skip to main content
research-article

Modeling and Evaluating a Robust Feedback-Based Reputation System for E-Commerce Platforms

Published:12 July 2017Publication History
Skip Abstract Section

Abstract

Despite the steady growth of e-commerce communities in the past two decades, little has changed in the way these communities manage reputation for building trust and for protecting their member's financial interests against fraud. As these communities mature and the defects of their reputation systems are revealed, further potential for deception against their members is created, that pushes the need for novel reputation mechanisms. Although a high volume of research works has explored the concepts of reputation and trust in e-communities, most of the proposed reputation systems target decentralized e-communities, focusing on issues related with the decentralized reputation management; they have not thus been integrated in e-commerce platforms. This work's objective is to provide an attackresilient feedback-based reputation system for modern e-commerce platforms, while minimizing the incurred financial burden of potent security schemes. Initially, we discuss a series of attacks and issues in reputation systems and study the different approaches of these problems from related works, while also considering the structural properties, defense mechanisms and policies of existing platforms. Then we present our proposition for a robust reputation system which consists of a novel reputation metric and attack prevention mechanisms. Finally, we describe the simulation framework and tool that we have implemented for thoroughly testing and evaluating the metric's resilience against attacks and present the evaluation experiments and their results. We consider the presented simulation framework as the second contribution of our article, aiming at facilitating the simulation and elaborate evaluation of reputation systems which specifically target e-commerce platforms by thoroughly presenting it, exhibiting its usage and making it available to the research community.

References

  1. Chrysanthos Dellarocas. 2003. The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Management Science 49, 10 (October 2003), 1407--1424. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Paul Resnick and Richard J. Zeckhauser. 2002. Trust among strangers in internet transactions: empirical analysis of ebay's reputation system. 2002. The Economics of the Internet and E-Commerce, Michael R. Baye (Ed.), (1st. ed.). Advances in Applied Microeconomics, Vol. 11. Emerald Group Publishing Limited, 127--157.Google ScholarGoogle Scholar
  3. Rajat Bhattacharjee and Ashish Goel. 2005. Avoiding ballot stuffing in eBay-like reputation systems. In Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-To-Peer Systems (P2PECON ’05). ACM, New York, NY, 133--137. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Chrysanthos Dellarocas. 2000. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the 2nd ACM Conference on Electronic Commerce (EC’00). ACM, New York, NY, 150--157. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Andrew Withby, Audun Jøsang, and Jadwiga Indulska. 2004. Filtering out unfair ratings in bayesian reputation systems. In Proceedings of the 2004 Workshop on Trust in Agent Societies on Autonomous Agents and Multi Agent Systems Conference (AAMAS’04). New York, NY.Google ScholarGoogle Scholar
  6. Z. Banković, J. C. Vallejo, D. Fraga, and J. M. Moya. 2011. Detecting bad-mouthing attacks on reputation systems using self-organizing maps. 2011. In Computational Intelligence in Security for Information Systems, Álvaro Herrero and Emilio Corchado (Eds.), (1st ed.). Lecture Notes in Computer Science Vol. 6694. Springer-Verlag, Berlin, 9--16. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. Shenlong Chen, Yuqing Zhang, Peng Liu, and Jingyu Feng. 2010. Coping with traitor attacks in reputation models for wireless sensor networks. In Proceedings of the 2010 IEEE Global Communications Conference (GLOBECOM’10). IEEE, 1--6.Google ScholarGoogle ScholarCross RefCross Ref
  8. Evangelos Kotsovinos, Petros Zerfos, Nischal M. Piratla, Niall Cameron, and Sachin Agarwal. 2006. Jiminy: A scalable incentive-based architecture for improving rating quality. In Proceedings of the 4th International Conference on Trust Management (iTrust’06), Ketil Stølen, William H. Winsborough, Fabio Martinelli, and Fabio Massacci (Eds.). Springer-Verlag, Berlin, 221--235. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. Michal Feldman, Christos Papadimitriou, John Chuang, and Ion Stoica. 2004b. Free-riding and whitewashing in peer-to-peer systems. In Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems (PINS’04). ACM, New York, NY, 228--236. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Audun Jøsang, Roslan Ismail, and Colin Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2 (March 2007), 618--644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Ferry Hendrikx, Kris Bubendorfer, and Ryan Chard. 2015. Reputation systems: A survey and taxonomy. Journal of Parallel and Distributed Computing (JPDC) 75, (Jan. 2015), 184--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. Paul Resnick, Richard J. Zeckhauser, John Swanson and Kate Lockwood. 2006. The value of reputation on eBay: A controlled experiment. Experimental Economics 9, 2 (June 2006), 79--101.Google ScholarGoogle ScholarCross RefCross Ref
  13. Luis Cabral and Ali Hortacsu. 2004. The dynamics of seller reputation: Theory and evidence from eBay. The National Bureau of Economic Research (NBER), Working Paper 10363, (March 2004). Cambridge, MA.Google ScholarGoogle ScholarCross RefCross Ref
  14. Eleni Koutrouli and Aphrodite Tsalgatidou. 2012. Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers. Comput. Sci. Rev. 6, 2 (May 2012), 47--70.Google ScholarGoogle ScholarCross RefCross Ref
  15. Sergio Marti and Hector Garcia-Molina. 2006. Taxonomy of trust: Categorizing P2P reputation systems. Comput. Netw. 50, 4 (March 2006), 472--484. Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Li Xiong and Ling Liu. 2003. A reputation-based trust model for peer-to-peer ecommerce communities. In Proceedings of the 4th ACM conference on Electronic commerce (EC’03). ACM, New York, NY, 228--229. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. Eric J. Friedman and Paul Resnick. 2001. The social cost of cheap pseudonyms. J Economics Manage. Strategy 10, 2 (Summer 2001), 173--199.Google ScholarGoogle Scholar
  18. Le-Hung Vu, Jie Zhang, and Karl Aberer. 2014. Using identity premium for honesty enforcement and whitewashing prevention. Comput. Intell. 30, 4 (November 2014), 771--797. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Qinyuan Feng, Yan Lindsay Sun, Ling Liu, Yafei Yang, and Yafei Dai. 2010. Voting systems with trust mechanisms in cyberspace: Vulnerabilities and defenses. IEEE Trans. Knowl. Data Eng. 22, 12 (Dec. 2010), 1766--1780. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Xin Liu, Radoslaw Nielek, Adam Wierzbicki, and Karl Aberer. 2013. Defending imitating attacks in web credibility evaluation systems. In Proceedings of the 22nd International Conference on World Wide Web (WWW’13 Companion). ACM, New York, 1115--1122. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Maryam Saeedi, Zeqian Shen and Neel Sundaresan. 2014. The Value of Feedback: An Analysis of Reputation System. Working papers series at the Social Science Research Network (SSRN). Available at: http://ssrn.com/abstract=2510090Google ScholarGoogle Scholar
  22. Chrysanthos Dellarocas and Charles A. Wood. 2008. The sound of silence in online feedback: Estimating trading risks in the presence of reporting bias. Manage. Sci. 54, 3 (March 2008), 460--476. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Mikolaj Morzy and Adam Wierzbicki. 2006. The sound of silence: Mining implicit feedbacks to compute reputation. In Proceedings of the 2nd International Conference on Internet and Network Economics (WINE’06), Paul Spirakis, Marios Mavronicolas, and Spyros Kontogiannis (Eds.). Springer-Verlag, Berlin, 365--376. Google ScholarGoogle ScholarDigital LibraryDigital Library
  24. Nolan H. Miller, Paul Resnick, and Richard J. Zeckhauser. 2002. Eliciting Honest Feedback in Electronic Markets. John F. Kennedy School of Government Faculty (KSG), Working Paper Series RWP02-039, (Aug. 2002). Cambridge, MA.Google ScholarGoogle Scholar
  25. Giorgos Zacharia and Pattie Maes. 2000. Trust management through reputation mechanisms. Appl. Artif. Intell. 14, 9 (Oct. 2000), 881--907.Google ScholarGoogle ScholarCross RefCross Ref
  26. Mikolaj Morzy. 2008. New Algorithms for Mining the Reputation of Participants of Online Auctions. Algorithmica 52, 1 (Sep. 2008), 95--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  27. Yannis Bakos and Chrysanthos Dellarocas. 2011. Cooperation without enforcement? A comparative analysis of litigation and online reputation as quality assurance mechanisms. Manage. Sci. 57, 11 (Nov. 2011), 1944--1962. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. Luis Cabral and Ali Hortacsu. 2010. The dynamics of seller reputation: evidence from eBay. J. Indust. Econ. 58, 1 (March 2010), 54--78.Google ScholarGoogle ScholarCross RefCross Ref
  29. Zhiyuan Su, Ling Liu, Mingchu Li, Xinxin Fan, and Yang Zhou. 2015. Reliable and resilient trust management in distributed service provision networks. ACM Trans. Web 9, 3, Article 14 (June 2015), 37 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  30. Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. 2003. The eigentrust algorithm for reputation management in P2P networks. In Proceedings of the 12th International Conference on World Wide Web (WWW’03). ACM, New York, NY, 640--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Adam Wierzbicki, Tomasz Kaszuba, Radoslaw Nielek, Paulina Adamska, and Anwitaman Datta. 2013. Improving computational trust representation based on Internet auction traces. Decis. Support Syst. 54, 2 (Jan. 2013), 929--940. Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. Ernesto Damiani, Sabrina De Capitani di Vimercati, Stefano Paraboschi, and Pierangela Samarati. 2003. Managing and sharing servents’ reputations in P2P systems. IEEE Trans. Knowl. Data Eng. 15, 4 (July 2003), 840--854. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Michal Feldman, Kevin Lai, Ion Stoica, and John Chuang. 2004a. Robust incentive techniques for peer-to-peer networks. In Proceedings of the 5th ACM Conference on Electronic Commerce (EC’04). ACM, New York, NY, 102--111. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Kevin Lai, Michal Feldman, Ion Stoica, and John Chuang. 2003. Incentives for cooperation in peer-to-peer networks. In Proceedings of the 2003 Workshop on Economics of Peer-to-Peer Systems.Google ScholarGoogle Scholar
  35. Li Xiong and Ling Liu. 2004. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 7 (July 2004), 843--857. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. Radek Tahal. 2014. Loyalty programs in E-commerce and their perception by the young adult internet population. Cent. Eur. Bus. Rev. (CEBR) 3, 2 (June 2014), 7--13. DOI:http://cebr.vse.cz/cebr/article/download/133/88Google ScholarGoogle Scholar
  37. Mohini Singh. 2002. E-services and their role in B2C e-commerce. J. Serv. Theor. Pract. 12, 6 (Dec. 2002), 434--446.Google ScholarGoogle Scholar
  38. Maizatul Akmar Ismail and Nader Sohrabi Safa. 2014. Trust, satisfaction, and loyalty formation in electronic commerce. J. Ind. Intell. Inf. 2, 3 (Sep. 2014), 228--232.Google ScholarGoogle Scholar
  39. Kevin Hoffman, David Zage, and Cristina Nita-Rotaru. 2009. A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42, 1, Article 1 (Dec. 2009), 31 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  40. Tobias J. Klein, Christian Lambertz, Giancarlo Spagnolo, and Konrad O. Stahl. 2009. The actual structure of eBay's feedback mechanism and early evidence on the effect of recent changes. Int. J. Electron. Bus. (IJEB) 7, 3 (Jan. 2009), 301--320.Google ScholarGoogle Scholar
  41. Félix Gómez Mármol and Gregorio Martínez Pérez. 2010. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems. Comput. Stand. Interfaces 32, 4 (June 2010), 185--196. Google ScholarGoogle ScholarDigital LibraryDigital Library
  42. Eleni Koutrouli and Aphrodite Tsalgatidou. 2015. Reputation systems evaluation survey. ACM Comput. Surv. (CSUR) 48, 3, Article 35 (December 2015), 28 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  43. Brent Lagesse. 2012. Analytical evaluation of P2P reputation systems. Int. J. Commun. Networks Distrib. Syst. 9, 1/2 (July 2012), 82--96. Google ScholarGoogle ScholarDigital LibraryDigital Library
  44. Christopher J. Hazard and Munindar P. Singh. 2013. Macau: A basis for evaluating reputation systems. In Proceedings of the 23rd International Joint Conference on Artificial Intelligence (IJCAI’13), Francesca Rossi (Ed.). AAAI Press 191--197. Google ScholarGoogle ScholarDigital LibraryDigital Library
  45. Alessandro Celestini, Rocco De Nicola, and Francesco Tiezzi. 2013. Network-aware evaluation environment for reputation systems. 2013. IFIP Advances in Information and Communication Technology, Carmen Fernández-Gago, Fabio Martinelli, Siani Pearson, Isaac Agudo (Eds.), (1st. ed.). Trust Management VII Vol. 401. Springer, Berlin, 231--238.Google ScholarGoogle Scholar
  46. Andrew G. West, Sampath Kannan, Insup Lee, and Oleg Sokolsky. 2009. An evaluation framework for reputation management systems. 2009. Trust Modeling and Management in Digital Environments: From Social Concept to System Development, Zheng Yan (Ed.). 282--308.Google ScholarGoogle Scholar
  47. Karen K. Fullam, Tomas Klos, Guillaume Muller, Jordi Sabater-Mir, K. Suzanne Barber, and Laurent Vercouter. 2006. The agent reputation and trust (ART) testbed. In Proceedings of the 4th International Conference on Trust Management (iTrust’06), Ketil Stølen, William H. Winsborough, Fabio Martinelli, and Fabio Massacci (Eds.). Springer-Verlag, Berlin, 439--442. Google ScholarGoogle ScholarDigital LibraryDigital Library
  48. Félix Gómez Mármol and Gregorio Martínez Pérez. 2009. TRMSim-WSN, trust and reputation models simulator for wireless sensor networks. In Proceedings of the 2009 IEEE International Conference on Communications (ICC’09). IEEE Press, 915--919. Google ScholarGoogle ScholarDigital LibraryDigital Library
  49. Reid Kerr and Robin Cohen. 2010. TREET: The trust and reputation experimentation and evaluation testbed. Electronic Commerce Research 10, 3--4 (Dec. 2010), 271--290. Google ScholarGoogle ScholarDigital LibraryDigital Library
  50. Jennifer Brown and John Morgan. 2006. Reputation in online auctions: The market for trust. California Manag. Rev. 49, 1 (Fall 2006), 61--82.Google ScholarGoogle ScholarCross RefCross Ref
  51. Geng Tian, Hui Peng, Chao Sun, and Yijun Li. 2012. Analysis of reputation speculation behavior in china's C2C E-commerce market. Journal of Computers (JCP) 7, 12 (Dec. 2012) 2971--2978.Google ScholarGoogle Scholar
  52. Dan Cosley, Shyong K. Lam, Istvan Albert, Joseph A. Konstan, and John Riedl. 2003. Is seeing believing?: How recommender system interfaces affect users’ opinions. In Proceedings of the SIGCHI Conference on Human Factors in Computing Systems (CHI’03). ACM, New York, NY, USA, 585--592. Google ScholarGoogle ScholarDigital LibraryDigital Library
  53. Federico Dini and Giancarlo Spagnolo. 2009. Buying reputation on eBay: Do recent changes help? Int. J. Electronic Business (IJEB), 7, 6 (Jan. 2009), 581--598.Google ScholarGoogle Scholar
  54. Mudhakar Srivatsa, Li Xiong, and Ling Liu. 2005. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the 14th International Conference on World Wide Web (WWW’05). ACM, New York, NY, 422--431. Google ScholarGoogle ScholarDigital LibraryDigital Library
  55. Yan Sun, Zhu Han, Wei Yu, and K. J. Ray Liu. 2006. Attacks on trust evaluation in distributed networks. In Proceedings of the 40th annual Conference On Information Science and Systems (CISS’06). IEEE, 1461--1466.Google ScholarGoogle Scholar
  56. Audun Jøsang and Roslan Ismail. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference. DOI:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.332.8014Google ScholarGoogle Scholar
  57. Chrysanthos Dellarocas. 2001. Analyzing the economic efficiency of eBay-like online reputation reporting mechanisms. In Proceedings of the 3rd ACM Conference on Electronic Commerce (EC’01). ACM, New York, NY, 171--179. Google ScholarGoogle ScholarDigital LibraryDigital Library
  58. Anupam Das, Nikita Borisov, Prateek Mittal, and Matthew Caesar. 2014. Re3: Relay reliability reputation for anonymity systems. In Proceedings of the 9th ACM Symposium on Information, Computer and Communications Security (ASIA CCS’14). ACM, New York, NY, 63--74. Google ScholarGoogle ScholarDigital LibraryDigital Library
  59. Zaobin Gan, Yijie Li, Guoqiang Xiao, and Dengwen Wei. 2008. A novel reputation computing model for mobile agent-based e-commerce systems. In Proceedings of the 2008 International Conference on Information Security and Assurance (ISA 2008). IEEE, 253--260. Google ScholarGoogle ScholarDigital LibraryDigital Library
  60. Claudiu Duma, Nahid Shahmehri, and Germano Caronni. 2005. Dynamic trust metrics for peer-to-peer systems. In Proceedings of the 2nd International Workshop on P2P Data Management, Security and Trust (PDMST ’05). 776--781.Google ScholarGoogle ScholarCross RefCross Ref
  61. Theodora Dariotaki and Alex Delis. 2004. Detecting reputation variations in P2P networks. In Proceedings of the 6th Workshop on Distributed Data and Structures (WDAS’04). DOI:http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.173.989Google ScholarGoogle Scholar
  62. Yan Sun and Yuhong Liu. 2012. Security of online reputation systems: The evolution of attacks and defenses. IEEE Signal Process. Mag. 29, 2 (March 2012), 87--97.Google ScholarGoogle Scholar
  63. Rida A. Bazzi and Goran Konjevod. 2005. On the establishment of distinct identities in overlay networks. In Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing (PODC’05). ACM, New York, NY, 312--320. Google ScholarGoogle ScholarDigital LibraryDigital Library
  64. Chrysanthos Dellarocas. 2003. Efficiency and robustness of binary feedback mechanisms in trading environments with moral hazard. Sloan School of Management, Massachusetts Institute of Technology (MIT), Center for eBusiness Paper 170, (Jan. 2003).Google ScholarGoogle Scholar
  65. Javier Carbo Rubiera, Jose M. Molina Lopez, and Jorge Davila Muro. 2001. A fuzzy model of reputation in multi-agent systems. In Proceedings of the 5th International Conference on Autonomous Agents (AGENTS’01). ACM, New York, NY, 25--26. Google ScholarGoogle ScholarDigital LibraryDigital Library
  66. Xin Liu, Radoslaw Nielek, Paulina Adamska, Adam Wierzbicki, and Karl Aberer. 2015. Towards a highly effective and robust Web credibility evaluation system. Decis. Support Syst. 79, C (Nov. 2015), 99--108. Google ScholarGoogle ScholarDigital LibraryDigital Library
  67. Radoslaw Nielek, Aleksander Wawer, and Adam Wierzbicki. 2010. Spiral of hatred: Social effects in Internet auctions. Between informativity and emotion. Electron. Commer. Res. 10, 3 (Dec. 2010). Google ScholarGoogle ScholarDigital LibraryDigital Library
  68. Roslan Ismail, Colin Boyd, Audun Jøsang, and Selywn Russel. 2003. Strong privacy in reputation systems. In Proceedings of the 4th International Workshop on Information Security Applications (WISA’03).Google ScholarGoogle Scholar
  69. Jordi Sabater-Mir and Mario Paolucci. 2007. On representation and aggregation of social evaluations in computational trust and reputation models. Int. J. Approx. Reasoning 46, 3 (Dec. 2007), 458--483. Google ScholarGoogle ScholarDigital LibraryDigital Library
  70. RSSceSim - Reputation System Scenario Simulator. 2017. Retrieved from https://sourceforge.net/projects/rsscesim/.Google ScholarGoogle Scholar

Index Terms

  1. Modeling and Evaluating a Robust Feedback-Based Reputation System for E-Commerce Platforms

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image ACM Transactions on the Web
        ACM Transactions on the Web  Volume 11, Issue 3
        August 2017
        209 pages
        ISSN:1559-1131
        EISSN:1559-114X
        DOI:10.1145/3113174
        Issue’s Table of Contents

        Copyright © 2017 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 12 July 2017
        • Revised: 1 February 2017
        • Accepted: 1 February 2017
        • Received: 1 January 2016
        Published in tweb Volume 11, Issue 3

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • research-article
        • Research
        • Refereed

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader