skip to main content
10.1145/1060745.1060808acmconferencesArticle/Chapter ViewAbstractPublication PageswwwConference Proceedingsconference-collections
Article

TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks

Published:10 May 2005Publication History

ABSTRACT

Reputation systems have been popular in estimating the trustworthiness and predicting the future behavior of nodes in a large-scale distributed system where nodes may transact with one another without prior knowledge or experience. One of the fundamental challenges in distributed reputation management is to understand vulnerabilities and develop mechanisms that can minimize the potential damages to a system by malicious nodes. In this paper, we identify three vulnerabilities that are detrimental to decentralized reputation management and propose TrustGuard - a safeguard framework for providing a highly dependable and yet efficient reputation system. First, we provide a dependable trust model and a set of formal methods to handle strategic malicious nodes that continuously change their behavior to gain unfair advantages in the system. Second, a transaction based reputation system must cope with the vulnerability that malicious nodes may misuse the system by flooding feedbacks with fake transactions. Third, but not least, we identify the importance of filtering out dishonest feedbacks when computing reputation-based trust of a node, including the feedbacks filed by malicious nodes through collusion. Our experiments show that, comparing with existing reputation systems, our framework is highly dependable and effective in countering malicious nodes regarding strategic oscillating behavior, flooding malevolent feedbacks with fake transactions, and dishonest feedbacks.

References

  1. K. Aberer and Z. Despotovic. Managing trust in a peer-2-peer information system. In Proceedings of the 10th International Conference of Information and Knowledge Management, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Operating Systems Design and Implementation (OSDI), 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. F. Cornelli, E. Damiani, S. D. C. di Vimercati, S. Paraboschi, and P. Samarati. Choosing reputable servents in a p2p network. In Proceedings of the 11th World Wide Web Conference, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. E. Damiani, S. Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In CCS, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Dellarocas. The digitization of word-of-mouth: Promises and challenges of online reputation mechanism. In Management Science, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. C. Dellarocas. Sanctioning reputation mechanisms in online trading environments with moral hazard. In MIT Sloan Working Paper No. 4297-03, 2004.Google ScholarGoogle Scholar
  7. J. Douceur. The sybil attack. In 2nd Annual IPTPS Workshop, 2002. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. G. S. Fishman. Discrete-event simulation. Springer Series in Operations Research. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In Proceedings of the 13th World Wide Web Conference, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. F. C. G. Holger Vogt, Henning Pagnia. Modular fair exchange protocols for electronic commerce. In Annual Computer Security Applications Conference, 1999. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. S. Kamvar, M. Schlosser, and H. Garcia-Molina. Eigentrust: Reputation management in p2p networks. In Proceedings of the 12th WWW Conference, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. S. K. Lam and J. Riedl. Shilling recommender systems for fun and profit. In Proceedings of the 13th World Wide Web Conference, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. Micali. Simple and fast optimistic protocols for fair electronic exchange. In The Proceedings of ACM PODC, 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. H. Ozbay. Introduction to feedback control theory. CRC Press Inc. Google ScholarGoogle ScholarDigital LibraryDigital Library
  15. L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical report, 1998.Google ScholarGoogle Scholar
  16. I. Ray and I. Ray. Fair exchange in e-commerce. In ACM SIGEcomm Exchange, 2001. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. M. Richardson, R. Agarwal, and P. Domingos. Trust management for the semantic web. In Proceedings of International Semantic Web Conference, 2003.Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. M. Srivatsa and L. Liu. Vulnerabilities and security issues in structured overlay networks: A quantitative analysis. In Proceedings of the Annual Computer Security Applications Conference (ACSAC), 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. L. Xiong and L. Liu. A reputation-based trust model for peer-to-peer ecommerce communities. In IEEE Conference on E-Commerce (CEC'03), 2003. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. B. Yu and M. P. Singh. A social mechanism of reputation management in electronic communities. In Proceedings of the 4th International Workshop on Cooperative Information Agents, 2000. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks

            Recommendations

            Comments

            Login options

            Check if you have access through your login credentials or your institution to get full access on this article.

            Sign in
            • Published in

              cover image ACM Conferences
              WWW '05: Proceedings of the 14th international conference on World Wide Web
              May 2005
              781 pages
              ISBN:1595930469
              DOI:10.1145/1060745

              Copyright © 2005 ACM

              Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

              Publisher

              Association for Computing Machinery

              New York, NY, United States

              Publication History

              • Published: 10 May 2005

              Permissions

              Request permissions about this article.

              Request Permissions

              Check for updates

              Qualifiers

              • Article

              Acceptance Rates

              Overall Acceptance Rate1,899of8,196submissions,23%

            PDF Format

            View or Download as a PDF file.

            PDF

            eReader

            View online with eReader.

            eReader