J. Software Engineering & Applications, 2009, 2: 283-287
doi:10.4236/jsea.2009.24036 Published Online November 2009 (http://www.SciRP.org/journal/jsea)
Copyright © 2009 SciRes JSEA
283
Research on the Trust Model Based on the
Groups’ Internal Recommendation in
E-Commerce Environment
Nan REN1, Qin LI2
School of Economics and Management, Jiangsu University of Science & Technology, Jiangsu, China.
Email:1rennan_hb@sohu.com, 2lei731@gmail.com
Received June 30th, 2009; revised August 2nd, 2009; accepted August 7th, 2009.
ABSTRACT
The trust plays an extremely important role in online shopping. In order to make online shopping trusty, this paper puts
foreword a new trust model in e-commerce environment GIR-TM (Groups’ Internal Recommendation Trust Model).
First, it regarded the network as a combination of groups, and then did the internal recommendation based on these
groups. The GIR-TM, in the process of recommendation, distinguished clearly between the trust degrees of recommen-
dation node and the trust degrees of recommended node, and then calculated the integrated credibility value of the
recommended node according to the weight of recommendation node in the group, the partial trust degree and the de-
gree of recommendation when the recommendation node recommends the recommended node, and the overall credibil-
ity value of recommended node as well. Lastly through listing the experimental data and comparing with the HHRB-TM
(History and Honest Recommendation Based Trust Model) on the same condition, it is verified that GIR-TM is feasible
and effective.
Keywords: E-commerce, Groups, Internal Recommendation, the Credibility Value
1. Introduction
Trust is the basis of co-operation, and it plays an ex-
tremely important role in online shopping. At present,
there are still some issues in peer-to-peer trust model,
such as over-reliance on the recommendations of others,
trust calculations’ inaccuracy, difficulty of dealing with
the united malicious attacks, dynamic strategy malicious
nodes and so on [1]. In order to promote e-commerce to
develop stably and quickly, researchers around the world
have done some researches in the field of trust model: M.
H. Hanif Durad et al. [2] discussed how to utilize the
trust management to strengthen its security in the grid
environment. G. Liang et al. [3] discussed how to use the
trust management system such as reputation systems to
solve the trust problem among the users. F. Almenarez et
al. [4] discussed how to use the auto-negotiation tech-
nologies to solve the dynamic trust management in gen-
eral environment. Jøsang A et al. [5] pointed out that in
the P2P environment, the core problem of the trust
mechanism based on the reputation were that: in the
given application, what trust factors are the most appro-
priately used to infer the measurement of trust and repu-
tatition? How to generate, acquire and aggregate the inform-
ation about these trust factors? Whether the trust mecha-
nisms can resist various attacks which are controlled by
strategic individuals? Li Wen [6] put forward a History
and Honest Recommendation Based Trust Model in
Peer-to-Peer Networks, and improved the evaluation al-
gorithm of trust. Chen Xiaoliang [7] classified the impact
factors, built the calculation model of initial trust, and
figured out that Consumers had distrust of web sites and
online stores which is a bottleneck in e-commerce de-
velopment.
To solve the core problem that consumers are lacking
in trust of e-commerce currently, this paper establishes a
trust model based on the groups’ internal recommenda-
tion in E-commerce environment, in which the compre-
hensive credibility value of recommended node is calcu-
lated by the weight of recommendation node in the group,
the partial trust degree when recommendation node rec-
ommends recommended node, and the degree of recom-
mendation and the overall credibility value of recom-
mended node. The calculated result can supply the basis
for restraining malicious acts effectively (such as joint
defamation, malicious exaggeration, providing false in-
formation, etc.).
Research on the Trust Model Based on the Groups’ Internal Recommendation in E-Commerce Environment
284
2. GIR-TM
2.1 Group Mechanisms
2.1.1 Group’s Structure
First of all, according to the credibility value of every
node, the peer-to-peer network can be divided into three
small collections [8]:

,, BadGoodWholeN
In which: Good is a collection of nodes with good
credibility value gained through the good service pro-
vided to others.
Bad is a collection which is composed of malicious
nodes;
is a collection of nodes whose credibility are un-
sure.
When a node p joins in the network, it is put into the
collection
, and its credibility value is 0. The nodes
with good performance can increase their credibility
value into a particular value until it is placed into the
collection Good. On the contrary, if the node performs
badly and its credibility value will be less than 0, then it
will be moved to the collection Bad, meanwhile, the in-
formation about its bad performance will be notified in
the whole network. As received the notice, the nodes will
not trade with the notified node any more and then cut
off the connection with it.
Then, the nodes in collection Good will be grouped.
Some nodes in this collection have a certain credibility
value, higher reliability and stability, which compose the
group called Trusted Group (TG), and we assume that its
scale is Q. When the credibility value of a node in collec-
tion Good reaches a certain degree, it can set up its own
trust group or apply to join in the existing groups. Those
nodes that have not joined in the TG are put into another
group (AG).
The administrator of a TG is a node which creates the
group initially. Administrators must maintain a connec-
tion with all the nodes inside of group, and we assume
that each node in group maintains k as external connec-
tion. Administrators can choose which node to join in,
while the node can also choose its trust group. In order to
clarify the information of each trade and the credibility
value of each node in trading, we suggest that it is nec-
essary to establish a Node’s Information (NI) for each
node in the net to record its own series of activities, just
as shown in Table 1.
After a node establishes its own TG, the node needs to
notify its information to the nodes which do not belong
to any TG and the administrators of other trust groups
(TGs). After the administrator of another TG receives the
notice, it will inform the message to the nodes in its own
group.
According to the above strategy, the entire network is
divided into n TGs, collection Bad, collection
, as well
as AG. As shown in Figure 1, we assume that all nodes in
collection G ood have entered the trust group, just as the
two trust groups TG1 and TG2 in Figure 1, and A, B re-
spectively represent the administrators of TG1 and TG2,
and the number of their foreign connection is K (K = 1,
2 ... n).
2.1.2 Co n nection of N odes
After the node’s credibility value in collection
reaches
a certain trust degree (the credibility value of collec-
tion
R
) through the good behavior, it will be moved into
collection Good according to the principle "two-way
choice", that is, the node can choose trust group, and the
administrator selects a node, while the node can choose
to stay in AG, join in or build a TG.
As shown in Figure 1, through transacting with other
nodes, node C’s credibility value satisfies RC, then
it can enter the collection Good. When the node C de-
cides to join in the TG1, it needs to send application in-
formation to the administrator A, the information in-
cludes its ID and the kinds of commodities.After re-
ceiving the application, the administrator A must carry
out the following steps:
c
S
R
Step1: First of all, calculate the number of the nodes in
TG1, if the number reaches Q, reject the node C’s con-
nection, otherwise continue to Step 2;
Step2: Judge that whether the node c is a malicious
node or not, if it is, refuse its connection, otherwise con-
tinue to Step 3;
Step3: The administrator reviews the node C’s credi-
bility value, 1
TG
R
is the credibility value of TG1, if
1>, reject the node C’s connection, other-
wise continue to Step4;
TG
Rc
R
R
Step4: The node p belongs to TG1, if p TG1, the
kinds of commodities of p satisfies, the node C
is allowed to joining in, continue to Step5;
c
S
p
S
Table 1. The Node’s Information (NI)
Transaction node
Group
ID
Group
Administrator
Value of
credibility Node’s
ID
Number of
successful
Number of
failure
Credibility
Value
Integrated credibility
value
……
……
Copyright © 2009 SciRes JSEA
Research on the Trust Model Based on the Groups’ Internal Recommendation in E-Commerce Environment 285
Step5: The administrator allows the node C to join in
TG1, and establishes a connection with the node C;
Step6: C creates connection with all the nodes in this
group and its own NI table.
After C receives the refused news, it can choose other
TG, and repeat the above steps. If it is rejected by all
administrators, it can set up its own group or stay in AG.
2.1.3 Depart u re of No des
Nodes’ departure has two ways: one is active departure,
and the other is passive departure. Active departure can
withdraw from the peer-to-peer actively when the node
completes the transactions. If the node is also the admin-
istrator, before it leaves, it will choose the node with the
highest credibility value in the group as administrator,
and copy the information of the group to it. Passive de-
parture happens when a node’s credibility value is less
than the credibility value of the group, and the adminis-
trator ejects it out of the trust group, and puts it into col-
lection Bad.
2.2 Internal Recommendation Mechanisms
2.2.1 Recomm e nda ti o n Ide a s
As same as the real life, and on the basis of the Trust
Group, the basic framework of GIR-TM is established, as
shown in Figure 2,
In the Figure 2, the closed circle equals to a TG, in
which each node (A, B, and C…) has its own transaction
nodes. In order to clarify the information of each transac-
tion and the credibility value of each transaction node,
we proposed to establish a table called Node's Informa-
tion (table NI) for every node. The table NI includes the
ID, administrators of the group where the node stays, and
the credibility value of node, as well as the transaction
information such as the ID of other transactions nodes,
the number of successful transactions and one of failed
transactions, the credibility value of other nodes and the
integrated credibility value (the calculation of the inte-
grated credibility value is referred to the following sec-
tion) after transacting. Assuming that A has transacted
with the node E and with the completion of each
Figure 1. Netw or k schematic of trust group-based
Figure 2. Basic framework of groups’ internal recommen-
dation trust model
transaction, the node A will refresh its own NI table (this
NI table is to be shared, the shared region is the inte-
grated credibility value with a recommendation tip sign),
and then through comparing to judge whether the inte-
grated credibility value of E meets the requirements or
not, that is, if the integrated credibility value of E is
greater than the overall credibility value of the group
which includes node A, it will be signed with the rec-
ommended tip, which will be shared by the other nodes
in this group, otherwise, giving up their recommendation.
2.2.2 Calculation of the Integrated Credibility Value
In order to calculate the Integrated Credibility Value of
GIR-TM in Figure 2, we firstly introduced the following
3 definitions [9] about the partial trust, the degrees of
recommendation, and the integrated credibility value:
Definition2.1 partial trust: represents the par-
tial view of the node U on node V, which directly comes
from the historical transaction experience between them,
given that
vu
L
Nuv
S
LUV
vu
(1)
In which, represents the number of successful
transaction with node V in view of U;
uv
S
uv
N represents the number of total transactions be-
tween U and V within the last interval timet
(t
is
illustrated that the trust model pay more attention to the
time limit of the nodes’ behavior). If = 0, then
= 0.
uv
N
vu
L
Definition 2.2 the degrees of Recommendation: the
degrees of recommendation how node X recommends the
node V is calculated as follows:
xvxv
xvxv
vx FS
FS
R
(2)
In which, Fuv represents that in node U’s view, the
number of failure transaction with node V. If Sxv + Fxv =0,
then set=0. Or if Sxv - Fxv <0, then set=0. As
shown in definition 2.2, if the nodes perform badly in the
trading, and gain poor assessment from others, then his
vx
Rvx
R
Copyright © 2009 SciRes JSEA
Research on the Trust Model Based on the Groups’ Internal Recommendation in E-Commerce Environment
Copyright © 2009 SciRes JSEA
286
credibility value will not be increased, but drastically
reduced. So to some extent, this way can restrain the ma-
licious acts of malicious nodes.
Definition 2.3 the integrated credibility degree: set
representing the projection of the trust level
which node U trusts node V (U
vu
G
V) in the trust scope λ:
vu
G= [
vu
L+ (1-
) ]
v
T
(3)
Here Tv is the overall credibility degree of the node V,
Tv <1. In which, α is a constant and 0 <α <1, and λ is the
trust scope, λ > 1.
Based on the quantitative description of the trust men-
tioned above, Document [6] put forward a HHRB-TM
(History and Honest Recommendation Based Trust
Model) in Peer-to-Peer Networks, and the corresponding
integrated trust credibility value is calculated as the For-
mula (4):
vu
G=u
vu
L+ (1- u
) () (4)  
N
i
vx
R
1
x
Cr
In which, is the credibility value of node X,
x
Cr u
[10] is a weight factor about node U referring to its own
direct history transaction experience. u
is dynamic, and
changes with the time or the number of transactions.
But the Formula (4) does not consider the weight of
recommendation node, and the role of the node with high
credibility value does not play completely. Aiming at
such problem, this paper put forward the definition of
comprehensive weights, and the calculation formula is:
Definition 2.4 comprehensive weights: set as
comprehensive weights of a trust group, and the calcula-
tion formula is:
x
Gt
x
Gt =
m
i
i
x
Cr
Cr
1
(5)
Here is the credibility value of node X,
is the sum of the credibility value of all the nodes
in the group in which node X is included.
x
Cr
m
i
i
Cr
1
According to the principle of the higher credibility
value, the higher credibility, the more accurate recom-
mendation information, and then the bigger contribution
rate, the weight of recommendation node is added into
the calculation of the credibility value of recommended
node, just as:
v
Ct = (6)
x
Gt vx
Rx
Cr
In which, is comprehensive weight of the trust
group in which the recommendation node X is included;
x
Gt
vx
R is the recommending evaluation that recom-
mendation Node X puts foreword on the recommended
node V;
x
Cr is the overall credibility value of recommended
node.
v
Ct is gained by the feedback information about the
Node V’s recommendation, 1;
v
Ct
Combining the partial trust with recommendation trust
through (7):
vu
G’= u
vu
L+(1- u
) (7)
v
Ct
In which, ’is the integrated credibility value to
represent how the node U recommends node V;
vu
G
vu
L represents accumulated direct history transac-
tion experience when the node U transacts join with node
V;
So, the integrated credibility value is as follows:
vu
G’= u
vu
L+ (1-u
)x
Gt vx
R
x
Cr (8)
3. Model Validations
We compared HHRB trust model with the trust model
GIR in this article in the same experiment situation. In
order to verify the model, enumerating 20 groups of ex-
perimental data, and assuming =380 =430
uv
Suv
N
u
=0.9.
These 20 groups of experimental data include the
number of successful transactions, the number of
failure transactions and the credibility value of each
node . Each group of experimental data is listed ran-
domly, because the GIR-TM is based on the TG. We
could think the nodes in the group are reliable, and the
failure rata is smaller, and then we could abide the prin-
ciple that the listed data of the failure transactions num-
ber is always less than the successful transactions num-
ber, in addition, the failure transactions number needs to
be much less. And the of each node needs to be
more than 0.5 (because every node is in the TG and
should have a higher credibility value, and we assume
that the threshold value of each TG’s credibility value is
0.5). As the real life, the reputable people will form a
group, and they are all reliable to have much more possi-
bility to transact each other successfully. In generally,
these experimental data are realistic and are shown in
Table 2:
xv
S
xv
F
x
Cr
x
Cr
The experimental results in Figure 3 are calculated
according to Table 2. As shown in Figure 3 (GN is group
number), although the integrated credibility value of the
HHRB model fluctuates sometimes, the integrated credi-
bility values obtained by the HHRB model and the GIR
model are more or less the same, just between 0.8825
and 0.8838. So it can be concluded that the GIR-TM is
verified to be feasible and effective.
Research on the Trust Model Based on the Groups’ Internal Recommendation in E-Commerce Environment 287
Table 2. Experimental data
S
xv F
xv Crx S
xv F
xv Crx S
xv F
xv Crx S
xv Fxv Crx
1 250 3 0.6 6 79 1 0.91 11 31 0 0.65 16 283 2 0.95
2 60 1 0.7 7 301 3 0.68 12 1730 0.92 17 291 3 0.98
3 80 1 0.57 8 123 2 0.73 13 92 1 0.835 18 68 1 0.74
4 99 0 0.73 9 161 1 0.88 14 1822 0.72 19 136 0 0.9
5 59 1 0.82 10 83 1 0.79 15 2592 0.935 20 197 1 0.54
Figure 3. Comparing the integrated credibility value be-
tween and
vu
Gvu
G
4. Summary and Prospect
The paper puts forward a Trust Model Based on the
Groups’ Internal Recommendation by analyzing the cur-
rent issue of trust in electronic commerce. The model is
composed of Trust Group and internal recommendation
mechanism. Generally speaking, the achievements are as
follows:
1) Put forward the GIR model based on the TG;
2) Put forward the algorithm of the integrated credibil-
ity value of the GIR model by improving the algorithm
of the integrated credibility value of the HHRB;
3) Verify the effectiveness of the GIR model by com-
paring it with HHRB model.
Theoretically, the model can provide a good trading
environment for customers, and reduce the occurrence of
malicious actions. However, besides effectiveness veri-
fication of the GIR model, the model needs to be verified
in the following aspects:
1) Verify the fairness of the transaction and the accu-
racy of the algorithm described in the model;
2) Further improve the model according to tested re-
sults;
3) Based on this paper, study on the rewarding and
punishment mechanism to reward the reputable people
and punish the malicious node.
5 Acknowledgments
This research was supported by Qing Lan Project of Ji-
angsu Province of China.
REFERENCES
[1] X. Li and L. Liu, “A reputation-based trust model for
peer-to-peer e-commerce communities[C],” Proc of IEEE
Conference on E-Commerce, ACM Press, California, pp.
275–284, 2003.
[2] M. H. Hanif Durad and C. Yuazlda, “A vision for the
trust managed grid [A], Proceedings of the sixth IEEE
International Symposium on Cluster Computing and the
Grid [C], IEEE Computer Society Washington, DC, USA,
2006.
[3] G. Liang, L. Junzhou, and X. Yaobin, “Developing and
managing trust in peer-to-peer systems [A],” proceedings
of the 17th International Conference on Database and
Expert Systems Applications[C], IEEE Computer Society
WashingtonDCUSA2006.
[4] F. Almenarez, A. Marin, D. Diazand J. Sanchez, “De-
veloping a model for trust management in pervasive de-
vices [J],” 2006.
[5] A. Jøsang, R. Ismail, and C. Boyd, “A survey of trust and
reputation systems for online service provision [J],” De-
cision Support Systems, Vol. 43, No. 2, pp. 618644,
2007.
[6] W. Li, “A history and honest recommendation based trust
model in peer-to-peer Networks [D],” Hunan University,
pp. 28–29, September 2007.
[7] X. L. Chen, “Research on the modeling and application of
initial trust for e-commerce[D],” Huazhong University of
Science and Technology, 2008.
[8] A. Gummadi and J. P. Yoon. “Modeling group trust for
peer-to-peer access control,” Database and Expert Sys-
tems Applications, Proceedings 15th International Work-
shop, pp. 971–978, 2004.
[9] W. Dou, H. M. Wang, and Y. Jia, “A recommenda-
tion-based peer-to-peer trust model [J],” Journal of soft-
ware, Vol. 15, No. 4, pp. 571–583, 2004.
[10] G. Zacharia and P. Maes, “Trust management through
reputation mechanisms [J],” Applied Artificial Intelli-
gence, Vol. 14, No. 9, 2000.
Copyright © 2009 SciRes JSEA