Skip to main content

Robust Aggregation of Inconsistent Information: Concepts and Research Directions

  • Chapter
Transparency in Social Media

Part of the book series: Computational Social Sciences ((CSS))

  • 3128 Accesses

Abstract

Improving the reliability of information obtained from multiple sources in an automated way is today a critical need as decision-making processes and other applications heavily depend on such information. The sources can be sensors used in a wireless sensor network, multiple resources on the Internet or a large number of users of a web service or a social network. Examples of such a problem include finding a reliable rating of a product or a movie, the accurate current price of a stock or a reliable assessment of the prevailing market analysts’ sentiment about a stock. The problem arises from the fact that multiple sources often provide inconsistent information, due to differences of opinion, human or hardware errors, being out of date and, most importantly, the sources might even maliciously supply false information with an express intent to deceive. While it is clear that no aggregation procedure can strictly guarantee the accuracy of the output, in practice we must seek “the best” answer possible—the one that in the given circumstances minimizes the error or the likelihood of an error of the aggregate value. Such procedures are needed for both numerical and non-numerical data and, given the vast amount of data becoming available, should operate without a need for human judgment or an external “gold standard”. In this paper we provide a survey of solutions to this problem based on iterative filtering approaches that take into account not only the information but also the information sources and are able to assess the credibility of the information and the trustworthiness of the information sources. We also discuss future work and open research directions.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  • Allahbakhsh, M., & Ignjatovic, A. (2015). An iterative method for calculating robust rating scores. IEEE Transactions on Parallel and Distributed Systems, 26(2), 340–350.

    Article  Google Scholar 

  • Allahbakhsh, M., Ignjatovic, A., Motahari-Nezhad H.R., Benatallah, B (2015). Robust evaluation of products and reviewers in social rating systems. World Wide Web 18(1):73–109

    Google Scholar 

  • Allahbakhsh, M., Ignjatovic, A., Benatallah, B., & Motahari-Nezhad, H. R. (2013). Robust evaluation of products and reviewers in social rating systems. WorldWide Web.

    Google Scholar 

  • Chou, C.-T., Ignjatovic, A., & Hu, W. (2013). Efficient computation of robust average of compressive sensing data in wireless sensor networks in the presence of sensor faults. IEEE Transactions on Parallel and Distributed Systems, 24(8), 1525–1534.

    Article  Google Scholar 

  • Dai, C., Rao, F.-Y., Ghinita, G., & Bertino, E. (2011). Privacy-preserving assessment of location data trustworthiness. In Proceedings of the 19th ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, GIS ’11 (pp. 231–240).

    Google Scholar 

  • Dai, C., Rao, F.-Y., Truta, T. M., & Bertino, E. (2012). Privacy-preserving assessment of social network data trustworthiness. In CollaborateCom (pp. 97–106).

    Google Scholar 

  • de Kerchove, C., & Van Dooren, P. (2007). Iterative filtering for a dynamical reputation system. CoRR [abs/0711.3964].

    Google Scholar 

  • De Kerchove, C., & Van Dooren, P. (2008). Reputation systems and optimization. Siam News, 41(2), 2008.

    Google Scholar 

  • de Kerchove, C., & Van Dooren, P. (2010). Iterative filtering in reputation systems. The SIAM Journal on Matrix Analysis and Applications, 31(4), 1812–1834.

    Article  Google Scholar 

  • D’Souza, N. (2011). Applications of adaptive averages: Recommendation systems. Honours Thesis, UNSW.

    Google Scholar 

  • Hasan, O., Brunie, L., Bertino, E., & Shang, N. (2013). A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Transactions on Information Forensics and Security, 8(6), 949–962.

    Article  Google Scholar 

  • Ignjatovic, A., Foo, N., & Lee, C. T. (2008). An analytic approach to reputation ranking of participants in online transactions. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI).

    Google Scholar 

  • Ignjatovic, A., Lee, C. T., Compton, P., Cutay, C., & Guo, H. (2009). Computing marks from multiple assessors using adaptive averaging. In International Conference on Engineering Education (ICEE).

    Google Scholar 

  • Labrinidis, A., & Jagadish, H. V. (2012). Challenges and opportunities with big data. The Proceedings of the VLDB Endowment, 5(12), 2032–2033.

    Article  Google Scholar 

  • Laureti, P., Moret, L., Zhang, Y.-C., & Yu, Y.-K. (2006). Information filtering via Iterative Refinement. EPL (Europhysics Letters), 75, 1006–1012.

    Article  Google Scholar 

  • Lee, C.-T., Milic-Frayling, N., Vinay, V., Rodrigues, E.M., Ignjatovic, A., & Kazai, G. (2009). Measuring system performance and topic effectiveness using generalized means with adaptive weights. In ACM Conference on Information and Knowledge Management (CIKM) (pp. 2033–2036). New York, NY, USA: ACM.

    Google Scholar 

  • Lee, C.-T., Rodrigues, E.M., Kazai, G., Ignjatovic, A., & Milic-Frayling, N. (2009). Model for voter scoring and best answer selection in community q & a services. In IEEE/WIC/ACM International Conference on Web Intelligence and Intelligent Agent Technology (WI) (pp. 116–123). New York, NY, USA: ACM.

    Google Scholar 

  • Lim, H.-S., Ghinita, G., Bertino, E., & Kantarcioglu, M. (2012). A game-theoretic approach for high-assurance of data trustworthiness in sensor networks. In 2012 I.E. 28th International Conference on Data Engineering (ICDE) (pp. 1192–1203).

    Google Scholar 

  • Lim, H.-S., Moon, Y.-S., & Bertino, E. (2010). Provenance-based trustworthiness assessment in sensor networks. In Proceedings of the Seventh International Workshop on Data Management for Sensor Networks, DMSN ’10 (pp. 2–7).

    Google Scholar 

  • Reznik, L., & Bertino, E. (2013). Poster: Data quality evaluation: Integrating security and accuracy. In Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security, CCS ’13 (pp. 1367–1370). New York, NY, USA: ACM.

    Chapter  Google Scholar 

  • Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2013). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. Technical Report UNSW-CSE-TR-201319, School of Computer Science and Engineering, UNSW.

    Google Scholar 

  • Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure Data Aggregation Technique for Wireless Sensor Networks in the Presence of Collusion Attacks. IEEE Trans. Dependable Sec. Comput. 12(1):98–110.

    Google Scholar 

  • Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2014a). Credibility propagation for robust data aggregation in WSNs. Technical Report UNSW-CSE-TR-201414, School of Computer Science and Engineering, UNSW.

    Google Scholar 

  • Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2014b). Provenance-aware security risk analysis for hosts and network flows. In IEEE/IFIP Network Operations and Management Symposium (NOMS).

    Google Scholar 

  • Rezvani, M., Ignjatovic, A., & Jha, S. (2013). Iterative security risk analysis for network flows based on provenance and interdependency. In IEEE International Conference on Distributed Computing in Sensor Systems (DCOSS 13) (pp. 286–288).

    Google Scholar 

  • Rezvani, M., Ignjatovic, A., Bertino, E., & Jha, S. (2015). Secure data aggregation technique for wireless sensor networks in the presence of collusion attacks. IEEE Transactions on Dependable and Secure Computing, 12(1), 98–110.

    Article  Google Scholar 

  • Tang, L.-A., Yu, X., Kim, S., Han, J., Hung, C.-C., & Peng, W.-C. (2010). Tru-Alarm: Trustworthiness analysis of sensor networks in cyber-physical systems. In Proceedings of the 2010 I.E. International Conference on Data Mining, ICDM ’10 (pp. 1079–1084).

    Google Scholar 

  • Wang, X., Cheng, W., Mohapatra, P., & Abdelzaher, T. F. (2013). Artsense: Anonymous reputation and trust in participatory sensing. In INFOCOM, 2013 Proceedings IEEE (pp. 2517–2525).

    Google Scholar 

  • Yu, Y.-K., Zhang, Y.-C., Laureti, P., & Moret, L. (2006). Decoding information from noisy, redundant, and intentionally distorted sources. Physica A Statistical Mechanics and its Applications, 371, 732–744.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Aleksandar Ignjatovic .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Ignjatovic, A., Rezvani, M., Allahbakhsh, M., Bertino, E. (2015). Robust Aggregation of Inconsistent Information: Concepts and Research Directions. In: Matei, S., Russell, M., Bertino, E. (eds) Transparency in Social Media. Computational Social Sciences. Springer, Cham. https://doi.org/10.1007/978-3-319-18552-1_3

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-18552-1_3

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-18551-4

  • Online ISBN: 978-3-319-18552-1

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics