• Share
  • Email
  • Embed
  • Like
  • Save
  • Private Content
A trust aggregation portal
 

A trust aggregation portal

on

  • 521 views

 

Statistics

Views

Total Views
521
Views on SlideShare
521
Embed Views
0

Actions

Likes
0
Downloads
2
Comments
4

0 Embeds 0

No embeds

Accessibility

Categories

Upload Details

Uploaded via as Microsoft PowerPoint

Usage Rights

© All Rights Reserved

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel

14 of 4 previous next Post a comment

  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Processing…
Post Comment
Edit your comment

    A trust aggregation portal A trust aggregation portal Presentation Transcript

    • A Trust Aggregation PortalSupervisor:Prof. Gihan Dias 128202E – A.G.E.A. Abeynayake
    • Social Identity & Trust• What is Social Identity? – Layman View – Cyberspace• Where does Trust fits in? Image Courtesy of: Social Identity Report at http://www.veechi.com/sir.html
    • Problem Definition• Numerous interconnections between individuals andOrganizations – Multiple Identities• Enormous social networking sites – Overlapping Content – Non-overlapping Content• Isolated nature of individual systems – Has there own Recommendation system – Personal Profile information – Not Disclosed to other systems
    • A Step Ahead...• A “Trust mark” for Individuals  Feedback by Friends  Day-to-Day Activities  Context Information Image Courtesy of: Social Identity Report at http://www.veechi.com/sir.html
    • Literature Review – Area of Concern• Study about NSTIC – National Strategy for Trusted Identities in Cyberspace• Collecting Aggregating User Data – Extraction Methods – Current Systems• Trust and Reputation Models – Existing models for Trust Scoring
    • NSTIC Study• NSTIC Addresses two central problems [1] – Passwords are inconvenient and insecure – Individuals are unable to prove their true identity online for significant transactions• Key Operational Roles – subjects – relying parties – identity providers – attribute providers – accreditation authorities
    • Identity Ecosystem [2]• NSTIC provides a framework for individuals and organizations to utilize secure, efficient, easy-to-use• and interoperable identity solutions to access online services in a manner that promotes• confidence, privacy, choice and innovation.
    • Image courtesy: www.ftc.gov/bcp/workshops/.../personalDataEcosystem.pdf
    • Collection and Aggregation of data• Prying Data out of a Social Network [3] presents Methods Of Extracting Data – Public Listings – Facebook and LinkedIn APIs – Facebook Graph API – Scraping Facebook UI
    • Collection and Aggregation of data• Crawling Social Networks [4] – crawled these user data in a breadth-first fashion – used a queue data structure – Stored in MySQL database using a simple schema
    • Trust and Reputation• Trust Classes [5] - According to Grandison & Slomans classication• Classification of trust and reputation measures Specific General Subjective Survey eBay, voting questionnaires Objective Product tests Synthesised general score from product tests, D&B rating
    • Trust and Reputation• Reputation Network Architectures [5] – Centralised Reputation Systems – Distributed Reputation Systems• Classification of Reputation Systems [6] – Flat reputation systems – Recursively weighting reputation system – Personalized reputation system with trust anchor
    • Trust and Reputation• Algorithms and Methods for Measurement [7] [8] – Collaborative filtering and Collaborative Sanctioning – Bayesian Networks – Fuzzy Decision Trees – Boosting algorithms
    • References[1] National Institute Of Standards And Technology. “Recommendations For Establishing An Identity Ecosystem Governance Structure”. White House.Department of Commerce. Available at: http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf[2] NSTIC. “Enhancing Online Choice, Efficiency, Security, and Privacy”. Available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_ 041511.pdf[3] Joseph Bonneau, Jonathan Anderson, George Danezis. "Prying Data out of a Social Network", ASONAM 09 Proceedings of the International Conference on Advances in Social Network Analysis and Mining, 2009, pp. 249-254[4] D. H. Chau, S. Pandit, S. Wang, and C. Faloutsos, “Parallel Crawling for Online Social Networks,” in WWW ’07: Proceedings of the 16th international conference on World Wide Web, 2007, pp. 1283–1284.
    • References[5]B. Krishnamurthy and C. E. Wills, “Characterizing Privacy in Online Social Networks,” in WOSN: Workshop on Online Social Networks, 2008, pp. 37 – 42.[6] W. Xu, X. Zhou, and L. Li, “Inferring Privacy Information via Social Relations,” International Conference on Data Engineering, 2008.[7] A. Gutscher, J. Heesen and O. Siemoneit, “Possibilities and Limitations of Modeling Trust and Reputation,” Proc. CEUR Workshop, 2008.[8]Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 2 (March 2007), 618-644.