Abstract
Improving the reliability of information obtained from multiple sources in an automated way is today a critical need as decision-making processes and other applications heavily depend on such information. The sources can be sensors used in a wireless sensor network, multiple resources on the Internet or a large number of users of a web service or a social network. Examples of such a problem include finding a reliable rating of a product or a movie, the accurate current price of a stock or a reliable assessment of the prevailing market analysts’ sentiment about a stock. The problem arises from the fact that multiple sources often provide inconsistent information, due to differences of opinion, human or hardware errors, being out of date and, most importantly, the sources might even maliciously supply false information with an express intent to deceive. While it is clear that no aggregation procedure can strictly guarantee the accuracy of the output, in practice we must seek “the best” answer possible—the one that in the given circumstances minimizes the error or the likelihood of an error of the aggregate value. Such procedures are needed for both numerical and non-numerical data and, given the vast amount of data becoming available, should operate without a need for human judgment or an external “gold standard”. In this paper we provide a survey of solutions to this problem based on iterative filtering approaches that take into account not only the information but also the information sources and are able to assess the credibility of the information and the trustworthiness of the information sources. We also discuss future work and open research directions.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Allahbakhsh, M., & Ignjatovic, A. (2015). An iterative method for calculating robust rating scores. IEEE Transactions on Parallel and Distributed Systems, 26(2), 340–350.
Allahbakhsh, M., Ignjatovic, A., Motahari-Nezhad H.R., Benatallah, B (2015). Robust evaluation of products and reviewers in social rating systems. World Wide Web 18(1):73–109
Allahbakhsh, M., Ignjatovic, A., Benatallah, B., & Motahari-Nezhad, H. R. (2013). Robust evaluation of products and reviewers in social rating systems. WorldWide Web.
Chou, C.-T., Ignjatovic, A., & Hu, W. (2013). Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1525–1534.
Dai, C., Rao, F.-Y., Ghinita, G., & Bertino, E. (2011). Privacy-preserving assessment of location data trustworthiness. In Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS ’11 (pp. 231–240).
Dai, C., Rao, F.-Y., Truta, T. M., & Bertino, E. (2012). Privacy-preserving assessment of social network data trustworthiness. In CollaborateCom (pp. 97–106).
de Kerchove, C., & Van Dooren, P. (2007). Iterative filtering for a dynamical reputation system. CoRR [abs/0711.3964].
De Kerchove, C., & Van Dooren, P. (2008). Reputation systems and optimization. Siam News, 41(2), 2008.
de Kerchove, C., & Van Dooren, P. (2010). Iterative filtering in reputation systems. The SIAM Journal on Matrix Analysis and Applications, 31(4), 1812–1834.
D’Souza, N. (2011). Applications of adaptive averages: Recommendation systems. Honours Thesis, UNSW.
Hasan, O., Brunie, L., Bertino, E., & Shang, N. (2013). A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Transactions on Information Forensics and Security, 8(6), 949–962.
Ignjatovic, A., Foo, N., & Lee, C. T. (2008). An analytic approach to reputation ranking of participants in online transactions. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI).
Ignjatovic, A., Lee, C. T., Compton, P., Cutay, C., & Guo, H. (2009). Computing marks from multiple assessors using adaptive averaging. In International Conference on Engineering Education (ICEE).
Labrinidis, A., & Jagadish, H. V. (2012). Challenges and opportunities with big data. The Proceedings of the VLDB Endowment, 5(12), 2032–2033.
Laureti, P., Moret, L., Zhang, Y.-C., & Yu, Y.-K. (2006). Information filtering via Iterative Refinement. EPL (Europhysics Letters), 75, 1006–1012.
Lee, C.-T., Milic-Frayling, N., Vinay, V., Rodrigues, E.M., Ignjatovic, A., & Kazai, G. (2009). Measuring system performance and topic effectiveness using generalized means with adaptive weights. In ACM Conference on Information and Knowledge Management (CIKM) (pp. 2033–2036). New York, NY, USA: ACM.
Lee, C.-T., Rodrigues, E.M., Kazai, G., Ignjatovic, A., & Milic-Frayling, N. (2009). Model for voter scoring and best answer selection in community q & a services. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI) (pp. 116–123). New York, NY, USA: ACM.
Lim, H.-S., Ghinita, G., Bertino, E., & Kantarcioglu, M. (2012). A game-theoretic approach for high-assurance of data trustworthiness in sensor networks. In 2012 I.E. 28th International Conference on Data Engineering (ICDE) (pp. 1192–1203).
Lim, H.-S., Moon, Y.-S., & Bertino, E. (2010). Provenance-based trustworthiness assessment in sensor networks. In Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, DMSN ’10 (pp. 2–7).
Reznik, L., & Bertino, E. (2013). Poster: Data quality evaluation: Integrating security and accuracy. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13 (pp. 1367–1370). New York, NY, USA: ACM.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2013). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. Technical Report UNSW-CSE-TR-201319, School of Computer Science and Engineering, UNSW.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Sec. Comput. 12(1):98–110.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2014a). Credibility propagation for robust data aggregation in WSNs. Technical Report UNSW-CSE-TR-201414, School of Computer Science and Engineering, UNSW.
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2014b). Provenance-aware security risk analysis for hosts and network flows. In IEEE/IFIP Network Operations and Management Symposium (NOMS).
Rezvani, M., Ignjatovic, A., & Jha, S. (2013). Iterative security risk analysis for network flows based on provenance and interdependency. In IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 13) (pp. 286–288).
Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.
Tang, L.-A., Yu, X., Kim, S., Han, J., Hung, C.-C., & Peng, W.-C. (2010). Tru-Alarm: Trustworthiness analysis of sensor networks in cyber-physical systems. In Proceedings of the 2010 I.E. International Conference on Data Mining, ICDM ’10 (pp. 1079–1084).
Wang, X., Cheng, W., Mohapatra, P., & Abdelzaher, T. F. (2013). Artsense: Anonymous reputation and trust in participatory sensing. In INFOCOM, 2013 Proceedings IEEE (pp. 2517–2525).
Yu, Y.-K., Zhang, Y.-C., Laureti, P., & Moret, L. (2006). Decoding information from noisy, redundant, and intentionally distorted sources. Physica A Statistical Mechanics and its Applications, 371, 732–744.
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Ignjatovic, A., Rezvani, M., Allahbakhsh, M., Bertino, E. (2015). Robust Aggregation of Inconsistent Information: Concepts and Research Directions. In: Matei, S., Russell, M., Bertino, E. (eds) Transparency in Social Media. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-18552-1_3
Download citation
DOI: https://doi.org/10.1007/978-3-319-18552-1_3
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-18551-4
Online ISBN: 978-3-319-18552-1
eBook Packages: Computer ScienceComputer Science (R0)