Open Access   Article Go Back

Trust Analysis Techniques in Online Social Networks: A Review

Mohit Gambhir1 , Sapna Gambhir2

Section:Review Paper, Product Type: Journal Paper
Volume-7 , Issue-3 , Page no. 254-258, Mar-2019

CrossRef-DOI:   https://doi.org/10.26438/ijcse/v7i3.254258

Online published on Mar 31, 2019

Copyright © Mohit Gambhir, Sapna Gambhir . This is an open access article distributed under the Creative Commons Attribution License, which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

View this paper at   Google Scholar | DPI Digital Library

How to Cite this Paper

  • IEEE Citation
  • MLA Citation
  • APA Citation
  • BibTex Citation
  • RIS Citation

IEEE Style Citation: Mohit Gambhir, Sapna Gambhir, “Trust Analysis Techniques in Online Social Networks: A Review,” International Journal of Computer Sciences and Engineering, Vol.7, Issue.3, pp.254-258, 2019.

MLA Style Citation: Mohit Gambhir, Sapna Gambhir "Trust Analysis Techniques in Online Social Networks: A Review." International Journal of Computer Sciences and Engineering 7.3 (2019): 254-258.

APA Style Citation: Mohit Gambhir, Sapna Gambhir, (2019). Trust Analysis Techniques in Online Social Networks: A Review. International Journal of Computer Sciences and Engineering, 7(3), 254-258.

BibTex Style Citation:
@article{Gambhir_2019,
author = {Mohit Gambhir, Sapna Gambhir},
title = {Trust Analysis Techniques in Online Social Networks: A Review},
journal = {International Journal of Computer Sciences and Engineering},
issue_date = {3 2019},
volume = {7},
Issue = {3},
month = {3},
year = {2019},
issn = {2347-2693},
pages = {254-258},
url = {https://www.ijcseonline.org/full_paper_view.php?paper_id=3826},
doi = {https://doi.org/10.26438/ijcse/v7i3.254258}
publisher = {IJCSE, Indore, INDIA},
}

RIS Style Citation:
TY - JOUR
DO = {https://doi.org/10.26438/ijcse/v7i3.254258}
UR - https://www.ijcseonline.org/full_paper_view.php?paper_id=3826
TI - Trust Analysis Techniques in Online Social Networks: A Review
T2 - International Journal of Computer Sciences and Engineering
AU - Mohit Gambhir, Sapna Gambhir
PY - 2019
DA - 2019/03/31
PB - IJCSE, Indore, INDIA
SP - 254-258
IS - 3
VL - 7
SN - 2347-2693
ER -

VIEWS PDF XML
394 311 downloads 181 downloads
  
  
           

Abstract

Online social network (OSN) has become an important aspect of everyone’s life. Social networking involves connecting users with their friends, relatives, family and companions. This is internet and development of other social media technologies which allow people to communicate through social media. The very well-known social sites such as Skype, Facebook, Twitter, Instagram and LinkedIn etc. enable their users for performing various activities like sharing photos, videos and information, organize events, chat, and playing online games. In this paper, a comparison study is done on various existing trust analysis techniques which will help to identify the problems need to be focused.

Key-Words / Index Term

Online Social Networks, Trust analysis, Privacy

References

[1] Sunil Sexena, “http://www.easymedia.in/8-key-characteristics-social-networking-sites”, December, 2013.
[2] Wanita Sherchan, Surya Nepal, Cecile Paris, “ A survey on Trust in Scoial Network” in ACM Computing Surveys, Vol. 45, no. 4, pp. 47:1-47:33 August 2013.
[3] Si Shi, Dawei Jin, “Real-time Public Mood Tracking of Chinese Microblog Streams with Complex Event Processing”, in Institute of Electrical and Electronics Engineers, Vol. 5, no. 2, pp. 421-431, December 2016.
[4] Liang, Biru Dai, “Opinion Mining on Social Media Data” in International Conference of Mobile Data Management, Institute of Electrical and Electronics Engineers, Vol. 2, no. 14 , pp. 91-96, July 2013.
[5] Poornima Singh , “Opinion Mining on Social Media: Based on Unstructured Data” in International Journal of Computer Science and Mobile Computing, Vol. 4, no. 6, pp. 768-777, June 2015.
[6] Xiu li, Jiangou MA, “A Service Mode of Expert Finding in Social Network” in IEEE Control System Society, IEEE Xlpore, http://ieeexplore.ieee.org/document/6519794, pp. 220 – 223, May 2013.
[7] DimahH. Alahmadi, Xiao-JunZeng, “ ISTS: Implicit Social Trust and Sentiment based approach to recommender system” in ScienceDirect Expert Systems With Applications, Vol. 42, No. 10, pp. 8840–8849, 2015.
[8] DimahH.Alahmadi, Xiao-JunZeng, “Improving Recommendation Using Trust and Sentiment Inference from OSNs” in International Journal of Knowledge Engineering, Vol. 1, No. 1, pp. 9-17, June 2015.
[9] Golbeck, “ Computing and Applying Trust in Web-based Social Networks ”, http://drum.lib.umd.edu/bitstream/handle/1903/2384/umi-umd-2244.pdf;sequence=1, 2005.
[10] Avesani, Massa, “A trust-aware recommender system for ski mountaineering” in International Journal for Infonomics, Vol 20, no. 35, pp. 1-10, August 2005.
[11] Omar Hasan, Lionel Brunie, Jean-Marc Pierson, “Evaluation of the Iterative Multiplication Strategy”, in International Conference on Protecton and Security, ACM, Vol 4. no. 6, July 13–17, 2009.
[12] Partha Sarathi Chakraborty, Sunil Karform, “Designing Trust Propagation Algorithms based on Simple Multiplicative Strategy for Social Networks” in Procedia Technology, Vol. 6, no. 1, pp. 534-539, 2012.
[13] Y.A. Kim, H.S. Song, “Strategies for predicting local trust based on trust propagation in Online social networks” in International Journal of Computer Applications, Vol. 156, no. 7, pp. 8-15, December 2016.
[14] Mohsen Taherian, Morteza Amini, Rasool Jalili, “Trust inference in web-based social networks using resistive networks” in International Conference on Internet and Web Applications and Services, http://ieeexplore.ieee.org/document/4545620, pp. 233-238, June 2008.
[15] Wenjun Jiang and Guojun Wang, “ SWTrust: Generating trusted graph for trust evaluation in online social networks”, in IEEE Xplore, http://ieeexplore.ieee.org/document/6120835, pp. 320–327, November 2011.
[16] Sana Hamdi, Gancarski, “TISON: Trust Inference In Trust-Oriented Social Networks” in ACM Transactions on Information Systems, Vol. 34, no. 3, pp. 17:1- 17:32, March 2016.
[17] Guanfeng Liu, YanWang, “Trust Transitivity in Complex Social Networks” in Association for the Advnacemnet of Artificial Intelligence, Vol. 11, no. 15, pp. 1222-1229, January 2011.
[18] Wenjun Jiang, JieWu, GuojunWang, “Trust Evaluation in Online Social Networks Using Generalized Network Flow”, in International Conference of Transactions on computers, IEEE Xplore, Vol. 65, no. 3, pp. 952-963, March 2016.
[19] W.Fan, K.H. Yeung, “Incorporating Profile Information In Community Detection For Online Social Networks” in ScienceDirect, Vol. 405, no. 1, pp. 226–234, July 2014.
[20] Francesco Bonchi, “Influence Propagation in Social Networks: A Data Mining Perspective”, in Institute of Electrical and Electronics Engineers, Vol. 12, no.1, pp. 8-16, December 2011.
[21] D. Liben-Nowell and J. Kleinberg, “The link prediction problem for social networks” in Association for Information Science and Technology, Vol. 58, no. 7, pp. 1019-1031, May 2007.