JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2015, Vol. 50 ›› Issue (05): 18-22.doi: 10.6040/j.issn.1671-9352.0.2014.130

Previous Articles     Next Articles

E-commerce community clustering model based on trust

ZHU Rui   

  1. College of Information Engineering, Shandong Management University, Jinan 250100, Shandong, China
  • Received:2014-03-30 Online:2015-05-20 Published:2015-05-29

Abstract: Trust is an important factor affecting the development of E-commerce industry. Aiming at the trust issues of e-commerce community, a clustering model based on trust was proposed. First, the trust value of node relative to other node in network community was computed by indirect and direct trust information between them. And then based on the trust value computed, a clustering algorithm was promoted to form E-commerce clustering community. The simulation result shows that the clustering model based on the trust of high accuracy and convergence can better reflect the trust relationship among the subject of E-commerce community.

Key words: clustering, trust, E-commerce community

CLC Number: 

  • TP391
[1] WU Jyh-Jeng, CHEN Ying-Hueih, CHUNG Yu-Shuo. Trust factors influencing virtual community members: a study of transaction communities[J]. Journal of Business Research, 2010, 63(1):1025-1032.
[2] LU Yaobin, ZHAO Ling, WANG Bin. From virtual community members to C2C e-commerce buyers: trust in virtual communities and its effect on consumers' purchase intention[J]. Electronic Commerce Research and Applications, 2010(9):346-360.
[3] TURBAN E, KING D, VIEHLAND D, et al. Electronic commerce: a managerial perspective[M]. New Jersey: Pearson Education Inc, 2006:46-78.
[4] MCKNIGHT D H, CHERVANY N L. What trust means in E-commerce customer relationships: an interdisciplinary conceptual typology[J]. International Journal of Electronic Commerce, 2002, 6(2):35-59.
[5] MCKNIGHT D H, CHOUDHURY V, KACMAR C.The impact of initial consumer trust on intentions to transact with a web site: a trust building model[J]. Journal of Strategic Information Systems, 2002: 297-323.
[6] HAGEL J I, ARMSTRONG A G. Net gain: expanding markets through virtual communities[M]. Cambridge: Harvard Business School Press, 1997: 154-172.
[7] SMITH M. Tools for navigating large social cyberspace[J]. Commun, 2002, 45(4):51-55.
[8] LI Xiaoqing. Buddy finding in the mobile environment[J].Technovation, 2005, 25(9):1017-1023.
[9] BANSAL S, BAKER M. Observation-based cooperation enforcement in Ad hoc networks[R]. Palo Alto: Stanford University, 2003.
[10] 李沁芳. 电子商务用户信任影响因素建模及实证研究[D]. 上海:同济大学, 2007. LI Qinfang. Modeling and empirical research on the impact of trust factors in e-commerce[D]. Shanghai: Tongji University, 2007.
[11] MAURER U. Modeling a public-key infrastructure[J]. Lecture Notes in Computer Science, 1996, 1146:325-350.
[12] REITER M K, STUBBLEBINE S G. Resilient authentication using path independence[J]. IEEE Transactions on Computer, 1998, 47(12):1351-1362.
[13] JØSANG A. An algebra for assessing trust in certification chains[C]//Proceedings of the Network and Distributed System Security Symposiu. San Diego: DBLP, 1999:265-279.
[14] LEVIEN R, AIKEN A. Attack-resistant trust metrics for publickey certification[C]//Proceedings of the 7th USENIX Security Symposiu.[S.l.]:[s.n.], 1998: 229-242.
[15] KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The eigentrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International World Wide Web Conference. New York:ACM Press, 2003: 640-651.
[16] GUHA R, KUMAR R, RAGHAVAN P. Propagation of trust and distrust[C]//Proceedings of the 13th Annual International World Wide Web Conferenc. New York: ACM Press, 2004: 403-412.
[17] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 1996: 164-173.
[18] CLARKE D, ELIEN J-E, ELLISON C, et al. Certificate chain discovery in SPKI/SDSI[J]. Journal of Computer Security, 2001, 9(4):285-322.
[19] ABDUL-RAHMAN A, HAILES S. A distributed trust model [C]//Proceedings of Meeting on New Security Paradigms. New York: ACM Press, 1998: 48-60.
[20] HERZBERG A, MASS Y, MICHAELI J, et al. Access control meets public key infrastructure: or assigning roles to strangers[C]//Proceedings of IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 2000: 2-14.
[21] MANCHALA D W. Trust metrics, models and protocols for electronic commerce transactions[C]//Proceedings of the 18th IEEE International Conference on Distributed Computing Systems. Los Vaqueros: IEEE Computer Society, 1998: 312-321.
[22] RESNICK P, ZECKHAUSER R. Trust among strangers in Internet transactions: empirical analysis of eBay's reputation system[C]//Advances in Applied Microeconomics: the Economics of the Internet and E-Commerce 11. Amsterdam: Elsevier Science, 2000: 127-157.
[23] JØSANG A, ISMAIL R, BOYD C. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems, 2005, 43(2):618-644.
[24] ZIMMERMANN P R. The official PGP user's guide[M]. Cambridge: MIT Press, 1995: 152-188.
[25] YU B, SINGH M P, SYCARA K. Developing trust inlarge-scale peer-to-peer systems[C]//Proceedings of the 1st IEEE Symposium on Multi-Agent Security and Survivability. Los Vaqueros: IEEE Computer Society, 2004: 1-10.
[26] BUCHEGGER S, BOUDEC J L. Performance analysis of the confidant protocol[C]//Proceedings of the 3rd ACM International Symposium on Mobile ad Hoc Networking & Computing. New York: ACM Press, 2002: 226-236.
[27] MICHIARDI P, MOLÜA R. Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks[M]//JERMANBLAZIC B, KLOBUCAR T. International federation for information processing. Norwell: Kluwer Academic Publishers, 2002: 107-121.
[28] THEODORAKOPOULOS G, BARAS J S. Trust evaluation in ad-hoc networks[C]//Proceedigns of the ACM Workshop Wireless Security. New York: ACM Press, 2004: 1-10.
[29] GAMBETTA D.Can we trust trust?[M]//GAMBETTA D. Trust: making and breaking cooperative relations. Oxford: Oxford University Press, 2000: 213-237.
[30] PAOLO M.Trust-aware recommender systems[C]//Proceedings of ACM Recommender Systems Minneapolis. New York: ACM Press, 2007: 19-20.
[1] ZHANG Jian-biao, LI Zhi-gang, LIU Guo-jie, WANG Chao, WANG Wei. Process active dynamic measurement method for Windows environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 46-50.
[2] CUI Zhao-yang, SUN Jia-qi, XU Song-yan, JIANG Xin. A secure clustering algorithm of Ad Hoc network for colony UAVs [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 51-59.
[3] CHEN Xin, XUE Yun, LU Xin, LI Wan-li, ZHAO Hong-ya, HU Xiao-hui. Text feature extraction method for sentiment analysis based on order-preserving submatrix and frequent sequential pattern mining [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(3): 36-45.
[4] SUN Liang, CHEN Xiao-chun, ZHONG Yang, LIN Zhi-peng, REN Tong. Secure startup mechanism of server based on trusted BMC [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 89-94.
[5] HUANG Dong, XU Bo, XU Kan, LIN Hong-fei, YANG Zhi-hao. Short text clustering based on word embeddings and EMD [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(7): 66-72.
[6] CUI Xiao-yu, ZHAO Bo, FAN Pei-ru, XIAO Yu. A key management mechanism basedon TrustZone architecture [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 92-98.
[7] XU Zhong-hao, LI Tian-qi. Analysison statistical characteristic of Chinese stock market based on complex networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 41-48.
[8] LI Xiao-ce, PAN Xiao-zhong, MAI Tao-tao. Multi-component property based remote attestation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 53-58.
[9] ZHAI Peng, LI Deng-dao. The fuzzy clustering algorithm based on inclusion index of Gausian membership function [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(5): 102-105.
[10] ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90.
[11] LIU Da-fu, SU Yang. Research on evidence-based software trustworthiness metrics model [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(11): 58-65.
[12] LIU Ying-ying, LIU Pei-yu, WANG Zhi-hao, LI Qing-qing, ZHU Zhen-fang. A text clustering algorithm based on find of density peaks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(1): 65-70.
[13] GAO Xiao-bo, FANG Xian-mei, LI Shi-jun. Trust-aware product recommendation based on factorization machine [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(1): 89-94.
[14] FAN Yi-xing, GUO Yan, LI Xi-peng, ZHAO Ling, LIU Yue, YU Xiao-ming, CHENG Xue-qi. A multi-level page clustering method based on page segmentation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(07): 1-8.
[15] JIANG Wei-jin, XU Yu-hui, GUO Hong, XU Yu-sheng. A multi-dimensional evidence dynamic trust computing model based on multi-agent [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2015, 50(01): 1-11.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!