SlideShare uma empresa Scribd logo
1 de 26
© Copyright 2011 Digital Enterprise Research Institute. All rights reserved.
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Fine-Grained Trust Assertions for
Privacy Management in the
Social Semantic Web
Owen Sacco, John G. Breslin & Stefan Decker
firstname.lastname@deri.org
IEEE TrustCom 2013 – Melbourne Australia Tuesday 16th
July 2013
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Introduction
 Current Social Networks
 provide generic privacy settings for sharing information
 do not take user’s trust into account
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Introduction
In reality, we only share parts of
our information to whom we trust
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Research Contribution
In this work we focus on:
Using various methods to
automatically assert fine-grained
subjective trust values for different
Social Factors to grant or restrict
access to personal information
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Use Case
1. Alex sends a request to view John’s personal
information
2. Alex is granted access to the information which
his trust value (asserted by John) satisfies a trust
threshold (assigned by John)
 Example: Provide John’s phone number to Alex if
he has a trust level of 0.83
Social Web Platforms
...
1
2
Alex
John
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Defining Trust
In our work trust is defined as:
“a person’s subjective belief
that another person will act
responsibly and will not
misuse the information”
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Factors
 Trust judgments are influenced by Social Factors:
 Past interactions with a person
 Opinions of a person’s actions
 Other people’s opinions
 Rumours
 Psychological factors impacted over time
 Life events
 and so forth
 These can be hard to compute since the
information required is limited and unavailable in
Social Networks
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Factors
 However, we have identified several factors that
trust can be asserted from the information
available in Social Networks:
 Identity
 Profile Similarity
 Relationship type
 Reputation in a Web of Trust
 Interactions
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertion Framework
Social Web Platforms
...
Alex
JohnSocial Semantic Web Platform
Trust
Manager
1
2
1
2
3 5
4
6
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Social Semantic Web
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Model
 Trust values are represented in the range of [-1,1]
 1 represents absolute trust
 0 represents either uncertainty or unknown
 -1 represents absolute distrust
 Positive values less than 1 represents trust but with an
element of uncertainty
 This also applies to negative values
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Identity-based Trust
 Relies on authentication
 The WebID protocol is used as a Single Sign-On Service for
Semantic Web applications
– WebID provides users to authenticate using FOAF and X.509
certificates over SSL
 The subjective trust value is assigned to the requester
after s/he authenticates using WebID
 1 if successful, -1 if unsuccessful and 0 if aborted
 Definition 1: Identity-based Trust
Certificate(Cert,R) Profile(RP,R) Verify(Cert,RP)∧ ∧ ∧
AssertedBy(R,U) AssignTrust(IDT,R)⇒
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Profile Similarity-based Trust
 Asserting trust based on the similarities between the user
profile and the requester
 Basic information attributes are not taken into
consideration
 Attributes such as work place information, interests,
connected peers and other profile attributes are compared
 Profile similarity-based trust calculation:
– denotes profile similarity subjective trust valueτ
– m denotes the matched distinct profile attributes between
the user’s profile and the requester’s profile
– a denotes the user’s distinct profile attributes
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 2: Profile Similarity-based Trust
∀UA(Profile(RP,R) Profile(UP,U)∧ ∧
Contain(RA,RP) Contain(UA,UP) Match(RA,UA)∧ ∧ ∧
AssertedBy(R,U)) AssignTrust(PST,R)⇒
 where PST {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Relationship-based Trust
 The Social Semantic Web provides the user to enter a value
of how much s/he trusts that particular relationship type
 Definition 3: Relationship-based Trust
∀URT(Profile(UP,U) Contain(URT,UP)∧ ∧
Relationship(R,URT) AssertedBy(R,U)) AssignTrust(RLP,R)∧ ⇒
 where RLP {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Reputation-based Trust
 Consists of a trust value of a user within a Social graph
based on all trust values given by other users
 Reputation-based trust value is the weighted average value
of all trust values given to a user
– The user’s trust values assigned within a network
– The weights denotes the reputation value of the person that
assigned the trust value
 Reputation-based trust calculation:
– τ denotes reputation trust
– w denotes the reputation of the user assigning a subjective
trust value to the requester
– v denotes the requester’s subjective trust value assigned by a
user
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 4: Reputation-based Trust
SocialGraph(SG,U) Contain(R,SG) Measure(RV,SG)∧ ∧ ∧
Reputaion(RV,R) AssertedBy(R,U) AssignTrust(RPT,R)∧ ⇒
 where RPT {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Interactions-based Trust
 Consists of users sharing microblog posts, comments,
photos, videos, links and other content with their peers
 Interactions-based trust calculation:
– denotes interactions trust valueτ
– r denotes the number of interactions between the requester
and the user
– u denotes the number of all the user’s interactions in the
Social Web platform
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Definition 5: Interactions-based Trust
∀UI(Profile(UP,U) Contain(UI,UP) Interaction(R,UI)∧ ∧ ∧
AssertedBy(R,U)) AssignTrust(INTT,R)⇒
 where INTT {-1,1}∈
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertions Model
 Aggregating Subjective Trust Values
 To assign a fine-grained user’s subjective trust value to a
requester
 An average of all the subjective trust values of a requester
from each social factor assigned by the user
 Aggregate subjective trust calculation:
– denotes the aggregated subjective trust valueτ
– s a subjective trust value asserted based on a social factor
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Trust Assertion Ontology
(TAO)
http://vocab.deri.ie/tao
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Information Confidentiality
http://vocab.deri.ie/ppo
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Implementing Trust
Assertions
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Results
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Future Work
 To show how this model is useful for other
scenarios (for example for Recommender Systems)
 To calculate automatically Relationship-based Trust
values
 To take into account the trust values of Certificate
Authorities when calculating Identity-based Trust
 To compare our model with other state-of-the-art
models
Digital Enterprise Research Institute www.deri.ie
Enabling Networked Knowledge
Thanks!
Email: owen.sacco@deri.org

Mais conteúdo relacionado

Mais procurados

Blacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersBlacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersIAEME Publication
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocolIaetsd Iaetsd
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsConference Papers
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudijsrd.com
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...IJNSA Journal
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...Venkat Projects
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsIJCSIS Research Publications
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesMigrant Systems
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewIRJET Journal
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkIDES Editor
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesAdz91 Digital Ads Pvt Ltd
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET Journal
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudIRJET Journal
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)IAESIJEECS
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosef Gamble
 
Readymade M Tech Thesis
Readymade M Tech ThesisReadymade M Tech Thesis
Readymade M Tech Thesise2-matrix
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYShakas Technologies
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityPvrtechnologies Nellore
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityIGEEKS TECHNOLOGIES
 

Mais procurados (20)

Blacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential usersBlacklisting and blocking anonymous credential users
Blacklisting and blocking anonymous credential users
 
iaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocoliaetsd Shared authority based privacy preserving protocol
iaetsd Shared authority based privacy preserving protocol
 
Disseration M.Tech
Disseration M.TechDisseration M.Tech
Disseration M.Tech
 
Searchable symmetric encryption security definitions
Searchable symmetric encryption security definitionsSearchable symmetric encryption security definitions
Searchable symmetric encryption security definitions
 
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloudA Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
A Survey on Access Control Mechanisms using Attribute Based Encryption in cloud
 
Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...Investigating the Combination of Text and Graphical Passwords for a more secu...
Investigating the Combination of Text and Graphical Passwords for a more secu...
 
4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...4.authentication and key agreement based on anonymous identity for peer to-pe...
4.authentication and key agreement based on anonymous identity for peer to-pe...
 
Enhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart CredentialsEnhancing Social Network Security through Smart Credentials
Enhancing Social Network Security through Smart Credentials
 
Exploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search QueriesExploiting Service Similarity for Privacy in Location Based Search Queries
Exploiting Service Similarity for Privacy in Location Based Search Queries
 
Securing Cloud Using Fog: A Review
Securing Cloud Using Fog: A ReviewSecuring Cloud Using Fog: A Review
Securing Cloud Using Fog: A Review
 
Cloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability FrameworkCloud Security and Data Integrity with Client Accountability Framework
Cloud Security and Data Integrity with Client Accountability Framework
 
Privacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devicesPrivacy preserving optimal meeting location determination on mobile devices
Privacy preserving optimal meeting location determination on mobile devices
 
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud StorageIRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
IRJET- Efficient Traceable Authorization Search System for Secure Cloud Storage
 
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in CloudAnti Collusion Data Sharing Schema for Centralized Group in Cloud
Anti Collusion Data Sharing Schema for Centralized Group in Cloud
 
25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)25 7351 9003-1-ed secure cloud (edit a)
25 7351 9003-1-ed secure cloud (edit a)
 
YosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_SecurityYosefGamble_Writing_Sample_Email_Security
YosefGamble_Writing_Sample_Email_Security
 
Readymade M Tech Thesis
Readymade M Tech ThesisReadymade M Tech Thesis
Readymade M Tech Thesis
 
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITYCOST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
COST-EFFECTIVE AUTHENTIC AND ANONYMOUS DATA SHARING WITH FORWARD SECURITY
 
Cost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward securityCost effective authentic and anonymous data sharing with forward security
Cost effective authentic and anonymous data sharing with forward security
 
Cloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditabilityCloud assisted mobile-access of health data with privacy and auditability
Cloud assisted mobile-access of health data with privacy and auditability
 

Semelhante a Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web

IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET Journal
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust onlineTina Guenther
 
Trust blueprints icds 2014
Trust blueprints icds 2014Trust blueprints icds 2014
Trust blueprints icds 2014George Vanecek
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Soudé Fazeli
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationAlejandro Bellogin
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputationguestc12d53
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Logindrummondreed
 
Trustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsTrustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsPaolo Massa
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKMaganathin Veeraragaloo
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profilesHaishan Liu
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profilesHaishan Liu
 

Semelhante a Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web (20)

Ithet
IthetIthet
Ithet
 
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence TheoryIRJET- Web User Trust Relationship Prediction based on Evidence Theory
IRJET- Web User Trust Relationship Prediction based on Evidence Theory
 
How to study trust online
How to study trust onlineHow to study trust online
How to study trust online
 
Trust blueprints icds 2014
Trust blueprints icds 2014Trust blueprints icds 2014
Trust blueprints icds 2014
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
An exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p networkAn exaustive survey of trust models in p2 p network
An exaustive survey of trust models in p2 p network
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix Factorization
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation
 
Respect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud LoginRespect Connect: From Social Login to Personal Cloud Login
Respect Connect: From Social Login to Personal Cloud Login
 
Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5Cs6703 grid and cloud computing unit 5
Cs6703 grid and cloud computing unit 5
 
Trustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust MetricsTrustlet, Open Research on Trust Metrics
Trustlet, Open Research on Trust Metrics
 
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORKZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
ZERO TRUST ARCHITECTURE - DIGITAL TRUST FRAMEWORK
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profiles
 
Recsys virtual-profiles
Recsys virtual-profilesRecsys virtual-profiles
Recsys virtual-profiles
 

Último

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...KokoStevan
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introductionMaksud Ahmed
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfAdmir Softic
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17Celine George
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingTechSoup
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.christianmathematics
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfSanaAli374401
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfAyushMahapatra5
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.MateoGardella
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeThiyagu K
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxVishalSingh1417
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterMateoGardella
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Shubhangi Sonawane
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfagholdier
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 

Último (20)

SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
SECOND SEMESTER TOPIC COVERAGE SY 2023-2024 Trends, Networks, and Critical Th...
 
microwave assisted reaction. General introduction
microwave assisted reaction. General introductionmicrowave assisted reaction. General introduction
microwave assisted reaction. General introduction
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Key note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdfKey note speaker Neum_Admir Softic_ENG.pdf
Key note speaker Neum_Admir Softic_ENG.pdf
 
The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17How to Give a Domain for a Field in Odoo 17
How to Give a Domain for a Field in Odoo 17
 
Grant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy ConsultingGrant Readiness 101 TechSoup and Remy Consulting
Grant Readiness 101 TechSoup and Remy Consulting
 
This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.This PowerPoint helps students to consider the concept of infinity.
This PowerPoint helps students to consider the concept of infinity.
 
An Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdfAn Overview of Mutual Funds Bcom Project.pdf
An Overview of Mutual Funds Bcom Project.pdf
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Class 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdfClass 11th Physics NEET formula sheet pdf
Class 11th Physics NEET formula sheet pdf
 
Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024Mehran University Newsletter Vol-X, Issue-I, 2024
Mehran University Newsletter Vol-X, Issue-I, 2024
 
Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.Gardella_Mateo_IntellectualProperty.pdf.
Gardella_Mateo_IntellectualProperty.pdf.
 
Advance Mobile Application Development class 07
Advance Mobile Application Development class 07Advance Mobile Application Development class 07
Advance Mobile Application Development class 07
 
Measures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and ModeMeasures of Central Tendency: Mean, Median and Mode
Measures of Central Tendency: Mean, Median and Mode
 
Unit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptxUnit-IV; Professional Sales Representative (PSR).pptx
Unit-IV; Professional Sales Representative (PSR).pptx
 
Gardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch LetterGardella_PRCampaignConclusion Pitch Letter
Gardella_PRCampaignConclusion Pitch Letter
 
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
Ecological Succession. ( ECOSYSTEM, B. Pharmacy, 1st Year, Sem-II, Environmen...
 
Holdier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdfHoldier Curriculum Vitae (April 2024).pdf
Holdier Curriculum Vitae (April 2024).pdf
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 

Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web

  • 1. © Copyright 2011 Digital Enterprise Research Institute. All rights reserved. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Fine-Grained Trust Assertions for Privacy Management in the Social Semantic Web Owen Sacco, John G. Breslin & Stefan Decker firstname.lastname@deri.org IEEE TrustCom 2013 – Melbourne Australia Tuesday 16th July 2013
  • 2. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Introduction  Current Social Networks  provide generic privacy settings for sharing information  do not take user’s trust into account
  • 3. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Introduction In reality, we only share parts of our information to whom we trust
  • 4. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Research Contribution In this work we focus on: Using various methods to automatically assert fine-grained subjective trust values for different Social Factors to grant or restrict access to personal information
  • 5. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Use Case 1. Alex sends a request to view John’s personal information 2. Alex is granted access to the information which his trust value (asserted by John) satisfies a trust threshold (assigned by John)  Example: Provide John’s phone number to Alex if he has a trust level of 0.83 Social Web Platforms ... 1 2 Alex John
  • 6. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Defining Trust In our work trust is defined as: “a person’s subjective belief that another person will act responsibly and will not misuse the information”
  • 7. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Factors  Trust judgments are influenced by Social Factors:  Past interactions with a person  Opinions of a person’s actions  Other people’s opinions  Rumours  Psychological factors impacted over time  Life events  and so forth  These can be hard to compute since the information required is limited and unavailable in Social Networks
  • 8. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Factors  However, we have identified several factors that trust can be asserted from the information available in Social Networks:  Identity  Profile Similarity  Relationship type  Reputation in a Web of Trust  Interactions
  • 9. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertion Framework Social Web Platforms ... Alex JohnSocial Semantic Web Platform Trust Manager 1 2 1 2 3 5 4 6
  • 10. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Social Semantic Web
  • 11. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Model  Trust values are represented in the range of [-1,1]  1 represents absolute trust  0 represents either uncertainty or unknown  -1 represents absolute distrust  Positive values less than 1 represents trust but with an element of uncertainty  This also applies to negative values
  • 12. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Identity-based Trust  Relies on authentication  The WebID protocol is used as a Single Sign-On Service for Semantic Web applications – WebID provides users to authenticate using FOAF and X.509 certificates over SSL  The subjective trust value is assigned to the requester after s/he authenticates using WebID  1 if successful, -1 if unsuccessful and 0 if aborted  Definition 1: Identity-based Trust Certificate(Cert,R) Profile(RP,R) Verify(Cert,RP)∧ ∧ ∧ AssertedBy(R,U) AssignTrust(IDT,R)⇒
  • 13. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Profile Similarity-based Trust  Asserting trust based on the similarities between the user profile and the requester  Basic information attributes are not taken into consideration  Attributes such as work place information, interests, connected peers and other profile attributes are compared  Profile similarity-based trust calculation: – denotes profile similarity subjective trust valueτ – m denotes the matched distinct profile attributes between the user’s profile and the requester’s profile – a denotes the user’s distinct profile attributes
  • 14. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 2: Profile Similarity-based Trust ∀UA(Profile(RP,R) Profile(UP,U)∧ ∧ Contain(RA,RP) Contain(UA,UP) Match(RA,UA)∧ ∧ ∧ AssertedBy(R,U)) AssignTrust(PST,R)⇒  where PST {-1,1}∈
  • 15. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Relationship-based Trust  The Social Semantic Web provides the user to enter a value of how much s/he trusts that particular relationship type  Definition 3: Relationship-based Trust ∀URT(Profile(UP,U) Contain(URT,UP)∧ ∧ Relationship(R,URT) AssertedBy(R,U)) AssignTrust(RLP,R)∧ ⇒  where RLP {-1,1}∈
  • 16. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Reputation-based Trust  Consists of a trust value of a user within a Social graph based on all trust values given by other users  Reputation-based trust value is the weighted average value of all trust values given to a user – The user’s trust values assigned within a network – The weights denotes the reputation value of the person that assigned the trust value  Reputation-based trust calculation: – τ denotes reputation trust – w denotes the reputation of the user assigning a subjective trust value to the requester – v denotes the requester’s subjective trust value assigned by a user
  • 17. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 4: Reputation-based Trust SocialGraph(SG,U) Contain(R,SG) Measure(RV,SG)∧ ∧ ∧ Reputaion(RV,R) AssertedBy(R,U) AssignTrust(RPT,R)∧ ⇒  where RPT {-1,1}∈
  • 18. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Interactions-based Trust  Consists of users sharing microblog posts, comments, photos, videos, links and other content with their peers  Interactions-based trust calculation: – denotes interactions trust valueτ – r denotes the number of interactions between the requester and the user – u denotes the number of all the user’s interactions in the Social Web platform
  • 19. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Definition 5: Interactions-based Trust ∀UI(Profile(UP,U) Contain(UI,UP) Interaction(R,UI)∧ ∧ ∧ AssertedBy(R,U)) AssignTrust(INTT,R)⇒  where INTT {-1,1}∈
  • 20. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertions Model  Aggregating Subjective Trust Values  To assign a fine-grained user’s subjective trust value to a requester  An average of all the subjective trust values of a requester from each social factor assigned by the user  Aggregate subjective trust calculation: – denotes the aggregated subjective trust valueτ – s a subjective trust value asserted based on a social factor
  • 21. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Trust Assertion Ontology (TAO) http://vocab.deri.ie/tao
  • 22. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Information Confidentiality http://vocab.deri.ie/ppo
  • 23. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Implementing Trust Assertions
  • 24. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Results
  • 25. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Future Work  To show how this model is useful for other scenarios (for example for Recommender Systems)  To calculate automatically Relationship-based Trust values  To take into account the trust values of Certificate Authorities when calculating Identity-based Trust  To compare our model with other state-of-the-art models
  • 26. Digital Enterprise Research Institute www.deri.ie Enabling Networked Knowledge Thanks! Email: owen.sacco@deri.org

Notas do Editor

  1. Generic privacy settings – does not provide privacy settings for each part of the information SNs do not cater for trust, neither capture trust not even provide users to enter any trust information Assumes that every person in ones social graph has the same trust level Does not provide users to enter trust values for different user lists Cumbersome to manage contacts with respect to trust
  2. Unlike the state-of-the art that focuses on 1 social factor and assumes that the users manually provide a trust score
  3. We are working with personal subjective trust values Asymmetric, if I give a trust value to a person, it does not mean that person has the same trust value for myself .. Therefore each person calculates personal trust values for people
  4. identity of the requester: trust can be asserted from the credentials exchanged through authentication, profile similarity between the user and the requester: trust can be asserted by matching several profile attributes with one another, the relationship type between the user and the requester: trust can be asserted based on the importance of the relationship type, the reputation of the user within a trusted network: trust can be asserted through reputation information asserted from other entities in a Web of Trust, trust based on interactions between the user and the requester: trust can be asserted based on the number of interactions between the user and the requester over a particular period of time.
  5. “ the more similar two people were, the greater the trust between them” Attributes such as work place information, interests, projects, connected peers and other profile attributes are compared profile-similarity by calculating the relationship between the sum of matched distinct profile attributes between the user’s profile and the requester’s profile, and the total sum of all the distinct attributes within the user’s profile.