skip to main content
survey

Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey

Published:18 January 2022Publication History
Skip Abstract Section

Abstract

The purpose of a reputation system is to hold the users of a distributed application accountable for their behavior. The reputation of a user is computed as an aggregate of the feedback provided by fellow users in the system. Truthful feedback is clearly a prerequisite for computing a reputation score that accurately represents the behavior of a user. However, it has been observed that users can hesitate in providing truthful feedback because, for example, of fear of retaliation. Privacy-preserving reputation systems enable users to provide feedback in a private and thus uninhibited manner. In this survey, we propose analysis frameworks for privacy-preserving reputation systems. We use these analysis frameworks to review and compare the existing approaches. Emphasis is placed on blockchain-based systems as they are a recent significant development in the area. Blockchain-based privacy-preserving reputation systems have properties, such as trustlessness, transparency, and immutability, which prior systems do not have. Our analysis provides several insights and directions for future research. These include leveraging blockchain to its full potential in order to develop truly trustless systems, to achieve some important security properties, and to include defenses against common attacks that have so far not been addressed by most current systems.

REFERENCES

  1. [1] Almasoud Ahmed S., Hussain Farookh Khadeer, and Hussain Omar K.. 2020. Smart contracts for blockchain-based reputation systems: A systematic literature review. Journal of Network and Computer Applications 170 (2020), 102814.Google ScholarGoogle ScholarCross RefCross Ref
  2. [2] Anceaume Emmanuelle, Guette Gilles, Lajoie-Mazenc Paul, Prigent Nicolas, and Tong V. Viet Triem. 2013. A privacy preserving distributed reputation mechanism. In Proceedings of the 2013 IEEE International Conference on Communications. IEEE, 19511956.Google ScholarGoogle ScholarCross RefCross Ref
  3. [3] Anceaume Emmanuelle, Guette Gilles, Lajoie-Mazenc Paul, Sirvent Thomas, and Tong Valérie Viet Triem. 2014. Extending signatures of reputation. Privacy and Identity Management for Emerging Services and Technologies, IFIP Advances in Information and Communication 421 (2014), 165176.Google ScholarGoogle ScholarCross RefCross Ref
  4. [4] Androulaki Elli, Choi Seung Geol, Bellovin Steven M., and Malkin Tal. 2008. Reputation systems for anonymous networks. In Proceedings of the 8th Privacy Enhancing Technologies Symposium. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. [5] Anwar Mohd and Greer Jim. 2006. Reputation management in privacy-enhanced E-learning. In Proceedings of the 3rd Annual Scientific Conference of the LORNET Research Network.Google ScholarGoogle Scholar
  6. [6] Anwar Mohd and Greer Jim. 2008. Enabling reputation-based trust in privacy-enhanced learning systems. In Proceedings of the 9th International Conference on Intelligent Tutoring Systems. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. [7] Azad Muhammad Ajmal, Bag Samiran, and Hao Feng. 2017. M2M-REP: Reputation of machines in the internet of things. In Proceedings of the 12th International Conference on Availability, Reliability and Security. 17. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. [8] Azad Muhammad Ajmal, Bag Samiran, and Hao Feng. 2018. PrivBox: Verifiable decentralized reputation system for online marketplaces. Future Generation Computer Systems 89 (2018), 4457.Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. [9] Azad Muhammad Ajmal, Bag Samiran, Hao Feng, and Shalaginov Andrii. 2020. Decentralized self-enforcing trust management system for social Internet of Things. IEEE Internet of Things Journal 7, 4 (2020), 26902703.Google ScholarGoogle ScholarCross RefCross Ref
  10. [10] Badr Mahmoud M., Amiri Wesam Al, Fouda Mostafa M., Mahmoud Mohamed M. E. A., Aljohani Abdulah Jeza, and Alasmary Waleed. 2020. Smart parking system with privacy preservation and reputation management using blockchain. IEEE Access 8 (2020), 150823150843.Google ScholarGoogle ScholarCross RefCross Ref
  11. [11] Bag Samiran, Azad Muhammad Ajmal, and Hao Feng. 2018. A privacy-aware decentralized and personalized reputation system. Computers & Security 77 (2018), 514530.Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. [12] Bakas Alexandros, Michalas Antonis, and Ullah Amjad. 2021. (F) unctional Sifting: A privacy-preserving reputation system through multi-input functional encryption. In Proceedings of the 25th Nordic Conference on Secure IT Systems. Springer, 111126.Google ScholarGoogle ScholarCross RefCross Ref
  13. [13] Bazin Rémi, Schaub Alexander, Hasan Omar, and Brunie Lionel. 2017. Self-reported verifiable reputation with rater privacy. In Proceedings of the IFIP International Conference on Trust Management. Springer, 180195.Google ScholarGoogle ScholarCross RefCross Ref
  14. [14] Bellini Emanuele, Iraqi Youssef, and Damiani Ernesto. 2020. Blockchain-based distributed trust and reputation management systems: A survey. IEEE Access 8 (2020), 2112721151.Google ScholarGoogle ScholarCross RefCross Ref
  15. [15] Bethencourt John, Shi Elaine, and Song Dawn. 2010. Signatures of reputation: Towards trust without identity. In Proceedings of the 14th International Conference on Financial Cryptography and Data Security. 400407. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. [16] Bo Yang, Min Zhou, and Guohuan Li. 2007. A reputation system with privacy and incentive. In Proceedings of the 8th ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. [17] Braga Diego De Siqueira, Niemann Marco, Hellingrath Bernd, and Neto Fernando Buarque De Lima. 2018. Survey on computational trust and reputation models. ACM Computing Surveys 51, 5 (2018), 140. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. [18] Brangewitz Sonja, Jungmann Alexander, Petrlic Ronald, and Platenius Marie Christin. 2014. Towards a flexible and privacy-preserving reputation system for markets of composed services. In Proceedings of the 6th International Conferences on Advanced Service Computing.Google ScholarGoogle Scholar
  19. [19] Busom Nuria, Petrlic Ronald, Sebé Francesc, Sorge Christoph, and Valls Magda. 2017. A privacy-preserving reputation system with user rewards. Journal of Network and Computer Applications 100, 80 (2017), 5866. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. [20] Butun Ismail. 2017. Privacy and trust relations in internet of things from the user point of view. In Proceedings of the 2017 IEEE 7th Annual Computing and Communication Workshop and Conference. IEEE, 15.Google ScholarGoogle ScholarCross RefCross Ref
  21. [21] Butun Ismail and Österberg Patrik. 2020. A review of distributed access control for blockchain systems towards securing the Internet of Things. IEEE Access 9 (2020), 5428–5441.Google ScholarGoogle Scholar
  22. [22] Chang Junsheng, Xiao Liquan, and Xu Weixia. 2018. A survey of approaches for promoting honest recommendations in reputation systems. In Proceedings of the CCF National Conference on Computer Engineering and Technology. Springer, 179191.Google ScholarGoogle Scholar
  23. [23] Chen Liqun, Li Qin, Martin Keith M., and Ng Siaw-Lynn. 2016. Private reputation retrieval in public-A privacy-aware announcement scheme for VANETs. IET Information Security 11, 4 (2016), 204210.Google ScholarGoogle ScholarCross RefCross Ref
  24. [24] Christin Delphine, Roßkopf Christian, Hollick Matthias, Martucci Leonardo A., and Kanhere Salil S.. 2013. Incognisense: An anonymity-preserving reputation framework for participatory sensing applications. Pervasive and Mobile Computing 9, 3 (2013), 353371.Google ScholarGoogle ScholarCross RefCross Ref
  25. [25] Clark Michael R., Stewart Kyle, and Hopkinson Kenneth M.. 2016. Dynamic, privacy-preserving decentralized reputation systems. IEEE Transactions on Mobile Computing 16, 9 (2016), 25062517.Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. [26] Clauß Sebastian, Schiffner Stefan, and Kerschbaum Florian. 2013. k-Anonymous reputation. In Proceedings of the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security. ACM. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. [27] Cvrcek Daniel, Jr. Vaclav Matyas, and Patel Ahmed. 2005. Evidence processing and privacy issues in evidence-based reputation systems. Computer Standards & Interfaces 27, 5 (2005), 533545. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. [28] Dimitriou Tassos. 2021. Decentralized reputation. In Proceedings of the 11th ACM Conference on Data and Application Security and Privacy. 119130. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. [29] Dimitriou Tassos and Michalas Antonis. 2012. Multi-party trust computation in decentralized environments. In Proceedings of the 2012 5th International Conference on New Technologies, Mobility and Security. IEEE, 15.Google ScholarGoogle ScholarCross RefCross Ref
  30. [30] Dimitriou Tassos and Michalas Antonis. 2014. Multi-party trust computation in decentralized environments in the presence of malicious adversaries. Ad Hoc Networks 15 (2014), 5366. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. [31] Dingledine Roger, Mathewson Nick, and Syverson Paul. 2003. Reputation in P2P anonymity systems. In Proceedings of the Workshop on Economics of Peer-to-Peer Systems.Google ScholarGoogle Scholar
  32. [32] Dolev Shlomi, Gilboa Niv, and Kopeetsky Marina. 2010. Computing multi-party trust privately: In O (n) time units sending one (possibly large) message at a time. In Proceedings of the 2010 ACM Symposium on Applied Computing. 14601465. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. [33] Dolev Shlomi, Gilboa Niv, and Kopeetsky Marina. 2014. Efficient private multi-party computations of trust in the presence of curious and malicious users. Journal of Trust Management 1, 1 (2014), 8.Google ScholarGoogle ScholarCross RefCross Ref
  34. [34] Dou Yi, Chan Henry C. B., and Au Man Ho. 2018. A distributed trust evaluation protocol with privacy protection for intercloud. IEEE Transactions on Parallel and Distributed Systems 30, 6 (2018), 12081221.Google ScholarGoogle ScholarCross RefCross Ref
  35. [35] Gal-Oz Nurit, Gilboa Niv, and Gudes Ehud. 2010. Schemes for privately computing trust and reputation. In Proceedings of the IFIP International Conference on Trust Management. Springer, 116.Google ScholarGoogle ScholarCross RefCross Ref
  36. [36] Gal-Oz Nurit, Gudes Ehud, and Hendler Danny. 2008. A robust and knot-aware trust-based reputation model. In Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security.Google ScholarGoogle ScholarCross RefCross Ref
  37. [37] Goldreich Oded. 2004. The Foundations of Cryptography. Vol. 2, Cambridge University Press. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. [38] Goodrich Michael T. and Kerschbaum Florian. 2011. Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions. In Proceedings of the 1st ACM Conference on Data and Application Security and Privacy. 273282. Google ScholarGoogle ScholarDigital LibraryDigital Library
  39. [39] Gudes Ehud, Gal-Oz Nurit, and Grubshtein Alon. 2009. Methods for computing trust and reputation while preserving privacy. In Proceedings of the 23rd Annual IFIP WG 11.3 Working Conference on Data and Applications Security. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. [40] Guo Linke, Fang Yuguang, and Wei Lingbo. 2013. Fine-grained privacy-preserving reputation system for online social networks. In Proceedings of the 2013 IEEE/CIC International Conference on Communications in China. IEEE, 230235.Google ScholarGoogle ScholarCross RefCross Ref
  41. [41] Gurtler Stan and Goldberg Ian. 2021. SoK: Privacy-preserving reputation systems. Proceedings on Privacy Enhancing Technologies 2021, 1 (2021), 107127.Google ScholarGoogle ScholarCross RefCross Ref
  42. [42] Hao Liming, Lu Songnian, Tang Junhua, and Zhang Aixin. 2008. A low cost and reliable anonymity scheme in p2p reputation systems with trusted third parties. In Proceedings of the 2008 IEEE Global Telecommunications Conference. IEEE, 15.Google ScholarGoogle ScholarCross RefCross Ref
  43. [43] Hasan Omar, Brunie Lionel, and Bertino Elisa. 2020. Privacy Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey. Technical Report. University of Lyon, CNRS, INSA-Lyon, LIRIS, UMR5205. Retrieved from https://hal-cnrs.archives-ouvertes.fr/hal-03034994/document.Google ScholarGoogle Scholar
  44. [44] Hasan Omar, Brunie Lionel, Bertino Elisa, and Shang Ning. 2013. A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Transactions on Information Forensics and Security 8, 6 (2013), 949962. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. [45] Hendrikx Ferry, Bubendorfer Kris, and Chard Ryan. 2015. Reputation systems: A survey and taxonomy. Journal of Parallel and Distributed Computing 75, C (2015), 184197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  46. [46] Ho Erica. 2015. Why You Should Think Twice Before Trusting Airbnb Reviews. Retrieved 02 Oct., 2021 from https://mashable.com/2015/05/18/airbnb-reviews/.Google ScholarGoogle Scholar
  47. [47] Hoffman Kevin, Zage David, and Nita-Rotaru Cristina. 2009. A survey of attack and defense techniques for reputation systems. Computing Surveys 41, 4 (December 2009), 1–31. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. [48] Huang Kuan Lun, Kanhere Salil S., and Hu Wen. 2012. A privacy-preserving reputation system for participatory sensing. In Proceedings of the 37th Annual IEEE Conference on Local Computer Networks. IEEE, 1018. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. [49] Hussain Yasir, Zhiqiu Huang, Akbar Muhammad Azeem, Alsanad Ahmed, Alsanad Abeer Abdul-Aziz, Nawaz Asif, Khan Izhar Ahmed, and Khan Zaheer Ullah. 2020. Context-aware trust and reputation model for fog-based IoT. IEEE Access 8 (2020), 3162231632.Google ScholarGoogle ScholarCross RefCross Ref
  50. [50] Ismail Roslan, Boyd Colin, Josang Audun, and Russell Selwyn. 2004. Private reputation schemes for P2P systems. In Proceedings of the 2nd International Workshop on Security in Information Systems.Google ScholarGoogle Scholar
  51. [51] Ismail Roslan, Boyd Colin, Josang Audun, and Russell Selwyn. 2004. Strong privacy in reputation systems. In Proceedings of the 4th International Workshop on Information Security Applications.Google ScholarGoogle Scholar
  52. [52] Jo Hyo Jin and Choi Wonsuk. 2019. BPRF: Blockchain-based privacy-preserving reputation framework for participatory sensing systems. Plos One 14, 12 (2019), e0225688.Google ScholarGoogle ScholarCross RefCross Ref
  53. [53] Josang Audun, Ismail Roslan, and Boyd Colin. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (March 2007), 618644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  54. [54] Júnior Carlos Aparecido Serrato. 2020. A Privacy Preserving System to Consult Public Institutions Records. Master’s thesis. Universidade de Coimbra.Google ScholarGoogle Scholar
  55. [55] Kang Jiawen, Yu Rong, Huang Xumin, Wu Maoqiang, Maharjan Sabita, Xie Shengli, and Zhang Yan. 2018. Blockchain for secure and efficient data sharing in vehicular edge computing and networks. IEEE Internet of Things Journal 6, 3 (2018), 46604670.Google ScholarGoogle ScholarCross RefCross Ref
  56. [56] Kellermann Benjamin, Pötzsch Stefanie, and Steinbrecher Sandra. 2011. Privacy-respecting reputation for wiki users. In Proceedings of the IFIP International Conference on Trust Management. Springer, 223239.Google ScholarGoogle ScholarCross RefCross Ref
  57. [57] Kerschbaum Florian. 2009. A verifiable, centralized, coercion-free reputation system. In Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society. ACM, New York, NY. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. [58] Kinateder Michael and Pearson Siani. 2003. A privacy-enhanced peer-to-peer reputation system. In Proceedings of the 4th International Conference on Electronic Commerce and Web Technologies.Google ScholarGoogle ScholarCross RefCross Ref
  59. [59] Kinateder Michael, Terdic Ralf, and Rothermel Kurt. 2005. Strong pseudonymous communication for peer-to-peer reputation systems. In Proceedings of the 2005 ACM Symposium on Applied Computing. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. [60] Lajoie-Mazenc Paul, Anceaume Emmanuelle, Guette Gilles, Sirvent Thomas, and Tong Valérie Viet Triem. 2015. Efficient distributed privacy-preserving reputation mechanism handling non-monotonic ratings. Retrieved from hal.archives-ouvertes.fr.Google ScholarGoogle Scholar
  61. [61] Liu Dongxiao, Alahmadi Amal, Ni Jianbing, Lin Xiaodong, and Shen Xuemin. 2019. Anonymous reputation system for IIoT-enabled retail marketing atop PoS blockchain. IEEE Transactions on Industrial Informatics 15, 6 (2019), 35273537.Google ScholarGoogle ScholarCross RefCross Ref
  62. [62] Lu Zhaojun, Liu Wenchao, Wang Qian, Qu Gang, and Liu Zhenglin. 2018. A privacy-preserving trust model based on blockchain for VANETs. IEEE Access 6 (2018), 4565545664.Google ScholarGoogle ScholarCross RefCross Ref
  63. [63] Ma Lichuan, Liu Xuefeng, Pei Qingqi, and Xiang Yong. 2018. Privacy-preserving reputation management for edge computing enhanced mobile crowdsensing. IEEE Transactions on Services Computing 12, 5 (2018), 786799.Google ScholarGoogle ScholarCross RefCross Ref
  64. [64] Mármol Félix Gómez, Girao Joao, and Pérez Gregorio Martínez. 2010. TRIMS, a privacy-aware trust and reputation model for identity management systems. Computer Networks 54, 16 (2010), 28992912. Google ScholarGoogle ScholarDigital LibraryDigital Library
  65. [65] Mármol Félix Gómez and Pérez Gregorio Martínez. 2009. Security threats scenarios in trust and reputation models for distributed systems. Computers & Security 28, 7 (2009), 545556. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. [66] Michalas Antonis, Dimitriou Tassos, Giannetsos Thanassis, Komninos Nikos, and Prasad Neeli R.. 2012. Vulnerabilities of decentralized additive reputation systems regarding the privacy of individual votes. Wireless Personal Communications 66, 3 (2012), 559575. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. [67] Michalas Antonis and Komninos Nikos. 2014. The lord of the sense: A privacy preserving reputation system for participatory sensing applications. In Proceedings of the 2014 IEEE Symposium on Computers and Communications. IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  68. [68] Miller Nolan, Resnick Paul, and Zeckhauser Richard. 2005. Eliciting informative feedback: The peer-prediction method. Management Science 51, 9 (2005), 13591373. Google ScholarGoogle ScholarDigital LibraryDigital Library
  69. [69] Minkus Tehila and Ross Keith W.. 2014. I know what you’re buying: Privacy breaches on eBay. In Proceedings of the International Symposium on Privacy Enhancing Technologies Symposium. Springer, 164183.Google ScholarGoogle ScholarCross RefCross Ref
  70. [70] Miranda Hugo and Rodrigues Luis. 2006. A framework to provide anonymity in reputation systems. In Proceedings of the 3rd Annual International Conference on Mobile and Ubiquitous Systems: Networking & Services.Google ScholarGoogle Scholar
  71. [71] Mousa Hayam, Mokhtar Sonia Ben, Hasan Omar, Brunie Lionel, Younes Osama, and Hadhoud Mohiy. 2017. Privasense: Privacy-preserving and reputation-aware mobile participatory sensing. In Proceedings of the 14th EAI International Conference on Mobile and Ubiquitous Systems: Computing, Networking and Services. 3847. Google ScholarGoogle ScholarDigital LibraryDigital Library
  72. [72] Mulshine Molly. 2015. After a Disappointing Airbnb Stay, I Realized There’s a Major Flaw in the Review System. Retrieved 02 Oct., 2021 from https://www.businessinsider.com/why-airbnb-reviews-are-a-problem-for-the-site-2015-6.Google ScholarGoogle Scholar
  73. [73] Nithyanand Rishab and Raman Karthik. 2009. Fuzzy Privacy Preserving Peer-to-Peer Reputation Management. Cryptology ePrint Archive, Report 2009/442.Google ScholarGoogle Scholar
  74. [74] Owiyo Erick, Wang Yong, Asamoah Eunice, Kamenyi Domnic, and Obiri Isaac. 2018. Decentralized privacy preserving reputation system. In Proceedings of the 2018 IEEE 3rd International Conference on Data Science in Cyberspace. IEEE, 665672.Google ScholarGoogle ScholarCross RefCross Ref
  75. [75] Pavlov Elan, Rosenschein Jeffrey S., and Topol Zvi. 2004. Supporting privacy in decentralized additive reputation systems. In Proceedings of the 2nd International Conference on Trust Management. Oxford.Google ScholarGoogle ScholarCross RefCross Ref
  76. [76] Petrlic Ronald, Lutters Sascha, and Sorge Christoph. 2014. Privacy-preserving reputation management. In Proceedings of the 29th Annual ACM Symposium on Applied Computing. 17121718. Google ScholarGoogle ScholarDigital LibraryDigital Library
  77. [77] Resnick Paul and Zeckhauser Richard. 2002. Trust among strangers in internet transactions: Empirical analysis of eBay’s reputation system. In The Economics of the Internet and E-Commerce. Michael R. Baye (Ed.), Advances in Applied Microeconomics, Vol. 11, Emerald Group Publishing Limited, 127–157.Google ScholarGoogle Scholar
  78. [78] Ries Sebastian, Fischlin Marc, Martucci Leonardo A., and Muuhlhauser Max. 2011. Learning whom to trust in a privacy-friendly way. In Proceedings of the 2011 IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications. IEEE, 214225. Google ScholarGoogle ScholarDigital LibraryDigital Library
  79. [79] Schaub Alexander, Bazin Rémi, Hasan Omar, and Brunie Lionel. 2016. A trustless privacy-preserving reputation system. In Proceedings of the IFIP International Conference on ICT Systems Security and Privacy Protection. Springer, 398411.Google ScholarGoogle ScholarCross RefCross Ref
  80. [80] Schiedermeier Maximilian, Hasan Omar, Brunie Lionel, Mayer Tobias, and Kosch Harald. 2019. A transparent referendum protocol with immutable proceedings and verifiable outcome for trustless networks. In Proceedings of the International Conference on Complex Networks and Their Applications. Springer, 647658.Google ScholarGoogle Scholar
  81. [81] Schiffner Stefan, Clauß Sebastian, and Steinbrecher Sandra. 2009. Privacy and liveliness for reputation systems. In Proceedings of the 6th European Workshop on Public Key Infrastructures, Services and Applications. 209224. Google ScholarGoogle ScholarDigital LibraryDigital Library
  82. [82] Schiffner Stefan, Clauß Sebastian, and Steinbrecher Sandra. 2011. Privacy, liveliness and fairness for reputation. In Proceedings of the International Conference on Current Trends in Theory and Practice of Computer Science. Springer, 506519. Google ScholarGoogle ScholarDigital LibraryDigital Library
  83. [83] Shahid Affaf, Sarfraz Umair, Malik Muhammad Waseem, Iftikhar Muhammad Sohaib, Jamal Abid, and Javaid Nadeem. 2020. Blockchain-based reputation system in agri-food supply chain. In Proceedings of the 34th International Conference on Advanced Information Networking and Applications. 1221.Google ScholarGoogle ScholarCross RefCross Ref
  84. [84] Steinbrecher Sandra. 2006. Design options for privacy-respecting reputation systems within centralised internet communities. In Security and Privacy in Dynamic Environments. S. Fischer-Hübner, K. Rannenberg, L. Yngström, and S. Lindskog (Eds.), IFIP International Federation for Information Processing, Vol. 201, Springer.Google ScholarGoogle ScholarCross RefCross Ref
  85. [85] Stoll Christian, Klaaßen Lena, and Gallersdörfer Ulrich. 2019. The carbon footprint of bitcoin. Joule 3, 7 (2019), 16471661.Google ScholarGoogle ScholarCross RefCross Ref
  86. [86] Tran Ngoc Hong, Bahri Leila, and Nguyen Binh Quoc. 2017. Privacy-preserving reputation management in fully decentralized systems: Challenges and opportunities. In Proceedings of the Joint International Symposium on Artificial Intelligence and Natural Language Processing. Springer, 207215.Google ScholarGoogle Scholar
  87. [87] Rehman Muhammad Habib ur, Salah Khaled, Damiani Ernesto, and Svetinovic Davor. 2020. Towards blockchain-based reputation-aware federated learning. In Proceedings of the IEEE Conference on Computer Communications Workshops. IEEE, 183188.Google ScholarGoogle ScholarCross RefCross Ref
  88. [88] Voss Marco, Heinemann Andreas, and Muhlhauser Max. 2005. A privacy preserving reputation system for mobile information dissemination networks. In Proceedings of the 1st International Conference on Security and Privacy for Emerging Areas in Communications Networks. Google ScholarGoogle ScholarDigital LibraryDigital Library
  89. [89] Wang Xinlei, Cheng Wei, Mohapatra Prasant, and Abdelzaher Tarek. 2013. Enabling reputation and trust in privacy-preserving mobile sensing. IEEE Transactions on Mobile Computing 13, 12 (2013), 27772790.Google ScholarGoogle ScholarCross RefCross Ref
  90. [90] Xiao Liang, Ding Yuzhen, Jiang Donghua, Huang Jinhao, Wang Dongming, Li Jie, and Poor H. Vincent. 2020. A reinforcement learning and blockchain-based trust mechanism for edge networks. IEEE Transactions on Communications 68, 9 (2020), 54605470.Google ScholarGoogle ScholarCross RefCross Ref
  91. [91] Yahaya Adamu Sani, Javaid Nadeem, Khalid Rabiya, Imran Muhammad, and Naseer Nidal. 2020. A blockchain based privacy-preserving system for electric vehicles through local communication. In Proceedings of the 2020 IEEE International Conference on Communications. IEEE, 16.Google ScholarGoogle ScholarCross RefCross Ref
  92. [92] Yaseen Qussai and Jararweh Yaser. 2021. Building an intelligent global IoT reputation and malicious devices detecting system. Journal of Network and Systems Management 29, 4 (2021), 117.Google ScholarGoogle ScholarCross RefCross Ref
  93. [93] Zhang Keli, Li Zhongxian, and Yang Yixian. 2014. A reputation system preserving the privacy of feedback providers and resisting Sybil attacks. International Journal of Multimedia and Ubiquitous Engineering 9, 2 (2014), 141152.Google ScholarGoogle ScholarCross RefCross Ref
  94. [94] Zhang Mingwu, Xia Yong, Yuan Ou, and Morozov Kirill. 2016. Privacy-friendly weighted-reputation aggregation protocols against malicious adversaries in cloud services. International Journal of Communication Systems 29, 12 (2016), 18631872. Google ScholarGoogle ScholarDigital LibraryDigital Library
  95. [95] Zhang Wenjing, Luo Yuchuan, Fu Shaojing, and Xie Tao. 2020. Privacy-preserving reputation management for blockchain-based mobile crowdsensing. In Proceedings of the 2020 17th Annual IEEE International Conference on Sensing, Communication, and Networking. IEEE, 19.Google ScholarGoogle ScholarDigital LibraryDigital Library
  96. [96] Zhang Zonghua, Liu Jingwei, and Kadobayashi Youki. 2010. STARS: A simple and efficient scheme for providing transparent traceability and anonymity to reputation systems. In Data Privacy Management and Autonomous Spontaneous Security, Joaquin Garcia-Alfaro, Guillermo Navarro-Arribas, Ana Cavalli, Jean Leneutre (Eds.). Springer, 170187. Google ScholarGoogle ScholarDigital LibraryDigital Library
  97. [97] Zhao Ke, Tang Shaohua, Zhao Bowen, and Wu Yiming. 2019. Dynamic and privacy-preserving reputation management for blockchain-based mobile crowdsensing. IEEE Access 7 (2019), 7469474710.Google ScholarGoogle ScholarCross RefCross Ref
  98. [98] Zhou Zhili, Wang Meimin, Yang Ching-Nung, Fu Zhangjie, Xin Sunmin, and Wu Q. M. Jonathan. 2021. Blockchain-based decentralized reputation system in E-commerce environment. Future Generation Computer Systems 124, (2021) 155–167.Google ScholarGoogle ScholarCross RefCross Ref

Index Terms

  1. Privacy-Preserving Reputation Systems Based on Blockchain and Other Cryptographic Building Blocks: A Survey

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in

          Full Access

          • Published in

            cover image ACM Computing Surveys
            ACM Computing Surveys  Volume 55, Issue 2
            February 2023
            803 pages
            ISSN:0360-0300
            EISSN:1557-7341
            DOI:10.1145/3505209
            Issue’s Table of Contents

            Publication rights licensed to ACM. ACM acknowledges that this contribution was authored or co-authored by an employee, contractor or affiliate of a national government. As such, the Government retains a nonexclusive, royalty-free right to publish or reproduce this article, or to allow others to do so, for Government purposes only.

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 18 January 2022
            • Accepted: 1 September 2021
            • Revised: 1 August 2021
            • Received: 1 January 2021
            Published in csur Volume 55, Issue 2

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • survey
            • Refereed

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader

          Full Text

          View this article in Full Text.

          View Full Text

          HTML Format

          View this article in HTML Format .

          View HTML Format