Trustguard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks

Total Page:16

File Type:pdf, Size:1020Kb

Trustguard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks TrustGuard: Countering Vulnerabilities in Reputation Management for Decentralized Overlay Networks Mudhakar Srivatsa, Li Xiong, Ling Liu College of Computing Georgia Institute of Technology fmudhakar, lxiong, [email protected] ABSTRACT in a decentralized overlay networks. Such systems typically Reputation systems have been popular in estimating the trustwor- assign each node a trust value based on the transactions it thiness and predicting the future behavior of nodes in a large-scale has performed with others and the feedbacks it has received. distributed system where nodes may transact with one another For example, XRep [4] provides a protocol complementing without prior knowledge or experience. One of the fundamental current Gnutella protocol by allowing peers to keep track of challenges in distributed reputation management is to understand and share information about the reputation of other peers vulnerabilities and develop mechanisms that can minimize the po- and resources. EigenTrust [11] presents an algorithm similar tential damages to a system by malicious nodes. In this paper, to PageRank [15] that computes a trust value by assuming we identify three vulnerabilities that are detrimental to decen- trust is transitive and demonstrated its benefits in address- tralized reputation management and propose TrustGuard − a ing fake file downloads in a peer-to-peer file sharing network. safeguard framework for providing a highly dependable and yet However, few of the reputation management work so far efficient reputation system. First, we provide a dependable trust have focused on the vulnerabilities of a reputation system model and a set of formal methods to handle strategic malicious itself. One of the detrimental vulnerabilities is that a mali- nodes that continuously change their behavior to gain unfair ad- cious node may strategically alter its behavior in a way that vantages in the system. Second, a transaction based reputation benefits itself such as starting to behave maliciously after it system must cope with the vulnerability that malicious nodes may attains a high reputation. Another widely recognized vul- misuse the system by flooding feedbacks with fake transactions. nerability is the shilling attack [12] where malicious nodes Third, but not least, we identify the importance of filtering out submit dishonest feedback and collude with each other to dishonest feedbacks when computing reputation-based trust of a boost their own ratings or bad-mouth non-malicious nodes. node, including the feedbacks filed by malicious nodes through Last, but not the least, malicious nodes can flood numerous collusion. Our experiments show that, comparing with existing fake feedbacks through fake transactions in a transaction- reputation systems, our framework is highly dependable and effec- based feedback system. tive in countering malicious nodes regarding strategic oscillating With these issues in mind, we present TrustGuard − a behavior, flooding malevolent feedbacks with fake transactions, highly dependable reputation-based trust building frame- and dishonest feedbacks. work. The paper has a number of unique contributions. First, we introduce a highly dependable trust model to effec- tively handle strategic oscillations by malicious nodes (Sec- Categories and Subject Descriptors tion 3). Second, we propose a feedback admission con- C.2.4 [Distributed Systems]: Distributed Applications; trol mechanism to ensure that only transactions with secure C.4 [Performance of Systems]: Security, Reliability| proofs can be used to file feedbacks (Section 4). Third, we Reputation Management, Overlay Networks propose feedback credibility based algorithms for effectively filtering out dishonest feedbacks (Section 5). We also present General Terms a set of simulation based experiments, showing the effective- ness of the TrustGuard approach in guarding against each of Security, Performance, Reliability the above vulnerabilities with minimal overhead. We con- clude the paper with a brief overview of the related work 1. INTRODUCTION (Section 7), and a conclusion (Section 8). A variety of electronic markets and online communities have reputation system built in, such as eBay, Amazon, Yahoo! 2. TRUSTGUARD: AN OVERVIEW Auction, Edeal, Slashdot, Entrepreneur. Recent works [4, 1, 3, 11, 19] suggested reputation based trust systems as 2.1 System Architecture an effective way for nodes to identify and avoid malicious We first present a high level overview of the TrustGuard nodes in order to minimize the threat and protect the sys- framework 1. Figure 1 shows a sketch of the decentralized tem from possible misuses and abuses by malicious nodes architecture of the dependable reputation management sys- Copyright is held by the International World Wide Web Conference Com­ tem. The callout shows that each node has a transaction mittee (IW3C2). Distribution of these papers is limited to classroom use, 1 and personal use by others. This research is partially supported by NSF CNS CCR, WWW 2005, May 10­14, 2005, Chiba, Japan. NSF ITR, DoE SciDAC, CERCS Research Grant, IBM Fac- ACM 1­59593­046­9/05/0005. ulty Award, IBM SUR grant, and HP Equipment Grant. be identified through some digital certification based mecha- nism. Readers may refer to [2, 18, 7] for a detailed discussion on security issues in overlay networks. 2.2 Problem Statement and Solution Approach The TrustGuard framework is equipped with several im- portant safeguard components. In the rest of the paper, we focus on the following three types of vulnerabilities, analyze the potential threats and describe countermeasures against such vulnerabilities using TrustGuard. Strategic Oscillation Guard. Most existing reputation systems such as eBay use a combination of average feedbacks and the number of transactions performed by a node as indi- cators of its trust value. Our experiments show that using a simple average does not guard the reputation system against oscillating behavior or dishonest feedbacks. For example, a bad node may behave non-maliciously until it attains a good reputation (reflected in its trust value) and then behave ma- liciously. Or it could oscillate between building and milking reputation. A dependable reputation system should be able to penalize malicious nodes for such dynamic and strategic Figure 1: TrustGuard's Architecture behavioral changes. In TrustGuard, we promote the incor- poration of the reputation history and behavior fluctuations of nodes into the estimation of their trustworthiness. We use manager, a trust evaluation engine and a feedback data stor- adaptive parameters to allow different weighting functions age service. Whenever a node n wants to transact with an- to be applied to current reputation, reputation history, and other node m, it calls the Trust Evaluation Engine to per- reputation fluctuations. form a trust evaluation of node m. It collects feedback about Fake Transaction Detection. In a typical transaction- node m from the network through the overlay protocol and based feedback system, after each transaction, the two par- aggregates them into a trust value. Such computation is ticipating nodes have an opportunity to submit feedbacks guarded by strategic oscillation guard and dishonest feed- about each other. This brings two vulnerabilities. First, a back filters. The Transaction Manager consists of four com- malicious node may flood numerous ratings on another node ponents. The trust-based node selection component uses with fake transactions. Second, a malicious node may sub- the trust value output from the trust evaluation engine to mit dishonest feedback about a transaction. A dependable make trust decisions before calling the transaction execution trust model should be equipped with mechanisms to handle component. Before performing a transaction, the transac- malicious manipulation of feedbacks to guard the system tion proof exchange component is responsible for generating against such fake transactions, and to differentiate dishon- and exchanging transaction proofs. Once the transaction est feedback from honest ones. In TrustGuard approach, we is completed, the feedbacks are manually entered by the propose to bind a feedback to a transaction through trans- transacting users. The transacting nodes then route these action proofs. In other words, a feedback between nodes n feedbacks to designated nodes on the overlay network for and m on a given transaction is stored if and only if n and storage through a decentralized overlay protocol (e.g. DHT m indeed transacted with each other. based protocol). The designated nodes then invoke their Dishonest Feedback Filter. While the fake transaction data storage service and admit a feedback only if it passes detection guarantees that a feedback is associated with a the feedback admission control where fake transactions are real transaction, a malicious node may submit dishonest detected. The feedback storage service is also responsible feedbacks in order to boost the ratings of other malicious for storing reputation and trust data on the overlay network nodes or bad-mouth non-malicious nodes. The situation is securely, including maintaining replicas for feedbacks and made much worse when a group of malicious nodes make trust values. We build the TrustGuard storage service on collusive attempts to manipulate the ratings. In this paper, top of PeerTrust [19]. we build a dishonest feedback filter to differentiate dishon- Although we implement the TrustGuard framework using est feedbacks from honest ones. The filter essentially assigns a decentralized
Recommended publications
  • A Survey of Trust and Reputation Systems for Online Service Provision
    A Survey of Trust and Reputation Systems for Online Service Provision Audun Jøsang a;1;4 Roslan Ismail b;2 Colin Boyd a;3 aInformation Security Research Centre Queensland University of Technology Brisbane, Australia bCollege of Information Technology Universiti Tenaga Nasional (UNITEN) Malaysia Abstract Trust and reputation systems represent a significant trend in decision support for Internet mediated service provision. The basic idea is to let parties rate each other, for example after the completion of a transaction, and use the aggregated ratings about a given party to derive a trust or reputation score, which can assist other parties in deciding whether or not to transact with that party in the future. A natural side effect is that it also provides an incentive for good behaviour, and therefore tends to have a positive effect on market quality. Reputation systems can be called collaborative sanctioning systems to reflect their collaborative nature, and are related to collaborative filtering systems. Reputation systems are already being used in successful commercial online applications. There is also a rapidly growing literature around trust and reputation systems, but unfortunately this activity is not very coherent. The purpose of this article is to give an overview of existing and proposed systems that can be used to derive measures of trust and reputation for Internet transac- tions, to analyse the current trends and developments in this area, and to propose a research agenda for trust and reputation systems. Key words: Trust, reputation, transitivity, collaboration, e-commerce, security, decision 1 Corresponding author. QUT, Brisbane Qld 4001, Australia. Email: [email protected] 2 Email: [email protected] 3 Email: [email protected] 4 The work reported in this paper has been funded in part by the Co-operative Research Centre for Enterprise Distributed Systems Technology (DSTC) through the Australian Fed- eral Government's CRC Programme (Department of Education, Science, & Training).
    [Show full text]
  • Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks
    Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks by Lik Mui B.S., M.Eng., Electrical Engineering and Computer Science Massachusetts Institute of Technology, 1995 M. Phil., Management Studies, Department of Social Studies University of Oxford, 1997 Submitted to the Department of Electrical Engineering and Computer Science in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy in Electrical Engineering and Computer Science at the MASSACHUSETTS INSTITUTE OF TECHNOLOGY December 20, 2002 Copyright 2002 Massachusetts Institute of Technology. All rights reserved. Signature of Author: ____________________________________________________________ Department of Electrical Engineering and Computer Science December 20, 2002 Certified by: ___________________________________________________________________ Peter Szolovits Professor of Electrical Engineering and Computer Science Thesis Supervisor Accepted by: __________________________________________________________________ Arthur C. Smith Professor of Electrical Engineering and Computer Science Chairman, Department Committee on Graduate Students Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks by Lik Mui Submitted to the Department of Electrical Engineering and Computer Science on December 20, 2002 in partial fulfillment of the requirements for the Degree of Doctor of Philosophy in Electrical Engineering and Computer Science Abstract Many recent studies of trust and reputation are made
    [Show full text]
  • A Survey on Reputation Systems in E-Commerce
    International Journal of Scientific Engineering and Science Volume 1, Issue 2, pp. 1-4, 2017. A Survey on Reputation Systems in E-Commerce Gigi Mol1, Sincy John2 1 PG Student, Department of Computer Science and Engineering, A.P.J Abdul Kalam University, Kerala, India 2 Professor, Department of Computer Science and Engineering, A.P.J Abdul Kalam University, Kerala, India Email address: [email protected] Abstract— A crucial factor for the success of e-commerce system is accurate trust evaluation. Reputation based trust models are widely used in e-commerce systems, where the ratings are used to calculate the trust score. These ratings, also referred as recommendations, referrals and feedback, is the most important factor in building the trust relationship. Ratings will guide the potential buyers to choose the most trustworthy seller. Different rating system may adopt different methods to calculate the reputation trust score, which in turn rank the sellers to guide the buyers. A comprehensive survey on different reputation system in e-commerce applications are presented in this paper. Keywords— Reputation system, trust score, peer-to-peer, feedback. positive feedback percentage is calculated based on the I. INTRODUCTION average number of positive and negative feedback in a The most important factors to be considered in an e-commerce specified period of time for a particular transaction. All good system are trust and reputation. Reputation based trust models repute problem occurs in this system as it cannot express the are used in e-commerce applications to help the users or negative aspect towards a transaction [2]. To bring the customers to choose the best seller by letting them rate each reputation score to a reasonable level, feedback comments are other.
    [Show full text]
  • EVALUATION of REPUTATION METRIC for the B2C E-COMMERCE REPUTATION SYSTEM
    EVALUATION OF REPUTATION METRIC FOR THE B2C e-COMMERCE REPUTATION SYSTEM Anna Gutowska and Andrew Sloane School of Computing and Information Technology, University of Wolverhampton Wulfruna Street, Wolverhampton, U.K. Keywords: Reputation System, B2C, e-Commerce, Simulation. Abstract: This paper evaluates recently developed novel and comprehensive reputation metric designed for the distributed multi-agent reputation system for the Business-to-Consumer (B2C) E-commerce applications. To do that an agent-based simulation framework was implemented which models different types of behaviours in the marketplace. The trustworthiness of different types of providers is investigated to establish whether the simulation models behaviour of B2C E-commerce systems as they are expected to behave in real life. 1 INTRODUCTION each other to derive a trust or reputation rating. This can assist in deciding whether or not to engage in a The process of globalization creates new challenges transaction with this party. Reputation systems are and opportunities for companies by offering an particularly useful in cases where the trustee is access to new markets that were previously closed unknown to the individual involved but well known due to cost, regulations etc. The adoption of the to others. Internet, in particular Internet-enabled B2C E- There are a number of existing consumer-to- business solutions, allows many Small and Medium consumer (C2C) on-line reputation systems such as Enterprises (SMEs) to respond to these challenges eBay (2008) or Amazon (2008). However, unlike C2C E-commerce marketplaces, most B2B sites do and opportunities by extending the geographic reach not provide users with feedback information. There of their operations.
    [Show full text]
  • Computational Models of Trust and Reputation in Online Social Networks Sana Hamdi
    Computational models of trust and reputation in online social networks Sana Hamdi To cite this version: Sana Hamdi. Computational models of trust and reputation in online social networks. Modeling and Simulation. Université Paris-Saclay; Université de Tunis. Faculté des sciences de Tunis, 2016. English. NNT : 2016SACLL001. tel-01274757 HAL Id: tel-01274757 https://tel.archives-ouvertes.fr/tel-01274757 Submitted on 16 Feb 2016 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. 1176$&// 7+(6('('2&725$7 GH /$)$&8/7('(66&,(1&(6'(781,6 HWGH /¶81,9(56,7(3$5,66$&/$< SUpSDUpHj7pOpFRP6XG3DULVHQ(YU\ e&2/('2&725$/(1 (FROH'RFWRUDOH6FLHQFHVHW7HFKQRORJLHVGHO ,QIRUPDWLRQHWGHOD&RPPXQLFDWLRQ 6SpFLDOLWpGHGRFWRUDW,QIRUPDWLTXH 3DU 0PH6DQD+DPGL &RPSXWDWLRQDO0RGHOVRI7UXVWDQG5HSXWDWLRQLQ2QOLQH6RFLDO1HWZRUNV 7KqVHSUpVHQWpHHWVRXWHQXHj(YU\OH-DQYLHU &RPSRVLWLRQGX-XU\ 0PH.:HJU]\Q:ROVND3URIHVVHXUH(6,*(7(/5DSSRUWHXVH 0PH+%HQ*KH]DOD3URIHVVHXUH(16,/D0DQRXED5DSSRUWHXVH 0PH%/H*UDQG3URIHVVHXUH8QLYHUVLWp3DULV6RUERQQH([DPLQDWULFH 0PH<%RXUGD3URIHVVHXUH&HQWUDOH6XSpOHF([DPLQDWULFH 000*DPPRXGL3URIHVVHXU,6$00/D0DQRXED([DPLQDWHXU 0PH$%RX]HJKRXE3URIHVVHXUH7pOpFRP6XG3DULV'LUHFWULFHGHWKqVH 06%HQ<DKLD3URIHVVHXU)677XQLV'LUHFWHXUGHWKqVH 0PH$/RSHV*DQFDUVNL0DvWUHGHFRQIpUHQFH7pOpFRP6XG3DULV(QFDGUDQWH i To my parents Kamel and Afifa I am especially thankful for your love and your continuous support. Thanks for always believing in me. I know you wait this special day from my birth.
    [Show full text]
  • State of the Art of Trust and Reputation Systems in E-Commerce Context
    State of the art of Trust and Reputation Systems in E-Commerce Context H. Rahimi* and H. El Bakkali, Information Security Research Team, University Mohamed V Rabat ENSIAS, Rabat, Morocco. [email protected] *[email protected] Abstract-This article proposes in depth comparative study of the most popular, used and analyzed Trust and Reputation System (TRS) according to the trust and reputation literature and in terms of specific trustworthiness criteria. This survey is realized relying on a selection of trustworthiness criteria that analyze and evaluate the maturity and effectiveness of TRS. These criteria describe the utility, the usability, the performance and the effectiveness of the TRS. We also provide a summary table of the compared TRS within a detailed and granular selection of trust and reputation aspects. I. INTRODUCTION Open electronic markets, online collaboration systems, distributed peer-to-peer applications, online social media require the establishment of mutual trust between service providers and service consumers. In fact, the major concerns of web-based services especially e-commerce applications is to overcome the inherent uncertainties and untrustworthiness risks and enhance the system's robustness and resistance against fraudulent users and distrustful ones. Besides, e-commerce platforms aim at adopting the most efficient approach that helps detect and analyze users' intentions in order to reveal and understand deceitful ones. Otherwise, the underlying purpose of e-commerce services which is to maximize the profit and the rate of purchase, would be threatened and deteriorated by fraudulent and ill-intentioned users. For this reason, Recommender Systems such as Trust and Reputation Systems (TRS), provide essential input for computational trust so as to predict future behaviors of peers basing on the past actions of a peer [1].
    [Show full text]
  • The Digitization of Word-Of-Mouth: Promise and Challenges of Online
    THE DIGITIZATION OF WORD-OF-MOUTH: PROMISE AND CHALLENGES OF ONLINE REPUTATION MECHANISMS Chrysanthos Dellarocas Sloan School of Management Massachusetts Institute of Technology Cambridge, MA 02139 [email protected] Current Draft: October 1, 2002 ABSTRACT: Online reputation mechanisms harness the bi-directional communication capabilities of the Internet in order to engineer large-scale word-of-mouth networks. They are emerging as a promising alternative to more established assurance mechanisms, such as branding and formal contracting, in a variety of settings ranging from online marketplaces to Internet search engines. At the same time, they are transforming a concept that had traditionally fallen within the realm of the social sciences into an engineering design problem. This paper surveys our progress in understanding the new possibilities and challenges that these mechanisms represent. It discusses some important dimensions in which Internet-based reputation mechanisms differ from traditional word-of-mouth networks and surveys the most important issues related to designing, evaluating and using them. It provides an overview of relevant work in game theory and economics on the topic or reputation. It further discusses how this body of work is being extended and combined with insights from computer science, information systems, management science and psychology in order to take into consideration the special properties of online mechanisms such as their unprecedented scalability, the ability to precisely design the type of feedback information
    [Show full text]
  • Experience with an Object Reputation System for Peer-To-Peer Filesharing Kevin Walsh Emin G¨Un Sirer Cornell University {Kwalsh,Egs}@Cs.Cornell.Edu
    Experience with an Object Reputation System for Peer-to-Peer Filesharing Kevin Walsh Emin G¨un Sirer Cornell University {kwalsh,egs}@cs.cornell.edu Abstract interactions are brief and span a large set of peers that In this paper, we describe Credence, a decentralized ob- changes dynamically, the opportunity to reuse informa- ject reputation and ranking system for large-scale peer- tion from past first-hand experience is limited. Another to-peer filesharing networks. Credence counteracts pol- conventional approach is to interpret a shared file as an lution in these networks by allowing honest peers to as- endorsement for that file’s contents, similar to the way sess the authenticity of online content through secure hyperlinks are interpreted as implicit votes by search en- tabulation and management of endorsements from other gine ranking algorithms. Our data indicates that sharing peers. Our system enables peers to learn relationships is not a reliable indicator of a user’s judgment. Peer-to- even in the absence of direct observations or interac- peer filesharing networks call for trustworthiness metrics tions through a novel, flow-based trust computation to that are robust, predictive, and invariant under changing discover trustworthy peers. We have deployed Credence network conditions and peer resource constraints. as an overlay on top of the Gnutella filesharing network, In this paper, we describe Credence, a new distributed with more than 10,000 downloads of our client software reputation mechanism for peer-to-peer filesharing net- to date. We describe the system design, our experience works that enables honest, participating peers to confi- with its deployment, and results from a long-term study dently determine object authenticity, the degree to which of the trust network built by users.
    [Show full text]
  • How the Internet, the Sharing Economy, and Reputational Feedback Mechanisms Solve the “Lemons Problem”
    University of Miami Law Review Volume 70 Number 3 Volume 70 Number 3 (Spring 2016) Article 6 5-1-2016 How the Internet, the Sharing Economy, and Reputational Feedback Mechanisms Solve the “Lemons Problem” Adam Thierer Christopher Koopman Anne Hobson Chris Kuiper Follow this and additional works at: https://repository.law.miami.edu/umlr Part of the Law and Economics Commons Recommended Citation Adam Thierer, Christopher Koopman, Anne Hobson, and Chris Kuiper, How the Internet, the Sharing Economy, and Reputational Feedback Mechanisms Solve the “Lemons Problem”, 70 U. Miami L. Rev. 830 (2016) Available at: https://repository.law.miami.edu/umlr/vol70/iss3/6 This Article is brought to you for free and open access by the Journals at University of Miami School of Law Institutional Repository. It has been accepted for inclusion in University of Miami Law Review by an authorized editor of University of Miami School of Law Institutional Repository. For more information, please contact [email protected]. How the Internet, the Sharing Economy, and Reputational Feedback Mechanisms Solve the “Lemons Problem” ADAM THIERER,* CHRISTOPHER KOOPMAN,** ANNE HOBSON,*** AND CHRIS KUIPER**** This paper argues that the sharing economy—through the use of the Internet and real time reputational feedback mechanisms—is providing a solution to the lemons problem that many regulators have spent decades attempting to over- come. Section I provides an overview of the sharing economy and traces its rapid growth. Section II revisits the lemons theory as well as the various regulatory solutions proposed to deal with the problem of asymmetric information. Section III discusses the relationship between reputation and trust and analyzes how reputational incentives affect commercial interactions.
    [Show full text]
  • A Survey of Privacy Preserving Reputation Systems Omar Hasan
    A Survey of Privacy Preserving Reputation Systems Omar Hasan To cite this version: Omar Hasan. A Survey of Privacy Preserving Reputation Systems. [Technical Report] LIRIS UMR 5205 CNRS/INSA de Lyon/Université Claude Bernard Lyon 1/Université Lumière Lyon 2/École Cen- trale de Lyon. 2017. hal-01635314 HAL Id: hal-01635314 https://hal.archives-ouvertes.fr/hal-01635314 Submitted on 15 Nov 2017 HAL is a multi-disciplinary open access L’archive ouverte pluridisciplinaire HAL, est archive for the deposit and dissemination of sci- destinée au dépôt et à la diffusion de documents entific research documents, whether they are pub- scientifiques de niveau recherche, publiés ou non, lished or not. The documents may come from émanant des établissements d’enseignement et de teaching and research institutions in France or recherche français ou étrangers, des laboratoires abroad, or from public or private research centers. publics ou privés. A Survey of Privacy Preserving Reputation Systems∗ Omar Hasan U. of Lyon, CNRS, INSA-Lyon, LIRIS, UMR5205, F-69621, France Abstract Reputation systems make the users of a distributed application ac- countable for their behavior. The reputation of a user is computed as an aggregate of the feedback provided by other users in the system. Truthful feedback is clearly a prerequisite for computing a reputation score that accurately represents the behavior of a user. However, it has been observed that users often hesitate in providing truthful feedback, mainly due to the fear of retaliation. Privacy preserving reputation systems enable users to provide feedback in a private and thus unin- hibited manner. In this paper, we describe analysis frameworks for reputation systems and privacy preserving reputation systems.
    [Show full text]
  • The State of the Art in Trust and Reputation Systems: a Framework for Comparison Zeinab Noorian1 and Mihaela Ulieru2
    Journal of Theoretical and Applied Electronic Commerce Research This paper is available online at ISSN 0718–1876 Electronic Version www.jtaer.com VOL 5 / ISSUE 2 / AUGUST 2010 / 97-117 DOI: 10.4067/S0718-18762010000200007 © 2010 Universidad de Talca - Chile The State of the Art in Trust and Reputation Systems: A Framework for Comparison Zeinab Noorian1 and Mihaela Ulieru2 University of New Brunswick, Faculty of Computer Science 1 [email protected], 2 [email protected] Received 15 February 2010; received in revised form 16 June 2010; accepted 18 June 2010 Abstract We introduce a multidimensional framework for classifying and comparing trust and reputation (T&R) systems. The framework dimensions encompass both hard and soft features of such systems including different witness location approaches, various reputation calculation engines, variety of information sources and rating systems which are categorised as hard features, and also basic reputation measurement parameters, context diversity checking, reliability and honesty assessment and adaptability which are referred to as soft features. Specifically, the framework dimensions answer questions related to major characteristics of T&R systems including those parameters from the real world that should be imitated in a virtual environment. The proposed framework can serve as a basis to understand the current state of the art in the area of computational trust and reputation and also help in designing suitable control mechanisms for online communities. In addition, we have provided a critical analysis
    [Show full text]
  • CHAPTER 14: REPUTATION MANAGEMENT SYSTEMS for PEER-TO-PEER NETWORKS Ing [1, 2, 3, 4], Instant Messaging [5], Audio Conferencing [6], and Distributed Computing [7]
    CHAPTER 1 CHAPTER 14: REPUTATION MANAGEMENT SYSTEMS FOR PEER-TO-PEER NETWORKS F.Qi, H.Shen, H.Chandler, G.Liu and Z.Li Clemson University, Clemson, South Carolina 1.1 INTRODUCTION In recent years, peer-to-peer (P2P) networks have gained popularity in many large-scale, distributed internet applications. P2P networks enable the shar- ing of globally scattered computer resources, allowing them to be collectively used in a cooperative manner for different applications such as file shar- 1 Please enter \offprintinfo{(Title, Edition)}{(Author)} at the beginning of your document. 2 CHAPTER 14: REPUTATION MANAGEMENT SYSTEMS FOR PEER-TO-PEER NETWORKS ing [1, 2, 3, 4], instant messaging [5], audio conferencing [6], and distributed computing [7]. Node cooperation is critical to achieving reliable P2P per- formance but proves challenging since networks feature autonomous nodes without preexisting trust relationships. Additionally, some internal nodes may be compromised, misbehaving, selfish, or even malicious. Then, a criti- cal problem arises: how can a resource requester choose a resource provider that is trustworthy and provides high quality of service (QoS) from among many resource providers? The main way to address this problem is with reputation management systems. Like the reputation systems in the eBay [8], Amazon [9] and Over- stock [10] online auction platforms, reputation systems employed in P2P net- works compute and publish global reputation values for each node based on a collection of local ratings from others in order to provide guidance in se- lecting trustworthy nodes. They thwart the intentions of uncooperative and dishonest nodes and provide incentives for high QoS. For example, in a P2P file sharing system, a file requester needs to choose a single file provider from many file providers.
    [Show full text]