-trust
● Results
● Future Work
Our Problem
Trusting crowdsourced information

Specifically: video annotations

We can not tag videos automatically (complex,
many layers,...), so we refer to the crowd, but
crowdsourced annotations need to be
evaluated.
Our Case Study
Waisda, a video tagging platform.
http://waisda.nl

Users score if they
tag simultaneously.


Tags are useful (e.g. to index video) but how to
trust tags?
Measuring tags trustworthiness
How to measure tags trustworthiness?

Let's exploit the game mechanism:

       #matches ≈ trustworthiness

However, if a tag did not get any match it is not
necessarily wrong.
Trust as a Beta Distribution
Reputation-based trust
A classical approach:

● Gather all the evidence about a user
● Estimate the Beta distribution (user
  reputation)
● Predict the trustworthiness of the (other)
  tags inserted by the user (using the Beta)
Our hypothesis
We believe we can go beyond the classical
reputation-based trust:

           Who ≤ Who + How
(How) Provenance-based trust




●   “How”-provenance can be used as a stereotype for tags authorship
●   May be less precise than reputation but more easily available
Computing provenance-based trust
“How-provenance” is composed by several
“features” (timestamp, typingDuration, ...)




We use Support Vector Machines
to learn the model and make our
estimates.
Combining reputation- and
provenance-trust

                          Is reputation "solid" enough?
                             (E.g. based on 20 obs.)




     Use Reputation!                                      Use how-provenance-based
    (More fine-grained)                                           estimate!
Results




                #{tag: Real_Trust(tag)>Threshold = Pred_Trust(tag) > Threshold}
   Accuracy =
                                           #tags
Discussion
Who =* How

Who ≤* Who + How

How ≤* Who + How

(At least in our case study)

=* statistically not different
≤* statistically different (less)
Future Work
● We plan to apply this approach to other case
  studies as well
● A generic platform for producing trust
  assessments based on annotated
  provenance graphs is under development
● We also plan to merge provenance-based
  estimates with semantic similarity-based
  ones in order to provide a tool for a wide
  range of applications.
Thank you!
Questions?
 d.ceolin@vu.nl

Contenu connexe

En vedette

Sacramento Public Library
Sacramento Public LibrarySacramento Public Library
Sacramento Public LibraryAnn Owens
 
Bootstrapping your startup & building it lean: stop wasting time
Bootstrapping your startup & building it lean: stop wasting timeBootstrapping your startup & building it lean: stop wasting time
Bootstrapping your startup & building it lean: stop wasting timeJoel Gascoigne
 
Tema 1 dp resumen optimizado
Tema 1 dp resumen optimizadoTema 1 dp resumen optimizado
Tema 1 dp resumen optimizadoJoaquin Suarez
 
Brand Experience Tickets
Brand Experience TicketsBrand Experience Tickets
Brand Experience TicketsMario Gamper
 
The Ultimate Dependency Manager Shootout (QCon NY 2014)
The Ultimate Dependency Manager Shootout (QCon NY 2014)The Ultimate Dependency Manager Shootout (QCon NY 2014)
The Ultimate Dependency Manager Shootout (QCon NY 2014)Sander Mak (@Sander_Mak)
 
心中的佛光(Music)
心中的佛光(Music)心中的佛光(Music)
心中的佛光(Music)Huanyin Cheng
 
Webdistilled per la Media Analysis
Webdistilled per la Media AnalysisWebdistilled per la Media Analysis
Webdistilled per la Media AnalysisMaurizio Pontremoli
 
Violating The Rights of The Child; When "Faith" Violates the Faith in Human R...
Violating The Rights of The Child; When "Faith" Violates the Faith in Human R...Violating The Rights of The Child; When "Faith" Violates the Faith in Human R...
Violating The Rights of The Child; When "Faith" Violates the Faith in Human R...Bayan Waleed Shadaideh
 
Provenance as a Key Factor for Privacy-proof Trust
Provenance as a Key Factor for Privacy-proof TrustProvenance as a Key Factor for Privacy-proof Trust
Provenance as a Key Factor for Privacy-proof TrustDavide Ceolin
 
Инфографика "цена SMS"
Инфографика "цена SMS"Инфографика "цена SMS"
Инфографика "цена SMS"Alexey Kononenko
 
05 building a_necto_social_network_ready
05 building a_necto_social_network_ready05 building a_necto_social_network_ready
05 building a_necto_social_network_readywww.panorama.com
 
Wereldwinkelsvoorlichtingenfairtrade
WereldwinkelsvoorlichtingenfairtradeWereldwinkelsvoorlichtingenfairtrade
Wereldwinkelsvoorlichtingenfairtradefrancienvaneersel
 

En vedette (16)

Sacramento Public Library
Sacramento Public LibrarySacramento Public Library
Sacramento Public Library
 
Bootstrapping your startup & building it lean: stop wasting time
Bootstrapping your startup & building it lean: stop wasting timeBootstrapping your startup & building it lean: stop wasting time
Bootstrapping your startup & building it lean: stop wasting time
 
Tema 1 dp resumen optimizado
Tema 1 dp resumen optimizadoTema 1 dp resumen optimizado
Tema 1 dp resumen optimizado
 
UX @ Intel IT
UX @ Intel ITUX @ Intel IT
UX @ Intel IT
 
Brand Experience Tickets
Brand Experience TicketsBrand Experience Tickets
Brand Experience Tickets
 
The Ultimate Dependency Manager Shootout (QCon NY 2014)
The Ultimate Dependency Manager Shootout (QCon NY 2014)The Ultimate Dependency Manager Shootout (QCon NY 2014)
The Ultimate Dependency Manager Shootout (QCon NY 2014)
 
Elevate your webapps with Scala and Lift
Elevate your webapps with Scala and LiftElevate your webapps with Scala and Lift
Elevate your webapps with Scala and Lift
 
Unenclosable
UnenclosableUnenclosable
Unenclosable
 
心中的佛光(Music)
心中的佛光(Music)心中的佛光(Music)
心中的佛光(Music)
 
Webdistilled per la Media Analysis
Webdistilled per la Media AnalysisWebdistilled per la Media Analysis
Webdistilled per la Media Analysis
 
Violating The Rights of The Child; When "Faith" Violates the Faith in Human R...
Violating The Rights of The Child; When "Faith" Violates the Faith in Human R...Violating The Rights of The Child; When "Faith" Violates the Faith in Human R...
Violating The Rights of The Child; When "Faith" Violates the Faith in Human R...
 
Provenance as a Key Factor for Privacy-proof Trust
Provenance as a Key Factor for Privacy-proof TrustProvenance as a Key Factor for Privacy-proof Trust
Provenance as a Key Factor for Privacy-proof Trust
 
Инфографика "цена SMS"
Инфографика "цена SMS"Инфографика "цена SMS"
Инфографика "цена SMS"
 
05 building a_necto_social_network_ready
05 building a_necto_social_network_ready05 building a_necto_social_network_ready
05 building a_necto_social_network_ready
 
Wereldwinkelsvoorlichtingenfairtrade
WereldwinkelsvoorlichtingenfairtradeWereldwinkelsvoorlichtingenfairtrade
Wereldwinkelsvoorlichtingenfairtrade
 
Cities: Making Free Accessible WordPress Themes
Cities: Making Free Accessible WordPress ThemesCities: Making Free Accessible WordPress Themes
Cities: Making Free Accessible WordPress Themes
 

Similaire à Trust Evaluation through User Reputation and Provenance Analysis

Big data playbook: Questions to ask before you embark upon a big data initiative
Big data playbook: Questions to ask before you embark upon a big data initiativeBig data playbook: Questions to ask before you embark upon a big data initiative
Big data playbook: Questions to ask before you embark upon a big data initiativeGaurav Dhy
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big DataAmazon Web Services
 
7.Trust Management
7.Trust Management7.Trust Management
7.Trust Managementphanleson
 
Trustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsTrustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsPaolo Massa
 
Opinion Mining Techniques in Tourisms Part -2
Opinion Mining Techniques in Tourisms  Part -2Opinion Mining Techniques in Tourisms  Part -2
Opinion Mining Techniques in Tourisms Part -2Pawan Kumar Tiwari
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0Amazon Web Services
 
Identifying a Compromised WordPress Site
Identifying a Compromised WordPress SiteIdentifying a Compromised WordPress Site
Identifying a Compromised WordPress SiteChris Burgess
 
Operationalizing Data Science St. Louis Big Data IDEA
Operationalizing Data Science St. Louis Big Data IDEAOperationalizing Data Science St. Louis Big Data IDEA
Operationalizing Data Science St. Louis Big Data IDEAAdam Doyle
 
Crafting digital experiences with agile and design by James Hayes
Crafting digital experiences with agile and design by James HayesCrafting digital experiences with agile and design by James Hayes
Crafting digital experiences with agile and design by James HayesScrum Australia Pty Ltd
 
Great Expectations Presentation
Great Expectations PresentationGreat Expectations Presentation
Great Expectations PresentationAdam Doyle
 
Birst Webinar Slides: "Build vs. Buy - Making the Right Choice for a Great Da...
Birst Webinar Slides: "Build vs. Buy - Making the Right Choice for a Great Da...Birst Webinar Slides: "Build vs. Buy - Making the Right Choice for a Great Da...
Birst Webinar Slides: "Build vs. Buy - Making the Right Choice for a Great Da...Birst
 
Ymens - Bouncing off clouds - Rapid Development for Cloud Ready Applications...
Ymens - Bouncing off clouds - Rapid Development for Cloud Ready Applications...Ymens - Bouncing off clouds - Rapid Development for Cloud Ready Applications...
Ymens - Bouncing off clouds - Rapid Development for Cloud Ready Applications...Vlad Mihnea
 
7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaS7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaSFrederik Denkens
 
So many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS providerSo many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS providerSirris
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCloudIDSummit
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCloudIDSummit
 
Agile Testing Alliance Chapter presentation - Agile estimation
Agile Testing Alliance Chapter presentation - Agile estimationAgile Testing Alliance Chapter presentation - Agile estimation
Agile Testing Alliance Chapter presentation - Agile estimationAgile Testing alliance
 

Similaire à Trust Evaluation through User Reputation and Provenance Analysis (20)

Big data playbook: Questions to ask before you embark upon a big data initiative
Big data playbook: Questions to ask before you embark upon a big data initiativeBig data playbook: Questions to ask before you embark upon a big data initiative
Big data playbook: Questions to ask before you embark upon a big data initiative
 
(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data(SEC326) Security Science Using Big Data
(SEC326) Security Science Using Big Data
 
7.Trust Management
7.Trust Management7.Trust Management
7.Trust Management
 
Trustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsTrustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust Metrics
 
Opinion Mining Techniques in Tourisms Part -2
Opinion Mining Techniques in Tourisms  Part -2Opinion Mining Techniques in Tourisms  Part -2
Opinion Mining Techniques in Tourisms Part -2
 
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0(SEC402) Enterprise Cloud Security via DevSecOps 2.0
(SEC402) Enterprise Cloud Security via DevSecOps 2.0
 
Identifying a Compromised WordPress Site
Identifying a Compromised WordPress SiteIdentifying a Compromised WordPress Site
Identifying a Compromised WordPress Site
 
Operationalizing Data Science St. Louis Big Data IDEA
Operationalizing Data Science St. Louis Big Data IDEAOperationalizing Data Science St. Louis Big Data IDEA
Operationalizing Data Science St. Louis Big Data IDEA
 
Crafting digital experiences with agile and design by James Hayes
Crafting digital experiences with agile and design by James HayesCrafting digital experiences with agile and design by James Hayes
Crafting digital experiences with agile and design by James Hayes
 
Sankalp's Resume 2016
Sankalp's Resume 2016Sankalp's Resume 2016
Sankalp's Resume 2016
 
Great Expectations Presentation
Great Expectations PresentationGreat Expectations Presentation
Great Expectations Presentation
 
Security for Humans
Security for HumansSecurity for Humans
Security for Humans
 
Birst Webinar Slides: "Build vs. Buy - Making the Right Choice for a Great Da...
Birst Webinar Slides: "Build vs. Buy - Making the Right Choice for a Great Da...Birst Webinar Slides: "Build vs. Buy - Making the Right Choice for a Great Da...
Birst Webinar Slides: "Build vs. Buy - Making the Right Choice for a Great Da...
 
DevOps at Crevise Technologies
DevOps at Crevise TechnologiesDevOps at Crevise Technologies
DevOps at Crevise Technologies
 
Ymens - Bouncing off clouds - Rapid Development for Cloud Ready Applications...
Ymens - Bouncing off clouds - Rapid Development for Cloud Ready Applications...Ymens - Bouncing off clouds - Rapid Development for Cloud Ready Applications...
Ymens - Bouncing off clouds - Rapid Development for Cloud Ready Applications...
 
7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaS7 things to consider when choosing your IaaS provider for ISV/SaaS
7 things to consider when choosing your IaaS provider for ISV/SaaS
 
So many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS providerSo many clouds - 7 things to consider when choosing your IaaS provider
So many clouds - 7 things to consider when choosing your IaaS provider
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
CIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You EatCIS14: Authentication: Who are You? You are What You Eat
CIS14: Authentication: Who are You? You are What You Eat
 
Agile Testing Alliance Chapter presentation - Agile estimation
Agile Testing Alliance Chapter presentation - Agile estimationAgile Testing Alliance Chapter presentation - Agile estimation
Agile Testing Alliance Chapter presentation - Agile estimation
 

Plus de Davide Ceolin

Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Davide Ceolin
 
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2Davide Ceolin
 
VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 Davide Ceolin
 
Semi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessSemi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessDavide Ceolin
 

Plus de Davide Ceolin (9)

Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
Lecture 2 Social Web 2017 (Guest Lecture By Dr. Giulia Ranzini)
 
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
Capturing the Ineffable: Collecting, Analysing, and Automating Web Document ...
 
VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6VU University Amsterdam - The Social Web 2016 - Lecture 6
VU University Amsterdam - The Social Web 2016 - Lecture 6
 
VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5VU University Amsterdam - The Social Web 2016 - Lecture 5
VU University Amsterdam - The Social Web 2016 - Lecture 5
 
VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4VU University Amsterdam - The Social Web 2016 - Lecture 4
VU University Amsterdam - The Social Web 2016 - Lecture 4
 
VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3VU University Amsterdam - The Social Web 2016 - Lecture 3
VU University Amsterdam - The Social Web 2016 - Lecture 3
 
VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2VU University Amsterdam - The Social Web 2016 - Lecture 2
VU University Amsterdam - The Social Web 2016 - Lecture 2
 
VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1 VU University Amsterdam - The Social Web 2016 - Lecture 1
VU University Amsterdam - The Social Web 2016 - Lecture 1
 
Semi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation TrustworthinessSemi-automated Assessment of Annotation Trustworthiness
Semi-automated Assessment of Annotation Trustworthiness
 

Trust Evaluation through User Reputation and Provenance Analysis

  • 1. Trust Evaluation through User Reputation and Provenance Analysis Davide Ceolin, Paul Groth, Willem Robert van Hage, Archana Nottamkandath, Wan Fokkink
  • 2. Outline ● Problem Definition ● Trust estimates as probability distributions ● Reputation-based trust ● Provenance-based trust ● Combining reputation- and provenance-trust ● Results ● Future Work
  • 3. Our Problem Trusting crowdsourced information Specifically: video annotations We can not tag videos automatically (complex, many layers,...), so we refer to the crowd, but crowdsourced annotations need to be evaluated.
  • 4. Our Case Study Waisda, a video tagging platform. http://waisda.nl Users score if they tag simultaneously. Tags are useful (e.g. to index video) but how to trust tags?
  • 5. Measuring tags trustworthiness How to measure tags trustworthiness? Let's exploit the game mechanism: #matches ≈ trustworthiness However, if a tag did not get any match it is not necessarily wrong.
  • 6. Trust as a Beta Distribution
  • 7. Reputation-based trust A classical approach: ● Gather all the evidence about a user ● Estimate the Beta distribution (user reputation) ● Predict the trustworthiness of the (other) tags inserted by the user (using the Beta)
  • 8. Our hypothesis We believe we can go beyond the classical reputation-based trust: Who ≤ Who + How
  • 9. (How) Provenance-based trust ● “How”-provenance can be used as a stereotype for tags authorship ● May be less precise than reputation but more easily available
  • 10. Computing provenance-based trust “How-provenance” is composed by several “features” (timestamp, typingDuration, ...) We use Support Vector Machines to learn the model and make our estimates.
  • 11. Combining reputation- and provenance-trust Is reputation "solid" enough? (E.g. based on 20 obs.) Use Reputation! Use how-provenance-based (More fine-grained) estimate!
  • 12. Results #{tag: Real_Trust(tag)>Threshold = Pred_Trust(tag) > Threshold} Accuracy = #tags
  • 13. Discussion Who =* How Who ≤* Who + How How ≤* Who + How (At least in our case study) =* statistically not different ≤* statistically different (less)
  • 14. Future Work ● We plan to apply this approach to other case studies as well ● A generic platform for producing trust assessments based on annotated provenance graphs is under development ● We also plan to merge provenance-based estimates with semantic similarity-based ones in order to provide a tool for a wide range of applications.