Combining user reputation and provenance analysis for trust assessment

D. Ceolin, P. Groth, V. Maccatrozzo, W. Fokkink, W.R. Van Hage, A. Nottamkandath

Research output: Contribution to journalArticleAcademicpeer-review

10 Citations (Scopus)

Abstract

Trust is a broad concept that in many systems is often reduced to user reputation alone. However, user reputation is just one way to determine trust. The estimation of trust can be tackled from other perspectives as well, including by looking at provenance. Here, we present a complete pipeline for estimating the trustworthiness of artifacts given their provenance and a set of sample evaluations. The pipeline is composed of a series of algorithms for (1) extracting relevant provenance features, (2) generating stereotypes of user behavior from provenance features, (3) estimating the reputation of both stereotypes and users, (4) using a combination of user and stereotype reputations to estimate the trustworthiness of artifacts and (5) selecting sets of artifacts to trust. These algorithms rely on the W3C PROV recommendations for provenance and on evidential reasoning by means of subjective logic. We evaluate the pipeline over two tagging datasets: tags and evaluations from the Netherlands Institute for Sound and Vision's Waisda? video tagging platform, as well as crowdsourced annotations from the Steve. Museum project. The approach achieves up to 85% precision when predicting tag trustworthiness. Perhaps more importantly, the pipeline provides satisfactory results using relatively little evidence through the use of provenance.

Original languageEnglish
Article number6
Number of pages28
JournalJournal of Data and Information Quality
Volume7
Issue number1-2
DOIs
Publication statusPublished - 1 Jan 2016
Externally publishedYes

Keywords

  • Machine learning
  • Provenance
  • Subjective logic
  • Tags
  • Trust
  • Uncertainty reasoning

Fingerprint

Dive into the research topics of 'Combining user reputation and provenance analysis for trust assessment'. Together they form a unique fingerprint.

Cite this