A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks

Similar documents
Assessment of Multi-Hop Interpersonal Trust in Social Networks by 3VSL

ECEN 689 Special Topics in Data Science for Communications Networks

6.207/14.15: Networks Lecture 7: Search on Networks: Navigation and Web Search

Online Social Networks and Media. Link Analysis and Web Search

Adventures in random graphs: Models, structures and algorithms

Indirect Sampling in Case of Asymmetrical Link Structures

LINK ANALYSIS. Dr. Gjergji Kasneci Introduction to Information Retrieval WS

DATA MINING LECTURE 13. Link Analysis Ranking PageRank -- Random walks HITS

Point-of-Interest Recommendations: Learning Potential Check-ins from Friends

Online Social Networks and Media. Link Analysis and Web Search

Modeling face-to-face social interaction networks

Detecting Wormhole Attacks in Wireless Networks Using Local Neighborhood Information

PageRank: Ranking of nodes in graphs

Interact with Strangers

6.207/14.15: Networks Lecture 12: Generalized Random Graphs

CS 277: Data Mining. Mining Web Link Structure. CS 277: Data Mining Lectures Analyzing Web Link Structure Padhraic Smyth, UC Irvine

Blog Community Discovery and Evolution

Internal link prediction: a new approach for predicting links in bipartite graphs

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

Efficient Network Structures with Separable Heterogeneous Connection Costs

Wiki Definition. Reputation Systems I. Outline. Introduction to Reputations. Yury Lifshits. HITS, PageRank, SALSA, ebay, EigenTrust, VKontakte

Ranking of nodes in graphs

Using Belief Propagation to Counter Correlated Reports in Cooperative Spectrum Sensing

Recommendation Systems

ABSTRACT SECURITY AND TRUST IN DISTRIBUTED COMPUTATION. Title of dissertation: Xiangyang Liu, Doctor of Philosophy, 2015

Asynchronous Distributed Power Iteration with Gossip-based Normalization

Routing Algorithms. CS60002: Distributed Systems. Pallab Dasgupta Dept. of Computer Sc. & Engg., Indian Institute of Technology Kharagpur

Community Detection. fundamental limits & efficient algorithms. Laurent Massoulié, Inria

Asynchronous Distributed Power Iteration with Gossip-based Normalization

5. Density evolution. Density evolution 5-1

Sampling and Estimation in Network Graphs

Learning with Temporal Point Processes

Node similarity and classification

CS224W: Social and Information Network Analysis Jure Leskovec, Stanford University

Degree Distribution: The case of Citation Networks

CS242: Probabilistic Graphical Models Lecture 7B: Markov Chain Monte Carlo & Gibbs Sampling

Recommendation Systems

Link Prediction. Eman Badr Mohammed Saquib Akmal Khan

Principles of Pattern Recognition. C. A. Murthy Machine Intelligence Unit Indian Statistical Institute Kolkata

Diffusion Centrality: Foundations and Extensions

Crowd-Learning: Improving the Quality of Crowdsourcing Using Sequential Learning

Biased Assimilation, Homophily, and the Dynamics of Polarization

ANALYTICAL MODEL OF A VIRTUAL BACKBONE STABILITY IN MOBILE ENVIRONMENT

Recall: Modeling Time Series. CSE 586, Spring 2015 Computer Vision II. Hidden Markov Model and Kalman Filter. Modeling Time Series

STAR: Semiring Trust Inference for Trust-Aware Social Recommenders

To Trust or Not to Trust? Predicting Online Trusts using Trust Antecedent Framework

Outline for today. Information Retrieval. Cosine similarity between query and document. tf-idf weighting

Web Ranking. Classification (manual, automatic) Link Analysis (today s lesson)

Bayesian networks: approximate inference

Radio Network Clustering from Scratch

Web Structure Mining Nodes, Links and Influence

Link Analysis. Reference: Introduction to Information Retrieval by C. Manning, P. Raghavan, H. Schutze

Link Analysis Ranking

Recovery of Low-Rank Plus Compressed Sparse Matrices with Application to Unveiling Traffic Anomalies

Causal Consistency for Geo-Replicated Cloud Storage under Partial Replication

On the number of circuits in random graphs. Guilhem Semerjian. [ joint work with Enzo Marinari and Rémi Monasson ]

Program Performance Metrics

Half-Duplex Gaussian Relay Networks with Interference Processing Relays

Spectral Graph Theory Tools. Analysis of Complex Networks

Agent-Based and Population-Based Modeling of Trust Dynamics 1

Online Social Networks and Media. Opinion formation on social networks

Sparse Linear Algebra Issues Arising in the Analysis of Complex Networks

Fraud within Asymmetric Multi-Hop Cellular Networks

Efficient Network Structures with Separable Heterogeneous Connection Costs

An Efficient reconciliation algorithm for social networks

Utility Maximizing Routing to Data Centers

Clock Synchronization with Bounded Global and Local Skew

Computing the Entropy of a Stream

Recommendation Systems

Network models: random graphs

Sensor Tasking and Control

Robert Collins CSE586 CSE 586, Spring 2015 Computer Vision II

Data Mining Part 5. Prediction

Overlapping Communities

In the Stone Age. Stephan Holzer. Yuval Emek - Technion Roger Wattenhofer - ETH Zürich

The Efficiency and Evolution of R&D Networks

Blind Identification of Invertible Graph Filters with Multiple Sparse Inputs 1

Consensus seeking on moving neighborhood model of random sector graphs

Automatic Classification and Analysis of Interdisciplinary Fields in Computer Sciences

cs/ee/ids 143 Communication Networks

A New Technique for Link Utilization Estimation

Groups of vertices and Core-periphery structure. By: Ralucca Gera, Applied math department, Naval Postgraduate School Monterey, CA, USA

APPLICATIONS OF MINING HETEROGENEOUS INFORMATION NETWORKS

Combating Web Spam with TrustRank

Link Analysis. Stony Brook University CSE545, Fall 2016

Supporting Statistical Hypothesis Testing Over Graphs

Energy Balanced Data Propagation in Wireless Sensor Networks

A Bayesian Treatment of Social Links in Recommender Systems ; CU-CS

Scaling Neighbourhood Methods

Preserving sparsity in dynamic network computations

Appendix A Prototypes Models

Response property checking via distributed state space exploration

Computing PageRank using Power Extrapolation

Network Science (overview, part 1)

Updating Markov Chains Carl Meyer Amy Langville

Distributed Systems Gossip Algorithms

The Second Eigenvalue of the Google Matrix

Quantitative Information Flow. Lecture 7

Thanks to Jure Leskovec, Stanford and Panayiotis Tsaparas, Univ. of Ioannina for slides

Distributed detection of topological changes in communication networks. Riccardo Lucchese, Damiano Varagnolo, Karl H. Johansson

Transcription:

A Tunable Mechanism for Identifying Trusted Nodes in Large Scale Distributed Networks Joydeep Chandra 1, Ingo Scholtes 2, Niloy Ganguly 1, Frank Schweitzer 2 1 - Dept. of Computer Science and Engineering, Indian Institute of Technology (IIT) Kharagpur, India 2 - Chair of Systems Design, ETH Zurich, Switzerland Motivation Increasing importance of user contributions in online services Online social networks Collaborative filtering Content sharing Crowdsourcing Peer-to-Peer systems 1

Motivation Which peer will most likely be cooperative? Whom should I trust most??? Trust relationships Assumption: Users keep track of trusted contacts Direct trust relation 2

Trust propagation We assume a transitive notion of trust! Indirect trust relation Direct trust relation S. D. Kamvar et al.: The EigenTrust Algorithm for Reputation Management in P2P Networks, WWW 2003 Global Reputation? Paramount Pictures Trust is a personalised concept! 3

TrustWebRank Network-theoretic approach to personalised, transitive trust [1] Assume direct trust matrix T ij 0,1 Normalization of direct trust S ij = T ij T ik k N(s) (Indirect) trust between s and l l k 1 k 2 T sl = S sl + β S sj T jl j 2 j j 3 1 0.6 0.3 j N(s) 0.5 1 s 0.4 0.2 Personalised trust measure Distributed implementation proposed in [2] Iterative computation based on flooding of T Many Exhaustive strong and computation short paths of from matrix s to T l is expensive! High trust T sl [1] F. E. Walter, S. Battiston, F. Schweitzer: Personalised and dynamic trust in social networks. ACM RecSys 2009 [2] V. Carchiolo et al.: A distributed algorithm for personalized trust evaluation in social networks. Intelligent Distributed Computing IV, 2010 Research goals Efficiently identify small number of most trusted nodes without exhaustive calculation of trust matrix Simple and practicable protocol easy to apply in Peer-to-Peer topologies Tunable mechanism that allows trade-off between accuracy and efficiency Sample from the probability distribution which TWR computes! Perform a biased random walk via trust links and count node visits! 4

Sampling indirect trust by random walks Node s starts random walker Potential restart after each step with prob. γ continue walk with prob. 1 γ restart at node s Maximum of W restarts Record visited nodes Example Visits: j 1 j 2 l k 1 j 3 k 2 l j 1 j 2 k 2 l l k 1 k 2 j 2 j j 3 1 0.3 0.5 s 0.2 m Number of visits of node l is an estimate for T sl A probabilistic protocol Random walker with W restarts W+1 dying random walkers j 1 j 2 l k 1 j 3 k 2 l j 1 j 2 k 2 l Node s starts has received trust identification all died messages m[] msg.source := s visits m[i]. path msd.dead := false p i T si T si T for (i=0; sv visits.count(v) i<w; visits.length i++) i send msg to i with prob. p i Node i receives message msg: msg. visits. add i p j γ T ij T ij with probability p j do msg. hops msg. hops + 1 send msg to neighbor j with probability 1 p j do msg. dead = true send msg to msg. source 5

Experimental Evaluation Q: How well do we recover the most trusted nodes? T TWR T RWT T TWR Erdös-Rényi network Minimum number of walkers Q: How many walkers are needed to detect most trusted nodes? 6

The role of restarts Scale-free network The role of restarts Trust s 1, l < > Trust (s 2, l) l s 1 s 2 7

Conclusion and future steps Proposed random walk algorithm captures the same notion of personalized trust like TrustWebRank correctly identifies most trusted nodes is more efficient than TrustWebRank implementations can be tuned for a trade-off between efficiency and precision is simple and suitable for P2P applications Current work Evaluation based on empirical (clustered) trust networks Scalability analysis Extension to other trust propagation schemes Thank You Follow Chair of Systems Design on Google+ 8