Evaluation of the effect of deceptive data in order to prevent the trust network from
becoming unusable is critical for the normal operation of the semantic web or simply
an e-commerce web site. This paper addresses the analysis model based on the
structure of the web of trust and shared interest among people. In this paper, we
assume that information flow network is the same as the web of trust. The reason is
that, although generally speaking, information flow network can be totally different
from the web of trust network, the information flow policy then becomes too broad
and less useful in practice. For example, although a rumor releaser can send email to
anyone in the web of trust (in this case unrestricted information flow policy), if people
do not know him personally they will simply discard the email without even further
investigation. Although there’s an exception to this, for example, if the system
administrator of an online community sends out some rumor, almost every user will
believe him. But in this case, it is a role-based trust relationship. In this research, we
do not consider role-base trust or information flow. Interested users may refer to the
research on restricted lattice-based information flow policy [6].
2 Structural Property of the Web of Trust
In order to analyze the spread of deceptive data in the web of trust, a web of trust and
the information flow policy/network are needed. To quantitatively decide the exact
range of the spread of deceptive data, a full specification of web trust is needed. That
is, for each trust relationship, we need to know the exact trust rating. Even this
information is available, because different people have different trust propensity and
trust scales, for instance, “subject A trusts subject B 70%” does not mean the same
degree of trust as “subject C trusts subject D 70%”, it’s very difficult for trust ranking
on an information flow path.
In this paper, we propose a model for qualitatively estimating different affected
areas of the web of trust under the effect of deceptive data. The model only needs the
structural properties of web of trust and shared interest; subjective parameters of web
of trust such as trust ratings and individual trust thresholds are not used.
2.1 The Hierarchical Structure of the Web of Trust
The idea of trust hierarchies is based on the real-word relationship among human
beings. In web of trust, the most trusted ones are his acquaintance, i.e., family
members, closed friends, coworkers, etc. They share many common interests. Also,
each individual may belong to some community. For example, people from one
country may have their own community. All users belonging to the member of an
online forum compose the virtual community. Some people in the same community
share common interests. Each subject in the community has an interest circle for each
topic he is interested in (and we say this subject is the owner of the interest circle).
This interest circle contains all subjects in the community that are interested in this
topic and a message on this particular topic can be flowed to all these subjects directly
or indirectly from the owner of the interest circle. Outside the community, each
individual may belong to some meta-community. For example, people interested in
126