Detecting unfair recommendations in trust-based pervasive environments

被引:34
|
作者
D'Angelo, Gianni [1 ]
Palmieri, Francesco [1 ]
Rampone, Salvatore [2 ]
机构
[1] Univ Salerno, Dept Comp Sci, Fisciano, SA, Italy
[2] Univ Sannio, Dept Law Econ Management & Quantitat Methods DEMM, Benevento, Italy
关键词
Pervasive computing; Ubiquitous computing; Trust model; Unfair recommenders; Reputation systems; Unfair recommender-data; Association rules; Apriori algorithm; REPUTATION SYSTEMS; SECURITY; MANAGEMENT; MODEL;
D O I
10.1016/j.ins.2019.02.015
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In pervasive/ubiquitous computing environments, interacting users may evaluate their respective trustworthiness by using historical data coming from their past interactions. Nevertheless, when two users are at the first interaction, they have no historical data involving their own activities to be analyzed, and then use information (recommender-data) provided by other users (recommenders) who, in the past, have had interactions with one of the involved parties. Although this approach has proven to be effective, it might fail if dishonest recommenders provide unfair recommender-data. Indeed, such unfair data may lead to skewed evaluations, and therefore either increase the trustworthiness of a malicious user or reduce the one of a honest user in a fraudulent way. In this work, we propose an algorithm for identifying false recommender-data. Our attention is explicitly focused on recommender-data rather than recommenders. This because some recommenders could provide recommender-data containing only a limited (but specific) set of altered information. This is used by dishonest recommenders as a tactic to avoid being discovered. The proposed algorithm uses association rules to express a confidence-based measure (reputation rank), which is used as a reliability ranking of the recommender-data. The resulting approach has been compared with other existing ones in this field, resulting more accurate in finding out unfair recommender-data sent by dishonest recommenders. (C) 2019 Elsevier Inc. All rights reserved.
引用
收藏
页码:31 / 51
页数:21
相关论文
共 50 条
  • [1] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    [J]. COMPUTER, 2001, 34 (12) : 154 - 157
  • [2] A trust-based security system for ubiquitous and pervasive computing environments
    Boukerche, Azzedine
    Ren, Yonglin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4343 - 4351
  • [3] Trust-based recommendations for documents
    Hess, Claudia
    Schlieder, Christoph
    [J]. AI COMMUNICATIONS, 2008, 21 (2-3) : 145 - 153
  • [4] Inferring and calculating trust for trust-based recommendations
    Tselenti, Panagiota
    Danas, Konstantinos
    Lazaridou, Olympia
    [J]. 22ND PAN-HELLENIC CONFERENCE ON INFORMATICS (PCI 2018), 2018, : 10 - 15
  • [5] Filtering out unfair recommendations for trust model in ubiquitous environments
    Yuan, Weiwei
    Guan, Donghai
    Lee, Sungyoung
    Lee, Young-Koo
    Lee, Heejo
    [J]. Information Systems Security, Proceedings, 2006, 4332 : 357 - 360
  • [6] TrustAC:: Trust-based access control for pervasive devices
    Almenárez, F
    Marín, A
    Campo, C
    García, RC
    [J]. SECURITY IN PERVASIVE COMPUTING, PROCEEDINGS, 2005, 3450 : 225 - 238
  • [7] Confidence on Collaborative Filtering and Trust-Based Recommendations
    Meyffret, Simon
    Medini, Lionel
    Laforest, Frederique
    [J]. E-COMMERCE AND WEB TECHNOLOGIES, EC-WEB 2013, 2013, 152 : 162 - 173
  • [8] Trust-based Recommendations through Triadic Closure
    Tselenti, Panagiota
    Danas, Konstantinos
    [J]. 2016 7TH INTERNATIONAL CONFERENCE ON INFORMATION, INTELLIGENCE, SYSTEMS & APPLICATIONS (IISA), 2016,
  • [9] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [10] A trust-based secure service discovery (TSSD) model for pervasive computing
    Ahamed, Sheikh I.
    Sharmin, Moushumi
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4281 - 4293