TY - JOUR
T1 - Efficient Trustworthiness Management for Malicious User Detection in Big Data Collection
AU - Guo, Minyi
AU - Li, Pang
AU - Wang, Kun
AU - Xia, Rui
AU - Yi, Jiahui
AU - Guo, Song
PY - 2022/2
Y1 - 2022/2
N2 - Data collection in big data is an effective way to aggregate information that the collector is interested in. However, there is no assurance for the data that the users provide. Since collector does not have the ability to check the authenticity of every piece of information, the trustworthiness of users participated in the collection become important. In this paper, we design an efficient approach to calculate users’ trustworthiness in data collection for big data context. We divide the trustworthiness into familiarity trustworthiness and similarity trustworthiness, and study the influences of user actions on trustworthiness. To prevent malicious users from raising their trustworthiness and providing false information that may mislead final results, we also design a security queue to record users’ historical trust information, so that we can detect malicious users with high accuracy. Simulation results show that our model can sensitively resist the malicious actions of users.
AB - Data collection in big data is an effective way to aggregate information that the collector is interested in. However, there is no assurance for the data that the users provide. Since collector does not have the ability to check the authenticity of every piece of information, the trustworthiness of users participated in the collection become important. In this paper, we design an efficient approach to calculate users’ trustworthiness in data collection for big data context. We divide the trustworthiness into familiarity trustworthiness and similarity trustworthiness, and study the influences of user actions on trustworthiness. To prevent malicious users from raising their trustworthiness and providing false information that may mislead final results, we also design a security queue to record users’ historical trust information, so that we can detect malicious users with high accuracy. Simulation results show that our model can sensitively resist the malicious actions of users.
UR - https://www.webofscience.com/wos/woscc/full-record/WOS:000742723200009
UR - https://openalex.org/W2763488154
M3 - Journal Article
SN - 2332-7790
VL - 8
SP - 99
EP - 112
JO - IEEE Transactions on Big Data
JF - IEEE Transactions on Big Data
M1 - 8063921
ER -