Detecting unfair recommendations in trust-based pervasive environments

Abstract In pervasive/ubiquitous computing environments, interacting users may evaluate their respective trustworthiness by using historical data coming from their past interactions. Nevertheless, when two users are at the first interaction, they have no historical data involving their own activities to be analyzed, and then use information (recommender-data) provided by other users (recommenders) who, in the past, have had interactions with one of the involved parties. Although this approach has proven to be effective, it might fail if dishonest recommenders provide unfair recommender-data. Indeed, such unfair data may lead to skewed evaluations, and therefore either increase the trustworthiness of a malicious user or reduce the one of a honest user in a fraudulent way. In this work, we propose an algorithm for identifying false recommender-data. Our attention is explicitly focused on recommender-data rather than recommenders. This because some recommenders could provide recommender-data containing only a limited (but specific) set of altered information. This is used by dishonest recommenders as a tactic to avoid being discovered. The proposed algorithm uses association rules to express a confidence-based measure (reputation rank), which is used as a reliability ranking of the recommender-data. The resulting approach has been compared with other existing ones in this field, resulting more accurate in finding out unfair recommender-data sent by dishonest recommenders.

[1]  Timothy W. Finin,et al.  Communications - Trust-Based Security in Pervasive Computing Environments , 2001, Computer.

[2]  A. M. Madni,et al.  Recommender systems in e-commerce , 2014, 2014 World Automation Congress (WAC).

[3]  Sheikh Iqbal Ahamed,et al.  Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..

[4]  Usama M. Fayyad,et al.  Knowledge Discovery in Databases: An Overview , 1997, ILP.

[5]  Chandan Mazumdar,et al.  A Survey of Trust Models for Enterprise Information Systems , 2016 .

[6]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[7]  Chunyan Miao,et al.  A fuzzy logic based reputation model against unfair ratings , 2013, AAMAS.

[8]  Gianni D'Angelo,et al.  Diagnosis of aerospace structure defects by a HPC implemented soft computing algorithm , 2014, 2014 IEEE Metrology for Aerospace (MetroAeroSpace).

[9]  Francesco Palmieri,et al.  Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification , 2017, Soft Comput..

[10]  Zengyou He,et al.  FP-outlier: Frequent pattern based outlier detection , 2005, Comput. Sci. Inf. Syst..

[11]  Enrique Herrera-Viedma,et al.  A model to represent users trust in recommender systems using ontologies and fuzzy linguistic modeling , 2015, Inf. Sci..

[12]  Osmar R. Zaïane,et al.  Mammography Classification By an Association Rule-based Classifier , 2002, MDM/KDD.

[13]  Voula C. Georgopoulos,et al.  Medical Decision Support Systems based on Soft Computing techniques , 2011 .

[14]  Chunyan Miao,et al.  Protecting Online Rating Systems from Unfair Ratings , 2005, TrustBus.

[15]  Gianni D'Angelo,et al.  Shape-based defect classification for non destructive testing , 2015, 2015 IEEE Metrology for Aerospace (MetroAeroSpace).

[16]  Naima Iltaf,et al.  A mechanism for detecting dishonest recommendation in indirect trust computation , 2013, EURASIP J. Wirel. Commun. Netw..

[17]  Yan Sun,et al.  Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..

[18]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[19]  Naima Iltaf,et al.  Modeling interaction using trust and recommendation in ubiquitous computing environment , 2012, EURASIP J. Wirel. Commun. Netw..

[20]  Laurence T. Yang,et al.  Security, privacy and trust of user-centric solutions , 2018, Future Gener. Comput. Syst..

[21]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[22]  Alfredo De Santis,et al.  A triadic closure and homophily-based recommendation system for online social networks , 2015, World Wide Web.

[23]  Anjali Barmade An Efficient Strategy to Detect Outlier Transactions , 2014 .

[24]  Tom M. Mitchell,et al.  Machine Learning and Data Mining , 2012 .

[25]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[26]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[27]  Kris Bubendorfer,et al.  Reputation systems: A survey and taxonomy , 2015, J. Parallel Distributed Comput..

[28]  Tao Sun,et al.  A Distributed Trust Management Scheme in the Pervasive Computing Environment , 2007, 2007 Canadian Conference on Electrical and Computer Engineering.

[29]  Giuseppe Cattaneo,et al.  FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment , 2013, 2013 IEEE 27th International Conference on Advanced Information Networking and Applications (AINA).

[30]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[31]  Mark Weiser,et al.  The computer for the 21st Century , 1991, IEEE Pervasive Computing.

[32]  Francesco Palmieri,et al.  An Artificial Intelligence-Based Trust Model for Pervasive Computing , 2015, 2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC).

[33]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[34]  Gianni D'Angelo,et al.  Toward a soft computing-based correlation between oxygen toxicity seizures and hyperoxic hyperpnea , 2018, Soft Comput..

[35]  Ernesto Damiani,et al.  A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.

[36]  Aphrodite Tsalgatidou,et al.  Reputation Systems Evaluation Survey , 2015, ACM Comput. Surv..

[37]  Andrés Marín López,et al.  Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.

[38]  Shailendra Narayan Singh,et al.  Outlier Detection: Applications and techniques in Data Mining , 2016, 2016 6th International Conference - Cloud System and Big Data Engineering (Confluence).

[39]  Gianni D'Angelo,et al.  Feature Extraction and Soft Computing Methods for Aerospace Structure Defect Classification , 2016, ArXiv.

[40]  Ross A. Malaga Web-Based Reputation Management Systems: Problems and Suggested Solutions , 2001, Electron. Commer. Res..

[41]  Ramakrishnan Srikant,et al.  Fast Algorithms for Mining Association Rules in Large Databases , 1994, VLDB.

[42]  Gianni D'Angelo,et al.  Automated Eddy Current non-destructive testing through low definition lissajous figures , 2016, 2016 IEEE Metrology for Aerospace (MetroAeroSpace).

[43]  Ossama H. Embarak A method for solving the cold start problem in recommendation systems , 2011, 2011 International Conference on Innovations in Information Technology.