[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
survey
Public Access

Decentralized Trust Management: Risk Analysis and Trust Aggregation

Published: 06 February 2020 Publication History

Abstract

Decentralized trust management is used as a referral benchmark for assisting decision making by human or intelligence machines in open collaborative systems. During any given period of time, each participant may only interact with a few other participants. Simply relying on direct trust may frequently resort to random team formation. Thus, trust aggregation becomes critical. It can leverage decentralized trust management to learn about indirect trust of every participant based on past transaction experiences. This article presents alternative designs of decentralized trust management and their efficiency and robustness from three perspectives. First, we study the risk factors and adverse effects of six common threat models. Second, we review the representative trust aggregation models and trust metrics. Third, we present an in-depth analysis and comparison of these reference trust aggregation methods with respect to effectiveness and robustness. We show our comparative study results through formal analysis and experimental evaluation. This comprehensive study advances the understanding of adverse effects of present and future threats and the robustness of different trust metrics. It may also serve as a guideline for research and development of next-generation trust aggregation algorithms and services in the anticipation of risk factors and mischievous threats.

References

[1]
Ankit Agrawal and A. K. Verma. 2016. A review 8 impact of trust schemes in MANET. In Proceedings of the International Conference on Advances in Information Communication Technology 8 Computing. ACM, 26:1--26:7.
[2]
Usama Ahmed, Imran Raza, and Syed Asad Hussain. 2019. Trust evaluation in cross-cloud federation: Survey and requirement analysis. ACM Comput. Surv. 52, 1 (2019), 19:1--19:37.
[3]
P. G. Balaji and D. Srinivasan. 2010. An introduction to multi-agent systems. In Proceedings of Innovations in Multi-Agent Systems and Applications-1. Springer, Berlin, 1--27.
[4]
Hongji Bao, Tengjiao Wang, Hongyan Li, and Dongqing Yang. 2009. DCMR: A method for combining user-based and trust-based recommendation. In Proceedings of the International Conference on Computational Intelligence and Software Engineering. IEEE, 1--5.
[5]
Diego De Siqueira Braga, Marco Niemann, Bernd Hellingrath, and Fernando Buarque De Lima Neto. 2018. Survey on computational trust and reputation models. ACM Comput. Surv. 51, 5 (2018), 101:1--101:40.
[6]
Ahmet Burak Can and Bharat Bhargava. 2013. SORT: A self-organizing trust model for peer-to-peer systems. IEEE Trans. Depend. Secure Comput. 10, 1 (2013), 14--27.
[7]
James Caverlee, Ling Liu, and Steve Webb. 2010. The SocialTrust framework for trusted social information management: Architecture and algorithms. Info. Sci. 180, 1 (2010), 95--112.
[8]
Younghun Chae, Lisa Cingiser Dipippo, and Yan Lindsay Sun. 2015. Trust management for defending on-off attacks. IEEE Trans. Parallel Distrib. Syst. 26, 4 (2015), 1178--1191.
[9]
Aiguo Chen, Guoai Xu, and Yixian Yang. 2008. A cluster-based trust model for mobile ad hoc networks. In Proceedings of 4th International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 1--4.
[10]
Ing-Ray Chen, Fenye Bao, MoonJeong Chang, and Jin-Hee Cho. 2014. Dynamic trust management for delay tolerant networks and its application to secure routing. IEEE Trans. Parallel Distrib. Syst. 25, 5 (2014).
[11]
Ing Ray Chen, Fenye Bao, and Jia Guo. 2016. Trust-based service management for social internet of things systems. IEEE Trans. Depend. Secure Comput. 13, 6 (2016), 684--696.
[12]
Jin-Hee Cho, Kevin Chan, and Sibel Adali. 2015. A survey on trust modeling. ACM Comput. Surv. 48, 2 (2015), 28:1--28:40.
[13]
Jin-Hee Cho, Ananthram Swami, and Ing-Ray Chen. 2011. A survey on trust management for mobile ad hoc networks. IEEE Commun. Surveys Tutor. 13, 4 (2011), 562--583.
[14]
Karen S. Cook, Toshio Yamagishi, and Robin Cooper. 2005. Trust building via risk taking: A cross-societal experiment. Soc. Psychol. Quart. 68, 2 (2005), 121--142.
[15]
Thanh Dat Dang and Doan Hoang. 2017. A data protection model for fog computing. In Proceedings of 2nd International Conference on Fog and Mobile Edge Computing. IEEE, 32--38.
[16]
Shuiguang Deng, Longtao Huang, Guandong Xu, Xindong Wu, and Zhaohui Wu. 2017. On deep learning for trust-aware recommendations in social networks. IEEE Trans. Neural Netw. Learn. Syst. 28, 5 (2017), 1164--1177.
[17]
Ittay Eyal and Emin Gn Sirer. 2018. Majority is not enough: Bitcoin mining is vulnerable. Commun. ACM 61, 7 (2018), 95--102.
[18]
Xinxin Fan, Mingchu Li, Yizhi Ren, and Jianhua Ma. 2010. Dual-EigenRep: A reputation-based trust model for P2P file-sharing networks. In Proceedings of the Symposia and Workshops on Ubiquitous, Autonomic and Trusted Computing. IEEE, 358--363.
[19]
Xinxin Fan, Ling Liu, Mingchu Li, and Zhiyuan Su. 2012. EigenTrust++: Attack resilient trust management. In Proceedings of the 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing. IEEE, 416--425.
[20]
Xinxin Fan, Ling Liu, Mingchu Li, and Zhiyuan Su. 2017. GroupTrust: Dependable trust management. IEEE Trans. Parallel Distrib. Syst. 28, 4 (2017), 1076--1090.
[21]
Diego Gambetta (Ed.). 1998. Can We Trust Trust? Basil Blackwell, Oxford, New York, NY.
[22]
Pedro Garcia Lopez, Alberto Montresor, Dick Epema, Anwitaman Datta, Teruo Higashino, Adriana Iamnitchi, Marinho Barcellos, Pascal Felber, and Etienne Riviere. 2015. Edge-centric computing: Vision and challenges. SIGCOMM Comput. Commun. Rev. 45, 5 (2015), 37--42.
[23]
Jennifer Golbeck. 2005. Personalizing applications through integration of inferred trust values in semantic web-based social networks. In Proceedings of the Semantic Network Analysis Workshop. 15--28.
[24]
Jennifer Golbeck. 2006a. Combining provenance with trust in social networks for semantic web content filtering. In Proceedings of the Conference on Provenance and Annotation of Data (IPAW’06), L. Moreau and I. Foster (eds.). Springer, 101--108.
[25]
Jennifer Golbeck. 2006b. Trust on the world wide web: A survey. Found. Trends Web Sci. 1, 2 (2006), 131--197.
[26]
Kannan Govindan and Prasant Mohapatra. 2012. Trust computations and trust dynamics in mobile ad hoc networks: A survey. IEEE Commun. Surveys Tutor. 14, 2 (2012), 279--298.
[27]
Jones Granatyr, Vanderson Botelho, Otto Robert Lessing, Edson Emílio Scalabrin, Jean-Paul Barthès, and Fabrício Enembreck. 2015. Trust and reputation models for multiagent systems. ACM Comput. Surv. 48, 2 (2015), 27:1--27:42.
[28]
Mark S. Granovetter. 1973. The strength of weak ties. Amer. J. Sociol. 34, 3 (1973), 1360--1380.
[29]
R. Guha, Ravi Kumar, Prabhakar Raghavan, and Andrew Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web. ACM, New York, NY, 403--412.
[30]
Sheikh Mahbub Habib, Sebastian Ries, and Max Muhlhauser. 2011. Towards a trust management system for cloud computing. In Proceedings of the IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 933--939.
[31]
Yu Han, Zhiqi Shen, Cyril Leung, Chunyan Miao, and Victor R. Lesser. 2013. A survey of multi-agent trust management systems. IEEE Access 1 (2013).
[32]
Daojing He, Chun Chen, Sammy Chan, Jiajun Bu, and Athanasios V. Vasilakos. 2012. ReTrust: Attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans. Info. Technol. Biomed. 16, 4 (2012), 623--632.
[33]
Ethan Heilman, Alison Kendler, Aviv Zohar, and Sharon Goldberg. 2015. Eclipse attacks on Bitcoin’s peer-to-peer network. In Proceedings of the 24th USENIX Conference on Security Symposium. USENIX Association.
[34]
Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42, 1 (2009), 1:1--1:31.
[35]
Hao Hu, Rongxing Lu, Zonghua Zhang, and Jun Shao. 2017. REPLACE: A reliable trust-based platoon service recommendation scheme in VANET. IEEE Trans. Vehic. Technol. 66, 2 (2017), 1786--1797.
[36]
Jianli Hu, Quanyuan Wu, and Bin Zhou. 2008. Distributed and effective reputation mechanism in P2P systems. In Proceedings of the International Conference on Computer Science and Software Engineering. IEEE, 110--115.
[37]
Kai Hwang and Deyi Li. 2010. Trusted cloud computing with secure resources and data coloring. IEEE Internet Comput. 14, 5 (2010), 14--22.
[38]
Paul J. Jackson. 1999. Virtual Working: Social and Organisational Dynamics. Routledge, London, UK.
[39]
Mohsen Jamali and Martin Ester. 2009. TrustWalker: A random walk model for combining trust-based and item-based recommendation. In Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. ACM, 397--406.
[40]
Wenjun Jiang, Guojun Wang, Md Zakirul Alam Bhuiyan, and Jie Wu. 2016a. Understanding graph-based trust evaluation in online social networks: Methodologies and challenges. ACM Comput. Surv. 49, 1 (2016), 10:1--10:35.
[41]
Wenjun Jiang, Jie Wu, Feng Li, Guojun Wang, and Huanyang Zheng. 2016b. Trust evaluation in online social networks using generalized network flow. IEEE Trans. Comput. 65, 3 (2016), 952--963.
[42]
Wenjun Jiang, Jie Wu, and Guojun Wang. 2015. On selecting recommenders for trust evaluation in online social networks. ACM Trans. Internet Technol. 15, 4 (2015), 14:1--14:21.
[43]
Audun Jøsang, Ross Hayward, and Simon Pope. 2006. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference. Australian Computer Society, Inc., Hobart, Australia.
[44]
Audun Jøsang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th BLED Electronic Commerce Conference E-Reality: Constructing the E-Economy. 1--14.
[45]
Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43, 2 (2007), 618--644.
[46]
Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web. ACM, 640--651.
[47]
Ghassan O. Karame, Elli Androulaki, Marc Roeschlin, Arthur Gervais, and Srdjan Čapkun. 2015. Misbehavior in bitcoin: A study of double-spending and accountability. ACM Trans. Info. Syst. Secur. 18, 1 (2015), 2:1--2:32.
[48]
Cristobald De Kerchove and Paul Van Dooren. 2008. The PageTrust algorithm: How to rank web pages when negative links are allowed? In Proceedings of Siam International Conference on Data Mining. SIAM, 346--352.
[49]
Chaker Abdelaziz Kerrache, Carlos Tavares Calafate, Juan Carlos Cano, Nasreddine Lagraa, and Pietro Manzoni. 2016. Trust management for vehicular networks: An adversary-oriented overview. IEEE Access 4 (2016), 9293--9307.
[50]
Tomas B. Klos and Floortje Alkemade. 2005. Trusted intermediating agents in electronic trade networks. In Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems. ACM, 1249--1250.
[51]
Bernd Lahno. 1999. Olli Lagerspetz: Trust. The Tacit Demand. Kluwer Academic Publishers, Dordrecht, the Netherlands.
[52]
Lei Li and Yan Wang. 2008. A trust vector approach to service-oriented applications. In Proceedings of the IEEE International Conference on Web Services. IEEE, 270--277.
[53]
Lei Li, Yan Wang, and Vijay Varadharajan. 2009. Fuzzy regression-based trust prediction in service-oriented applications. In Proceedings of the 6th International Conference on Autonomic and Trusted Computing. Springer-Verlag, 221--235.
[54]
Min Li, Xiaoxun Sun, Hua Wang, Yanchun Zhang, and Zhang Ji. 2011. Privacy-aware access control with trust management in web service. World Wide Web 14, 4 (2011), 407--430.
[55]
Wenjia Li and Xianshu Zhu. 2014. Recommendation-based trust management in body area networks for mobile healthcare. In Proceedings of 11th International Conference on Mobile Ad Hoc and Sensor Systems. IEEE, 515--516.
[56]
Xiaoyong Li, Huadong Ma, Feng Zhou, and Wenbin Yao. 2010. T-broker: A trust-aware service brokering scheme for multiple cloud collaborative services. IEEE Trans. Info. Forensics Secur. 10, 7 (2010), 1402--1415.
[57]
Xiaoyong Li, Feng Zhou, and Xudong Yang. 2012. Scalable feedback aggregating (SFA) overlay for large-scale P2P trust management. IEEE Trans. Parallel Distrib. Syst. 23, 10 (2012), 1944--1957.
[58]
Guanfeng Liu, Yan Wang, and Mehmet A. Orgun. 2011. Trust transitivity in complex social networks. In Proceedings of the 25th AAAI Conference on Artificial Intelligence. AAAI, 1222--1229.
[59]
Ling Liu and Margaret Loper. 2018. Trust as a service: Building and managing trust in the Internet of Things. In Proceedings of the IEEE International Symposium on Technologies for Homeland Security. IEEE, 1--6.
[60]
Ling Liu, Margaret Loper, Yusuf Ozkaya, Abdurrahman Yasar, and Emre Yigitoglu. 2016. Machine to machine trust in the IoT era. In Proceedings of the 18th International Conference on Trust in Agent Societies-Volume 1578. CEUR-WS.org, 18--29.
[61]
Yue Liu, David Bild, Robert Dick, Zhuoqing Mao, and Wallach Dan. 2015. The mason test: A defense against sybil attacks in wireless networks without trusted authorities. IEEE Trans. Mobile Comput. 14, 11 (2015), 2376--2391.
[62]
Sergio Marti and Hector Garcia-Molina. 2004. Limited reputation sharing in P2P systems. In Proceedings of the 5th ACM Conference on Electronic Commerce. ACM, 91--101.
[63]
Sarah Meiklejohn, Marjori Pomarole, Grant Jordan, Kirill Levchenko, Damon McCoy, Geoffrey M. Voelker, and Stefan Savage. 2013. A fistful of bitcoins: Characterizing payments among men with no names. In Proceedings of the Conference on Internet Measurement Conference. ACM, 127--140.
[64]
Zeinab Movahedi, Zahra Hosseini, Fahimeh Bayan, and Guy Pujolle. 2016. Trust-distortion resistant trust management frameworks on mobile ad hoc networks: A survey. IEEE Commun. Surveys Tutor. 18, 2 (2016), 1287--1309.
[65]
Satoshi Nakamoto. 2008. Bitcoin: A peer-to-peer electronic cash system. www.Bitcoin.Org.
[66]
Michele Nitti, Roberto Girau, and Luigi Atzori. 2014. Trustworthiness management in the social Internet of Things. IEEE Trans. Knowl. Data Eng. 26, 5 (2014), 1253--1266.
[67]
Talal Noor, Quan Sheng, Lina Yao, Schahram Dustdar, and Anne Ngu. 2016. CloudArmor: Supporting reputation-based trust management for cloud services. IEEE Trans. Parallel Distrib. Syst. 27, 2 (2016), 367--380.
[68]
Talal H. Noor, Quan Z. Sheng, Sherali Zeadally, and Jian Yu. 2013. Trust management of services in cloud environments: Obstacles and solutions. ACM Comput. Surv. 46, 1 (2013), 12:1--12:30.
[69]
John O’Donovan and Barry Smyth. 2005. Trust in recommender systems. In Proceedings of the 10th International Conference on Intelligent User Interfaces. ACM, 167--174.
[70]
Lawrence Page, Sergey Brin, Rajeev Motwani, and Terry Winograd. 1999. The PageRank Citation Ranking: Bringing Order to the Web. Technical Report SIDL-WP-1999-0120. Stanford InfoLab, Palo Alto, CA.
[71]
Isaac Pinyol and Jordi Sabater-Mir. 2013. Computational trust and reputation models for open multi-agent systems: A review. Artif. Intell. Rev. 40, 1 (2013), 1--25.
[72]
Pawani Porambage, Jude Okwuibe, Madhusanka Liyanage, Mika Ylianttila, and Tarik Taleb. 2018. Survey on multi-access edge computing for internet of things realization. IEEE Commun. Surveys Tutor. 20, 4 (2018), 2961--2991.
[73]
Julian B. Rotter. 1967. A new scale for the measurement of interpersonal trust. J. Personal. 35, 4 (1967), 651--665.
[74]
Antesar M. Shabut, Keshav P. Dahal, Sanat Kumar Bista, and Irfan U. Awan. 2015. Recommendation-based trust model with an effective defence scheme for MANETs. IEEE Trans. Mobile Comput. 14, 10 (2015), 2101--2115.
[75]
Wanita Sherchan, Surya Nepal, and Cecile Paris. 2013. A survey of trust in social networks. ACM Comput. Surv. 45, 4 (2013), 47:1--47:33.
[76]
Shanshan Song, Kai Hwang, Runfang Zhou, and Yu-Kwong Kwok. 2005. Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput. 9, 6 (2005), 24--34.
[77]
Mudhakar Srivatsa, Li Xiong, and Ling Liu. 2005. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the 14th International Conference on World Wide Web. ACM, 422--431.
[78]
Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, and Yang Zhou. 2013. ServiceTrust: Trust management in service provision networks. In Proceedings of the IEEE International Conference on Services Computing. IEEE, 272--279.
[79]
Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, and Yang Zhou. 2015. Reliable and resilient trust management in distributed service provision networks. ACM Trans. Web 9, 3 (2015), 14:1--14:37.
[80]
Yan Lindsay Sun, Zhu Han, Wei Yu, and K. J. R Liu. 2006. A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In Proceedings of the 25th IEEE International Conference on Computer Communications. IEEE, 1--13.
[81]
Girish Suryanarayana and Richard N. Taylor. 2004. A Survey of Trust Management and Resource Discovery Technologies in Peer-to-Peer Applications. Technical Report UCI-ISR-04-6. University of California, Irvine, Irvine, CA.
[82]
Shuaishuai Tan, Xiaoping Li, and Qingkuan Dong. 2016. A trust management system for securing data plane of ad-hoc networks. IEEE Trans. Vehic. Technol. 65, 9 (2016), 7579--7592.
[83]
Shrikant S. Tangade and Sunilkumar S. Manvi. 2013. A survey on attacks, security and trust management solutions in VANETs. In Proceedings of the 4th International Conference on Computing, Communications and Networking Technologies. IEEE, 1--6.
[84]
Frank E. Walter, Stefano Battiston, and Frank Schweitzer. 2009. Personalised and dynamic trust in social networks. In Proceedings of the 3rd ACM Conference on Recommender Systems. ACM, 197--204.
[85]
Guojun Wang, Felix Musau, Song Guo, and Muhammad Bashir Abdullahi. 2015. Neighbor similarity trust against sybil attack in P2P E-commerce. IEEE Trans. Parallel Distrib. Syst. 26, 3 (2015), 824--833.
[86]
Guojun Wang and Jie Wu. 2011. Multi-dimensional evidence-based trust management with multi-trusted paths. Future Gener. Comput. Syst. 27, 5 (2011), 529--538.
[87]
Jianyong Wang, Yuling Li, Yuhua Liu, and Xiu Jing. 2009. Cluster and recommendation-based multi-granularity trust model in P2P network. In Proceedings of the International Conference on Computational Intelligence and Security-Volume 02. IEEE, 380--384.
[88]
Yan Wang and Lei Li. 2011. Two-dimensional trust rating aggregations in service-oriented applications. IEEE Trans. Serv. Comput. 4, 4 (2011), 257--271.
[89]
Li Xiong and Ling Liu. 2003. A reputation-based trust model for peer-to-peer eCommerce communities. In Proceedings of the 4th ACM Conference on Electronic Commerce. ACM, 228--229.
[90]
Li Xiong and Ling Liu. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 7 (2004), 843--857.
[91]
Zheng Yan, Peng Zhang, and Athanasios V. Vasilakos. 2014. A survey on trust management for Internet of Things. J. Netw. Comput. Appl. 42 (2014), 120--134.
[92]
Zhen Yu, Xuefeng Zheng, Shao-Jie Wang, and Ming-Xiang Li. 2008. A P2P trust model based on preference. In Proceedings of 4th International Conference on Wireless Communications, Networking and Mobile Computing. IEEE, 1--4.
[93]
Giorgos Zacharia and Pattie Maes. 2000. Trust management through reputation mechanisms. Appl. Artific. Intell. 14, 9 (2000), 881--907.
[94]
Chi Zhang, Xiaoyan Zhu, Yang Song, and Yuguang Fang. 2010. A formal study of trust-based routing in wireless ad hoc networks. In Proceedings of the 29th Conference on Information Communications. IEEE, 2838--2846.
[95]
Haibin Zhang, Yan Wang, Xiuzhen Zhang, and Ee-Peng Lim. 2015. ReputationPro: The efficient approaches to contextual transaction trust computation in E-commerce environments. ACM Trans. Web 9, 1 (2015), 2:1--2:49.
[96]
Rui Zhang, Rui Xue, and Ling Liu. 2019. Security and privacy on blockchain. ACM Comput. Surv. 52, 3 (2019), 51:1--51:34.
[97]
Xiuzhen Zhang, Lishan Cui, and Yan Wang. 2014. CommTrust: Computing multi-dimensional trust by mining E-commerce feedback comments. IEEE Trans. Knowl. Data Eng. 26, 7 (2014), 1631--1643.
[98]
Runfang Zhou and Kai Hwang. 2007. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18, 4 (2007), 460--473.

Cited By

View all
  • (2024)Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic ReviewFuture Internet10.3390/fi1603010616:3(106)Online publication date: 21-Mar-2024
  • (2024)Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future DirectionsACM Computing Surveys10.1145/365616656:10(1-39)Online publication date: 22-Jun-2024
  • (2024)Distributed Trust for Collaborative Network Management: Leveraging DLT in Multi-SDN Controller Environments2024 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)10.1109/NFV-SDN61811.2024.10807463(1-6)Online publication date: 5-Nov-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Computing Surveys
ACM Computing Surveys  Volume 53, Issue 1
January 2021
781 pages
ISSN:0360-0300
EISSN:1557-7341
DOI:10.1145/3382040
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 06 February 2020
Accepted: 01 September 2019
Revised: 01 September 2019
Received: 01 July 2018
Published in CSUR Volume 53, Issue 1

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Trust management
  2. adverse effect
  3. threat risk
  4. trust aggregation

Qualifiers

  • Survey
  • Survey
  • Refereed

Funding Sources

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)824
  • Downloads (Last 6 weeks)79
Reflects downloads up to 30 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Factors Affecting Trust and Acceptance for Blockchain Adoption in Digital Payment Systems: A Systematic ReviewFuture Internet10.3390/fi1603010616:3(106)Online publication date: 21-Mar-2024
  • (2024)Security, Privacy, and Decentralized Trust Management in VANETs: A Review of Current Research and Future DirectionsACM Computing Surveys10.1145/365616656:10(1-39)Online publication date: 22-Jun-2024
  • (2024)Distributed Trust for Collaborative Network Management: Leveraging DLT in Multi-SDN Controller Environments2024 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN)10.1109/NFV-SDN61811.2024.10807463(1-6)Online publication date: 5-Nov-2024
  • (2024)Design Guidelines on Trust Management for Underwater Wireless Sensor NetworksIEEE Communications Surveys & Tutorials10.1109/COMST.2024.338972826:4(2547-2576)Online publication date: Dec-2025
  • (2024)A trust enhancement model based on distributed learning and blockchain in service ecosystemsJournal of King Saud University - Computer and Information Sciences10.1016/j.jksuci.2024.10214736:7(102147)Online publication date: Sep-2024
  • (2024)Understanding the trustworthiness management in the social Internet of Things: A surveyComputer Networks10.1016/j.comnet.2024.110611251(110611)Online publication date: Sep-2024
  • (2024)Blockchain solutions for trustworthy decentralization in social networksComputer Networks10.1016/j.comnet.2024.110336244(110336)Online publication date: May-2024
  • (2024)nPPoS: Non-interactive practical proof-of-storage for blockchainBlockchain: Research and Applications10.1016/j.bcra.2024.1002215:4(100221)Online publication date: Dec-2024
  • (2024)Trustworthy decentralization based on blockchain tools for social network architecturesSocial Network Analysis and Mining10.1007/s13278-024-01252-714:1Online publication date: 10-May-2024
  • (2024)Multi-trainer binary feedback interactive reinforcement learningAnnals of Mathematics and Artificial Intelligence10.1007/s10472-024-09956-4Online publication date: 2-Oct-2024
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

HTML Format

View this article in HTML Format.

HTML Format

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media