TIDY: A Trust-Based Approach to Information Fusion through Diversity

被引:0
|
作者
Etuk, Anthony [1 ]
Norman, Timothy J. [1 ]
Sensoy, Murat [1 ,3 ]
Bisdikian, Chatschik [2 ]
Srivatsa, Mudhakar [2 ]
机构
[1] Univ Aberdeen, Comp Sci Dept, Aberdeen AB9 1FX, Scotland
[2] IBM TJ Watson Res Ctr, Yorktown Hts, NY USA
[3] Ozyegin Univ, Comp Sci, Istanbul, Turkey
关键词
REPUTATION;
D O I
暂无
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
Trust and reputation are significant components in open dynamic systems for making informed and reliable decisions. State-of-the-art information fusion models that exploit these mechanisms generally rely on reports from as many sources as possible. Situations exist, however, where seeking evidence from all possible sources is unrealistic. Querying information sources is costly especially in resource-constrained environments, in terms of time and bandwidth. In addition, reports from multiple sources expose one to the risk of double-counting evidence, introducing an extra challenge of distinguishing fact from rumour. This paper describes TIDY (Trust-based Information fusion through DiversitY), a trust-based approach to information fusion that exploits diversity among information sources in order to select a small number of candidates to query for evidence, and to minimise the effect of correlated evidence and bias. We demonstrate that reliable decisions can be reached using evidence from small groups of individuals. We show empirically that our approach is robust in contexts of variable trust in information sources, and to a degree of deception.
引用
收藏
页码:1188 / 1195
页数:8
相关论文
共 50 条
  • [31] Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    Obaidat, Mohammad S.
    [J]. EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 : 55 - 65
  • [32] Requirements modeling for organization networks: A (dis)trust-based approach
    Gans, G
    Jarke, M
    Kethers, S
    Lakemeyer, G
    Ellrich, L
    Funken, C
    Meister, M
    [J]. FIFTH IEEE INTERNATIONAL SYMPOSIUM ON REQUIREMENTS ENGINEERING, PROCEEDINGS, 2001, : 154 - 163
  • [33] A Trust-based Approach against IP-spoofing Attacks
    Gonzalez, Jesus M.
    Anwar, Mohd
    Joshi, James B. D.
    [J]. 2011 NINTH ANNUAL INTERNATIONAL CONFERENCE ON PRIVACY, SECURITY AND TRUST, 2011, : 63 - 70
  • [34] Implementation of Trust-Based Novel Approach for Security Enhancements in MANETs
    Usha M.S.
    Ravishankar K.C.
    [J]. SN Computer Science, 2021, 2 (4)
  • [35] A cognitive trust-based approach for Web Service discovery and selection
    Ali, AS
    Ludwig, SA
    Rana, OF
    [J]. THIRD EUROPEAN CONFERENCE ON WEB SERVICES, PROCEEDINGS, 2005, : 38 - 49
  • [36] A Trust-Based Collaborative Filtering Approach to Design Recommender Systems
    Sejwal, Vineet K.
    Abulaish, Muhammad
    [J]. INTERNATIONAL JOURNAL OF ADVANCED COMPUTER SCIENCE AND APPLICATIONS, 2020, 11 (10) : 563 - 573
  • [37] Science, politics and regulation: The trust-based approach to the demarcation problem
    John, Stephen
    [J]. STUDIES IN HISTORY AND PHILOSOPHY OF SCIENCE, 2021, 90 : 1 - 9
  • [38] TAMAP: a new trust-based approach for mobile agent protection
    Hacini, Salima
    Guessoum, Zahia
    Boufaida, Zizette
    [J]. JOURNAL OF COMPUTER VIROLOGY AND HACKING TECHNIQUES, 2007, 3 (04): : 267 - 283
  • [39] A Trust-Based Approach for a Competitive Cloud/Grid Computing Scenario
    Messina, Fabrizio
    Pappalardo, Giuseppe
    Rosaci, Domenico
    Santoro, Corrado
    Sarne, Giuseppe M. L.
    [J]. INTELLIGENT DISTRIBUTED COMPUTING VI, 2013, 446 : 129 - 138
  • [40] AgeTrust: A new temporal trust-based collaborative filtering approach
    Moghaddam, Morteza Ghorbani
    Mustapha, Norwati
    Mustapha, Aida
    Sharef, Nurfadhlina Mohd
    Elahian, Anousheh
    [J]. 2014 INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND APPLICATIONS (ICISA), 2014,