SlideShare a Scribd company logo
A Trust Aggregation Portal



Supervisor:
Prof. Gihan Dias         128202E – A.G.E.A. Abeynayake
Social Identity & Trust
• What is Social Identity?
  – Layman View
  – Cyberspace


• Where does Trust
  fits in?



              Image Courtesy of: Social Identity Report at http://www.veechi.com/sir.html
Problem Definition
• Numerous interconnections between individuals and
Organizations
      – Multiple Identities


• Enormous social networking sites
      – Overlapping Content
      – Non-overlapping Content


• Isolated nature of individual systems
      – Has there own Recommendation system
      – Personal Profile information
      – Not Disclosed to other systems
A Step Ahead...




• A “Trust mark” for Individuals
  Feedback by Friends
  Day-to-Day Activities
  Context Information
     Image Courtesy of: Social Identity Report at http://www.veechi.com/sir.html
Literature Review – Area of Concern
• Study about NSTIC
  – National Strategy for Trusted Identities in
    Cyberspace
• Collecting Aggregating User Data
  – Extraction Methods
  – Current Systems
• Trust and Reputation Models
  – Existing models for Trust Scoring
NSTIC Study
• NSTIC Addresses two central problems [1]
   – Passwords are inconvenient and insecure
   – Individuals are unable to prove their true identity
     online for significant transactions
• Key Operational Roles
   –    subjects
   –   relying parties
   –   identity providers
   –   attribute providers
   –   accreditation authorities
Identity Ecosystem [2]
• NSTIC provides a framework for individuals
  and organizations to utilize
  secure, efficient, easy-to-use
• and interoperable identity solutions to access
  online services in a manner that promotes
• confidence, privacy, choice and innovation.
Image courtesy: www.ftc.gov/bcp/workshops/.../personalDataEcosystem.pdf
Collection and Aggregation of data
• Prying Data out of a Social Network [3]
  presents Methods Of Extracting Data
  – Public Listings
  – Facebook and LinkedIn APIs
  – Facebook Graph API
  – Scraping Facebook UI
Collection and Aggregation of data
• Crawling Social Networks [4]
  – crawled these user data in a breadth-first fashion
  – used a queue data structure
  – Stored in MySQL database using a simple schema
Trust and Reputation
• Trust Classes [5] - According to Grandison &
  Sloman's classication
• Classification of trust and reputation measures
                   Specific         General
      Subjective   Survey           eBay, voting
                   questionnaires
      Objective    Product tests    Synthesised general
                                    score from
                                    product tests, D&B
                                    rating
Trust and Reputation
• Reputation Network Architectures [5]
  – Centralised Reputation Systems
  – Distributed Reputation Systems


• Classification of Reputation Systems [6]
  – Flat reputation systems
  – Recursively weighting reputation system
  – Personalized reputation system with trust anchor
Trust and Reputation
• Algorithms and Methods for Measurement [7]
  [8]
  – Collaborative filtering and Collaborative
    Sanctioning
  – Bayesian Networks
  – Fuzzy Decision Trees
  – Boosting algorithms
References
[1] National Institute Of Standards And Technology. “Recommendations For
    Establishing An Identity Ecosystem Governance Structure”. White
    House.Department of Commerce. Available at:
    http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf
[2] NSTIC. “Enhancing Online Choice, Efficiency, Security, and Privacy”.
    Available at:
    http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_
    041511.pdf
[3] Joseph Bonneau, Jonathan Anderson, George Danezis. "Prying Data out of
    a Social Network", ASONAM '09 Proceedings of the International
    Conference on Advances in Social Network Analysis and Mining, 2009, pp.
    249-254
[4] D. H. Chau, S. Pandit, S. Wang, and C. Faloutsos, “Parallel Crawling for
    Online Social Networks,” in WWW ’07: Proceedings of the 16th
    international conference on World Wide Web, 2007, pp. 1283–1284.
References
[5]B. Krishnamurthy and C. E. Wills, “Characterizing Privacy in Online Social
    Networks,” in WOSN: Workshop on Online Social Networks, 2008, pp. 37 –
    42.
[6] W. Xu, X. Zhou, and L. Li, “Inferring Privacy Information via Social
    Relations,” International Conference on Data Engineering, 2008.

[7] A. Gutscher, J. Heesen and O. Siemoneit, “Possibilities and Limitations of
    Modeling Trust and Reputation,” Proc. CEUR Workshop, 2008.

[8]Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and
   reputation systems for online service provision. Decis. Support Syst. 43, 2
   (March 2007), 618-644.

More Related Content

PPT
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
PPT
Knowledge Management
PPTX
Enaktin
PDF
Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...
PPT
SEMANTIC CIS: COMMUNITY INFORMATION SERVICES ON SEMANTIC WEB PLATFORM
PPTX
FORCE11: Creating a data and tools ecosystem
PPT
COMMUNITY INFORMATION SERVICE 2.0: APPLICATION OF WEB 2.0 TOOLS IN DESIGNING...
PPT
Embracing Social Software And Semantic Web In Digital Libraries
Microsoft Research Cambridge 20071207 Workshop On Online Social Networks (T...
Knowledge Management
Enaktin
Exploiting classical bibliometrics of CSCW: classification, evaluation, limit...
SEMANTIC CIS: COMMUNITY INFORMATION SERVICES ON SEMANTIC WEB PLATFORM
FORCE11: Creating a data and tools ecosystem
COMMUNITY INFORMATION SERVICE 2.0: APPLICATION OF WEB 2.0 TOOLS IN DESIGNING...
Embracing Social Software And Semantic Web In Digital Libraries

What's hot (13)

PPTX
Relationship Web: Trailblazing, Analytics and Computing for Human Experience
PPT
Advancing Science In A Collaborative Web 20 World
PPT
Wikis in corporate knowledge management
PDF
Open Data is not Enough (final version)
PPT
Working wikily in networks
PDF
Research in Intelligent Systems and Data Science at the Knowledge Media Insti...
PDF
Virtual Organizations 2.0: Social Constructs for Data-centered Collaborative ...
PPT
Presentatie Noha
PPT
Internet2 and Cyberinfrastructure
KEY
Intro to Info Arch
PPT
Harnessing Collective Intelligence
PDF
The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...
PPTX
Data commons bonazzi bd2 k fundamentals of science feb 2017
Relationship Web: Trailblazing, Analytics and Computing for Human Experience
Advancing Science In A Collaborative Web 20 World
Wikis in corporate knowledge management
Open Data is not Enough (final version)
Working wikily in networks
Research in Intelligent Systems and Data Science at the Knowledge Media Insti...
Virtual Organizations 2.0: Social Constructs for Data-centered Collaborative ...
Presentatie Noha
Internet2 and Cyberinfrastructure
Intro to Info Arch
Harnessing Collective Intelligence
The Evidence Hub: Harnessing the Collective Intelligence of Communities to Bu...
Data commons bonazzi bd2 k fundamentals of science feb 2017
Ad

Similar to A trust aggregation portal (20)

PDF
Reputation based model for decision making in the digital age
PPTX
Metadata and Metrics to Support Open Access
PDF
Lecture4 Social Web
PPTX
Mobile Computing - Research Survey May 05 2012
KEY
Lecture 5: Mining, Analysis and Visualisation
PPTX
Meeting Federal Research Requirements
PDF
National Association for Trusted Identities in Cyberspace - Establishing Trus...
PDF
Exploring social theory through enterprise social media (muller, ibm research)
PPTX
PhD thesis defense of Christopher Thomas
PPTX
An Introduction to NodeXL for Social Scientists
PDF
Clergy ResponseNet presentation - Deirdre Hainsworth
PPTX
Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...
PPTX
A Lifecycle Approach to Information Privacy
PDF
Shibboleth: Open Source Distributed Authentication and Authorization
PPTX
Alamw15 VIVO
PPT
Supporting Libraries in Leading the Way in Research Data Management
PPTX
Building Competitive Moats With Data
PPTX
Values Interventions: Ethics Scholarship in Action
PPTX
Introduction to Information Architecture & Design - SVA Workshop 10/04/14
PDF
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Reputation based model for decision making in the digital age
Metadata and Metrics to Support Open Access
Lecture4 Social Web
Mobile Computing - Research Survey May 05 2012
Lecture 5: Mining, Analysis and Visualisation
Meeting Federal Research Requirements
National Association for Trusted Identities in Cyberspace - Establishing Trus...
Exploring social theory through enterprise social media (muller, ibm research)
PhD thesis defense of Christopher Thomas
An Introduction to NodeXL for Social Scientists
Clergy ResponseNet presentation - Deirdre Hainsworth
Changing the Curation Equation: A Data Lifecycle Approach to Lowering Costs a...
A Lifecycle Approach to Information Privacy
Shibboleth: Open Source Distributed Authentication and Authorization
Alamw15 VIVO
Supporting Libraries in Leading the Way in Research Data Management
Building Competitive Moats With Data
Values Interventions: Ethics Scholarship in Action
Introduction to Information Architecture & Design - SVA Workshop 10/04/14
Analyst Keynote: Delivering Faster Insights with a Logical Data Fabric in a H...
Ad

Recently uploaded (20)

PPTX
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
PPTX
GDM (1) (1).pptx small presentation for students
PPTX
human mycosis Human fungal infections are called human mycosis..pptx
PPTX
Cell Types and Its function , kingdom of life
PDF
Abdominal Access Techniques with Prof. Dr. R K Mishra
PDF
VCE English Exam - Section C Student Revision Booklet
PPTX
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
PDF
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
PDF
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
PDF
Microbial disease of the cardiovascular and lymphatic systems
PDF
Module 4: Burden of Disease Tutorial Slides S2 2025
PPTX
Final Presentation General Medicine 03-08-2024.pptx
PDF
O5-L3 Freight Transport Ops (International) V1.pdf
PDF
Supply Chain Operations Speaking Notes -ICLT Program
PDF
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
PDF
Weekly quiz Compilation Jan -July 25.pdf
PDF
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
PDF
O7-L3 Supply Chain Operations - ICLT Program
DOC
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
PPTX
Microbial diseases, their pathogenesis and prophylaxis
school management -TNTEU- B.Ed., Semester II Unit 1.pptx
GDM (1) (1).pptx small presentation for students
human mycosis Human fungal infections are called human mycosis..pptx
Cell Types and Its function , kingdom of life
Abdominal Access Techniques with Prof. Dr. R K Mishra
VCE English Exam - Section C Student Revision Booklet
PPT- ENG7_QUARTER1_LESSON1_WEEK1. IMAGERY -DESCRIPTIONS pptx.pptx
OBE - B.A.(HON'S) IN INTERIOR ARCHITECTURE -Ar.MOHIUDDIN.pdf
3rd Neelam Sanjeevareddy Memorial Lecture.pdf
Microbial disease of the cardiovascular and lymphatic systems
Module 4: Burden of Disease Tutorial Slides S2 2025
Final Presentation General Medicine 03-08-2024.pptx
O5-L3 Freight Transport Ops (International) V1.pdf
Supply Chain Operations Speaking Notes -ICLT Program
GENETICS IN BIOLOGY IN SECONDARY LEVEL FORM 3
Weekly quiz Compilation Jan -July 25.pdf
Chapter 2 Heredity, Prenatal Development, and Birth.pdf
O7-L3 Supply Chain Operations - ICLT Program
Soft-furnishing-By-Architect-A.F.M.Mohiuddin-Akhand.doc
Microbial diseases, their pathogenesis and prophylaxis

A trust aggregation portal

  • 1. A Trust Aggregation Portal Supervisor: Prof. Gihan Dias 128202E – A.G.E.A. Abeynayake
  • 2. Social Identity & Trust • What is Social Identity? – Layman View – Cyberspace • Where does Trust fits in? Image Courtesy of: Social Identity Report at http://www.veechi.com/sir.html
  • 3. Problem Definition • Numerous interconnections between individuals and Organizations – Multiple Identities • Enormous social networking sites – Overlapping Content – Non-overlapping Content • Isolated nature of individual systems – Has there own Recommendation system – Personal Profile information – Not Disclosed to other systems
  • 4. A Step Ahead... • A “Trust mark” for Individuals  Feedback by Friends  Day-to-Day Activities  Context Information Image Courtesy of: Social Identity Report at http://www.veechi.com/sir.html
  • 5. Literature Review – Area of Concern • Study about NSTIC – National Strategy for Trusted Identities in Cyberspace • Collecting Aggregating User Data – Extraction Methods – Current Systems • Trust and Reputation Models – Existing models for Trust Scoring
  • 6. NSTIC Study • NSTIC Addresses two central problems [1] – Passwords are inconvenient and insecure – Individuals are unable to prove their true identity online for significant transactions • Key Operational Roles – subjects – relying parties – identity providers – attribute providers – accreditation authorities
  • 7. Identity Ecosystem [2] • NSTIC provides a framework for individuals and organizations to utilize secure, efficient, easy-to-use • and interoperable identity solutions to access online services in a manner that promotes • confidence, privacy, choice and innovation.
  • 9. Collection and Aggregation of data • Prying Data out of a Social Network [3] presents Methods Of Extracting Data – Public Listings – Facebook and LinkedIn APIs – Facebook Graph API – Scraping Facebook UI
  • 10. Collection and Aggregation of data • Crawling Social Networks [4] – crawled these user data in a breadth-first fashion – used a queue data structure – Stored in MySQL database using a simple schema
  • 11. Trust and Reputation • Trust Classes [5] - According to Grandison & Sloman's classication • Classification of trust and reputation measures Specific General Subjective Survey eBay, voting questionnaires Objective Product tests Synthesised general score from product tests, D&B rating
  • 12. Trust and Reputation • Reputation Network Architectures [5] – Centralised Reputation Systems – Distributed Reputation Systems • Classification of Reputation Systems [6] – Flat reputation systems – Recursively weighting reputation system – Personalized reputation system with trust anchor
  • 13. Trust and Reputation • Algorithms and Methods for Measurement [7] [8] – Collaborative filtering and Collaborative Sanctioning – Bayesian Networks – Fuzzy Decision Trees – Boosting algorithms
  • 14. References [1] National Institute Of Standards And Technology. “Recommendations For Establishing An Identity Ecosystem Governance Structure”. White House.Department of Commerce. Available at: http://www.nist.gov/nstic/2012-nstic-governance-recs.pdf [2] NSTIC. “Enhancing Online Choice, Efficiency, Security, and Privacy”. Available at: http://www.whitehouse.gov/sites/default/files/rss_viewer/NSTICstrategy_ 041511.pdf [3] Joseph Bonneau, Jonathan Anderson, George Danezis. "Prying Data out of a Social Network", ASONAM '09 Proceedings of the International Conference on Advances in Social Network Analysis and Mining, 2009, pp. 249-254 [4] D. H. Chau, S. Pandit, S. Wang, and C. Faloutsos, “Parallel Crawling for Online Social Networks,” in WWW ’07: Proceedings of the 16th international conference on World Wide Web, 2007, pp. 1283–1284.
  • 15. References [5]B. Krishnamurthy and C. E. Wills, “Characterizing Privacy in Online Social Networks,” in WOSN: Workshop on Online Social Networks, 2008, pp. 37 – 42. [6] W. Xu, X. Zhou, and L. Li, “Inferring Privacy Information via Social Relations,” International Conference on Data Engineering, 2008. [7] A. Gutscher, J. Heesen and O. Siemoneit, “Possibilities and Limitations of Modeling Trust and Reputation,” Proc. CEUR Workshop, 2008. [8]Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 2 (March 2007), 618-644.