A Survey on Trust Modeling JIN-HEE CHO and KEVIN CHAN, US Army Research Laboratory SIBEL ADALI, Rensselaer Polytechnic Institute
The concept of trust and/or trust management has received considerable attention in engineering research communities as trust is perceived as the basis for decision making in many contexts and the motivation for maintaining long-term relationships based on cooperation and collaboration. Even if substantial research effort has been dedicated to addressing trust-based mechanisms or trust metrics (or computation) in diverse contexts, prior work has not clearly solved the issue of how to model and quantify trust with sufficient detail and context-based adequateness. The issue of trust quantification has become more complicated as we have the need to derive trust from complex, composite networks that may involve four distinct layers of communication protocols, information exchange, social interactions, and cognitive motivations. In addition, the diverse application domains require different aspects of trust for decision making such as emotional, logical, and relational trust. This survey aims to outline the foundations of trust models for applications in these contexts in terms of the concept of trust, trust assessment, trust constructs, trust scales, trust properties, trust formulation, and applications of trust. We discuss how different components of trust can be mapped to different layers of a complex, composite network; applicability of trust metrics and models; research challenges; and future work directions. Categories and Subject Descriptors: H.1 [Information Systems]: Models and Principles General Terms: Modeling, Human Factors, Algorithms, Networks Additional Key Words and Phrases: Trust modeling, trust, trustor, trustee, decision making, composite trust ACM Reference Format: Jin-Hee Cho, Kevin Chan, and Sibel Adalı. 2015. A survey on trust modeling. ACM Comput. Surv. 48, 2, Article 28 (October 2015), 40 pages. DOI: http://dx.doi.org/10.1145/2815595
1. INTRODUCTION
Trust has been broadly studied in many different disciplines and used as the basis for decision making in diverse contexts. Although different disciplines define trust differently, the problems they aim to solve have the common goals of accurate assessment of trust as a robust basis for decision making where inaccurate trust estimation can allow a trustor to place false trust in a trustee (i.e., mistrust), leading to a betrayal by the Research was in part sponsored by the Army Research Laboratory and was accomplished under Cooperative Agreement Number W911NF-09-2-0053. The views and conclusions contained in this document are those of the authors and should not be interpreted as representing the official policies, either expressed or implied, of the Army Research Laboratory or the U.S. Government. The U.S. Government is authorized to reproduce and distribute reprints for Government purposes notwithstanding any copyright notation here on. This research was also partially supported by the Department of Defense (DoD) through the Office of the Assistant Secretary of Defense for Research and Engineering (ASD(R&E)). The views and opinions of the author(s) do not reflect those of the DoD nor ASD(R&E). Authors’ addresses: J.-H. Cho and K. S. Chan, 2800 Powder Mill Rd., Adelphi, MD 20783; emails: {jin-hee. cho.civ, kevin.s.chan.civ}@mail.mil; S. Adalı, Department of Computer Science, Rensselaer Polytechnic Institute, 110 8th Street, Troy, NY 12180; email: sibel@cs.rpi.edu. Permission to make digital or hard copies of part or all of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies show this notice on the first page or initial screen of a display along with the full citation. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, to republish, to post on servers, to redistribute to lists, or to use any component of this work in other works requires prior specific permission and/or a fee. Permissions may be requested from Publications Dept., ACM, Inc., 2 Penn Plaza, Suite 701, New York, NY 10121-0701 USA, fax +1 (212) 869-0481, or permissions@acm.org. c 2015 ACM 0360-0300/2015/10-ART28 $15.00 DOI: http://dx.doi.org/10.1145/2815595
ACM Computing Surveys, Vol. 48, No. 2, Article 28, Publication date: October 2015.
28