ABSTRACT
Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one another without prior knowledge or experience. One of the fundamental challenges in distributed reputation management is to understand vulnerabilities and develop mechanisms that can minimize the potential damages to a system by malicious nodes. In this paper, we identify three vulnerabilities that are detrimental to decentralized reputation management and propose TrustGuard - a safeguard framework for providing a highly dependable and yet efficient reputation system. First, we provide a dependable trust model and a set of formal methods to handle strategic malicious nodes that continuously change their behavior to gain unfair advantages in the system. Second, a transaction based reputation system must cope with the vulnerability that malicious nodes may misuse the system by flooding feedbacks with fake transactions. Third, but not least, we identify the importance of filtering out dishonest feedbacks when computing reputation-based trust of a node, including the feedbacks filed by malicious nodes through collusion. Our experiments show that, comparing with existing reputation systems, our framework is highly dependable and effective in countering malicious nodes regarding strategic oscillating behavior, flooding malevolent feedbacks with fake transactions, and dishonest feedbacks.
- K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Proceedings of the 10th International Conference of Information and Knowledge Management, 2001. Google ScholarDigital Library
- M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Operating Systems Design and Implementation (OSDI), 2002. Google ScholarDigital Library
- F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a p2p network. In Proceedings of the 11th World Wide Web Conference, 2002. Google ScholarDigital Library
- E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In CCS, 2002. Google ScholarDigital Library
- C. Dellarocas. The digitization of word-of-mouth: Promises and challenges of online reputation mechanism. In Management Science, 2003. Google ScholarDigital Library
- C. Dellarocas. Sanctioning reputation mechanisms in online trading environments with moral hazard. In MIT Sloan Working Paper No. 4297-03, 2004.Google Scholar
- J. Douceur. The sybil attack. In 2nd Annual IPTPS Workshop, 2002. Google ScholarDigital Library
- G. S. Fishman. Discrete-event simulation. Springer Series in Operations Research. Google ScholarDigital Library
- R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In Proceedings of the 13th World Wide Web Conference, 2004. Google ScholarDigital Library
- F. C. G. Holger Vogt, Henning Pagnia. Modular fair exchange protocols for electronic commerce. In Annual Computer Security Applications Conference, 1999. Google ScholarDigital Library
- S. Kamvar, M. Schlosser, and H. Garcia-Molina. Eigentrust: Reputation management in p2p networks. In Proceedings of the 12th WWW Conference, 2003. Google ScholarDigital Library
- S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proceedings of the 13th World Wide Web Conference, 2004. Google ScholarDigital Library
- S. Micali. Simple and fast optimistic protocols for fair electronic exchange. In The Proceedings of ACM PODC, 2003. Google ScholarDigital Library
- H. Ozbay. Introduction to feedback control theory. CRC Press Inc. Google ScholarDigital Library
- L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical report, 1998.Google Scholar
- I. Ray and I. Ray. Fair exchange in e-commerce. In ACM SIGEcomm Exchange, 2001. Google ScholarDigital Library
- M. Richardson, R. Agarwal, and P. Domingos. Trust management for the semantic web. In Proceedings of International Semantic Web Conference, 2003.Google ScholarDigital Library
- M. Srivatsa and L. Liu. Vulnerabilities and security issues in structured overlay networks: A quantitative analysis. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2004. Google ScholarDigital Library
- L. Xiong and L. Liu. A reputation-based trust model for peer-to-peer ecommerce communities. In IEEE Conference on E-Commerce (CEC'03), 2003. Google ScholarDigital Library
- B. Yu and M. P. Singh. A social mechanism of reputation management in electronic communities. In Proceedings of the 4th International Workshop on Cooperative Information Agents, 2000. Google ScholarDigital Library
Index Terms
- TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
Recommendations
Securing decentralized reputation management using TrustGuard
Special issue: Security in grid and distributed systemsReputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one another without prior knowledge or experience. One of the ...
Factors influencing continuance intention to use social network sites
Factors influencing continuance intention to use Facebook are examined.Satisfaction and perceived usefulness influence continuance intention.Enjoyment and subjective norms influence continuance intention.Habit mediates the relationship between ...
Factors affecting consumer stickiness to continue using mobile applications
According to a recent survey, more than half of all such apps are rarely been downloaded. This study thus examines consumer stickiness to continue to use mobile apps, using the post-acceptance model of information system continuance and technology ...
Comments