Iterative Trust and Reputation Management Using Belief Propagation


In this paper, we introduce the first application of the belief propagation algorithm in the design and evaluation of trust and reputation management systems. We approach the reputation management problem as an inference problem and describe it as computing marginal likelihood distributions from complicated global functions of many variables. However, we observe that computing the marginal probability functions is computationally prohibitive for large-scale reputation systems. Therefore, we propose to utilize the belief propagation algorithm to efficiently (in linear complexity) compute these marginal probability distributions; resulting a fully iterative probabilistic and belief propagation-based approach (referred to as BP-ITRM). BP-ITRM models the reputation system on a factor graph. By using a factor graph, we obtain a qualitative representation of how the consumers (buyers) and service providers (sellers) are related on a graphical structure. Further, by using such a factor graph, the global functions factor into products of simpler local functions, each of which depends on a subset of the variables. Then, we compute the marginal probability distribution functions of the variables representing the reputation values (of the service providers) by message passing between nodes in the graph. We show that BP-ITRM is reliable in filtering out malicious/unreliable reports. We provide a detailed evaluation of BP-ITRM via analysis and computer simulations. We prove that BP-ITRM iteratively reduces the error in the reputation values of service providers due to the malicious raters with a high probability. Further, we observe that this probability drops suddenly if a particular fraction of malicious raters is exceeded, which introduces a threshold property to the scheme. Furthermore, comparison of BP-ITRM with some well-known and commonly used reputation management techniques (e.g., Averaging Scheme, Bayesian Approach, and Cluster Filtering) indicates the superiority of -
he proposed scheme in terms of robustness against attacks (e.g., ballot stuffing, bad mouthing). Finally, BP-ITRM introduces a linear complexity in the number of service providers and consumers, far exceeding the efficiency of other schemes.

Did you like this research project?

To get this research project Guidelines, Training and Code... Click Here

PROJECT TITLE :Iterative Receivers for Downlink MIMO-SCMA: Message Passing and Distributed Cooperative Detection - 2018ABSTRACT:The fast development of mobile communications requires even higher spectral potency. Non-orthogonal
PROJECT TITLE :Diagnosing and Minimizing Semantic Drift in Iterative Bootstrapping Extraction - 2018ABSTRACT:Semantic drift is a common problem in iterative information extraction. Previous approaches for minimizing semantic drift
PROJECT TITLE :Iterative Block Tensor Singular Value Thresholding For Extraction Of Low Rank Component Of Image Data - 2017ABSTRACT:Tensor principal component analysis (TPCA) is a multi-linear extension of principal component
PROJECT TITLE : Efficiently Promoting Product Online Outcome: An Iterative Rating Attack Utilizing Product and Market Property - 2017 ABSTRACT: The prosperity of on-line rating system makes it a popular place for malicious
PROJECT TITLE : On Fault Tolerance for Distributed Iterative Dataflow Processing - 2017 ABSTRACT: Large-scale graph and machine learning analytics widely use distributed iterative processing. Typically, these analytics are

Ready to Complete Your Academic MTech Project Work In Affordable Price ?

Project Enquiry