Call for Paper - January 2024 Edition
IJCA solicits original research papers for the January 2024 Edition. Last date of manuscript submission is December 20, 2023. Read More

An Algorithm for Predicting Local Trust based on Trust Propagation in Online Social Networks

International Journal of Computer Applications
Foundation of Computer Science (FCS), NY, USA
Year of Publication: 2016
Munmun Bhattacharya, Nashreen Nesa

Munmun Bhattacharya and Nashreen Nesa. An Algorithm for Predicting Local Trust based on Trust Propagation in Online Social Networks. International Journal of Computer Applications 156(7):8-15, December 2016. BibTeX

	author = {Munmun Bhattacharya and Nashreen Nesa},
	title = {An Algorithm for Predicting Local Trust based on Trust Propagation in Online Social Networks},
	journal = {International Journal of Computer Applications},
	issue_date = {December 2016},
	volume = {156},
	number = {7},
	month = {Dec},
	year = {2016},
	issn = {0975-8887},
	pages = {8-15},
	numpages = {8},
	url = {},
	doi = {10.5120/ijca2016912461},
	publisher = {Foundation of Computer Science (FCS), NY, USA},
	address = {New York, USA}


The objective of online social networking sites is to make it possible to connect people who share common interests and pursuits across different geographical locations. With this, the concept of trust also comes into perspective as the participants reveal a great quantity of personal information in the Web environment. This work adopts web-based Social Networks as the principle means for studying trust. Goal of this work is to find ways to utilize the structure of social graph and the trust relationships between them to accurately deduce how much two individuals that are not directly connected might trust one another. This paper presents an algorithm for inferring trust propagation between indirectly connected individuals in the network by the use of weighted trust ratings along the shortest and the most trusted path. The accuracy of this algorithm in predicting propagated trust is calculated and compared with that of simple average strategy and the multiplicative strategy algorithm [17]. This algorithm is tested with five real-world trust datasets and tried to discover that there exists a significant strong positive correlation between direct trusts and the corresponding propagated trusts obtained through this approach.


  2. Grabner-Krauter et al. “Trust in online social networks: A multifaced perspective.” Pages 48-68, Forum for social Economics (2015).
  3. Golbeck ,Hendler, “Inferring binary trust relationships in Web-based social networks”, ACM Transactions on Internet Technology (TOIT), v.6 n.4, p.497-529, November, 2006.
  4. Mui, Lik, Mojdeh Mohtashemi, and Ari Halberstadt. "A computational model of trust and reputation." System Sciences, 2002. HICSS. Proceedings of the 35th Annual Hawaii International Conference on. IEEE, 2002.
  5. Benantar, Messaoud. Access control systems: security, identity management and trust models. Springer Science & Business Media, 2006..
  6. Aringhieri, Roberto, et al. "Fuzzy techniques for trust and reputation management in anonymous peer‐to‐peer systems." Journal of the American Society for Information Science and Technology 57.4 (2006): 528-537.
  7. Sanaz Kavianpouret. Al, “Calculating trust value in information propagation for online social network sites.” International Journal of Engineering and Technical Research(IJETR), Vol-2, Issue-3 Mac (2014)
  8. Page, Lawrence, et al. "The PageRank citation ranking: bringing order to the web." (1999).
  9. Abdul-Rahman et al, S. Supporting Trust in Virtual Communities. Proceedings of the Hawaii International Conference on System Sciences, USA. (2000).
  10. Kamvar, Schlosser, Garcia-Molina, “The Eigentrust algorithm for reputation management in P2P networks,” In International Conference on World Wide Web (WWW), 2003.
  11. Richardson, Matthew, Agrawal, Domingos. “Trust Management for the Semantic Web,” Proceedings of the Second International Semantic Web Conference. Sanibel Island, Florida. (2003)
  12. Golbeck, Computing and Applying Trust in Web-based Social Networks, Ph.D. Dissertation, University of Maryland, College Park, (2005)
  13. Avesani, Massa, et al. “A trust-aware recommender system for ski mountaineering”. International Journal for Infonomics. (2005)
  14. Levien, “Attack-resistant Trust Metrics”. Ph.D. thesis, University of California at Berkeley, USA, (2004).
  15. Sana Hamdi, Alda Lopes Gancarski, AmelBouzeghoub, and Sadok Ben Yahia. 2016. TISoN: Trust Inference in Trust-Oriented Social Networks. ACM Trans. Inf. Syst. 34, 3, Article 17 (April 2016), 32 pages. DOI=
  16. D. Gambetta. Can We Trust Trust?, chapter 13, pages 213{237. Basil Blackwell, 1988. Reprinted in electronic edition from Department of Sociology, University of Oxford.
  17. Omar Hasan O, Brunie L, Pierson J Evaluation of the Iterative Multiplication Strategy for Trust Propagation in Pervasive Environments, ICPS’09 17, July 13-17 2009, London, United Kingdom.
  18. Wang J. C, Chiu C. C. Recommending trusted online auction sellers using social network analysis. Expert Systems with Applications. 2008, 34(3) pp. 1666-1679
  19. Wenxue LIU, et al. "A Trust-based Information Propagation Model in Online Social Networks" The FARMS Review 8.8 (2013): pp-1767-1773
  20. J.-H. Cho, A. Swami, I.-R. Chen, Modeling and analysis of trust management with trust chain optimization in mobile ad hoc networks, Journal of Network and Computer Applications 35 (3) (2012), pp-1001–1012.
  21. Y.A. Kim, H.S. Song, Strategies for predicting local trust based on trust propagation in social networks, Knowledge-Based Systems 24 (8) (2011), pp-1360–1371.
  22. P. De Meo, A. Nocera, G. Terracina, D. Ursi, Recommendation of similar users, resources and social networks in a Social Internetworking Scenario, Information Sciences 181 (2011) , pp-1285–1305.
  23. Y.A. Kim, R. Phalak, A trust prediction framework in rating-based experience sharing social networks without a web of trust, Information Sciences 191(2012), pp- 128–145.
  24. J. Caverleea, L. Liu, S. Web, The socialtrust framework for trusted social information management: architecture and algorithms, Information Sciences 180 (1) (2010) 95–112.
  25. T. Abdessalem and I. BenDhia. A reachability-based access control model for online social networks. In Proceedings of the First ACM SIGMOD Workshop on Databases and Social Networks, DBSocial’ 11, pages 31–36, Athens, Greece, June 12-16, 2011.
  26. P. Bedi and R. Sharma, “Trust based recommender system using ant colony for trust computation,” Expert SystAppl, vol. 39, no. 1, pp. 1183–1190, Jan. 2012.
  27. Pujol, J. M., Sanguesa, R., Delgado, J. (2002). Extracting reputation in multi-agent system by means of social network topology. The Proceedings of the first international joint conference on autonomous agents and multi-agent systems, Italy, pp. 467-474.
  28. Sanadhya, S., & Singh, S. (2015). Trust Calculation with Ant Colony Optimization in Online Social Networks. Procedia Computer Science, 54, 186-195.
  29. Ziegler, C.N. (2005). Towards Decentralized Recommender Systems. PhD Thesis, University of Freiburg, Germany.
  31. LesaniMohsen, and NiloufarMontazeri. "Fuzzy trust aggregation and personalized trust inference in virtual social networks." Computational Intelligence 25.2 (2009): 51-83.
  32. A. Jøsang, A.R.Ismail, and C. Boyd. 2007. “A Survey of Trust and Reputation Systems for Online Service Provision”. Decision Support Systems, 43(2):618–644.
  33. Partha Sarathi Chakraborty, Sunil Karform, “Designing Trust Propagation Algorithms based on Simple Multiplicative Strategy for Social Networks”, Procedia Technology, Volume 6, 2012, Pages 534-539, ISSN 2212-0173.
  34. Sobecki, J. (2007). “Web-based system user interface hybrid recommendation using ant colony metaphor.” LNCS 4694/2008. Berlin/Heidelberg: Springer, pp.1033–1040, ISBN: 978-3-540-74828-1


Social network, local trust, global trust, propagation, trusted path, trustworthy.