A reputation system preserving the privacy of feedback providers and resisting sybil attacks

被引:0
作者
Zhang, Keli [1 ]
Li, Zhongxian [1 ,2 ]
Yang, Yixian [1 ]
机构
[1] Information Security Center, Beijing University of Posts and Telecommunications, 100876, Beijing
[2] Nation Cybernet Security Limited, 100080, Beijing
来源
International Journal of Multimedia and Ubiquitous Engineering | 2014年 / 9卷 / 02期
关键词
Anonymity; Privacy; Pseudonym; Reputation; Sybil attack;
D O I
10.14257/ijmue.2014.9.2.14
中图分类号
学科分类号
摘要
Users hesitate to submit negative feedback in reputation systems due to the fear of retaliation from the recipient user. A Preserving reputation system which does not require continuous online communication with a trusted third party is proposed, Peers in this trust model use a verifiable random function, non-interactive zero-knowledge and ratee's transaction identities, to generate evaluation tags, so as to anonymously evaluate the transaction objects and hide the identity of the transaction process. Analysis shows the scheme guarantees the privacy of feedback providers resists the inherent Sybil attacks in preserving reputation system and evidently improves the accuracy of trust accumulated value compared with existing trust models. © 2014 SERSC.
引用
收藏
页码:141 / 152
页数:11
相关论文
共 19 条
[1]  
Resnick P., Zeckhauser R., Trust among strangers in internet transactions, Advances in Applied Microeconomics, 11, pp. 127-157, (2002)
[2]  
Hasan O., Brunie L., Bertino E., Preserving privacy of feedback providers in decentralized reputation systems, Computers & Security, (2011)
[3]  
Hasan O., Brunie L., Bertino E., A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model, (2012)
[4]  
Dimitriou T., Michalas A., Multi-Party Trust Computation in Decentralized Environments, New Technologies, pp. 1-5, (2012)
[5]  
Goodrich M.T., Kerschbaum F., Privacy-enhanced reputation-feedback methods to reduce feedback extortion in online auctions, CODASPY '11 Proceedings of the first ACM conference on Data and application security and privacy, pp. 273-282, (2011)
[6]  
Schiffner S., Clauss S., Steinbrecher S., Privacy, liveliness and fairness for reputation, (2011)
[7]  
Hoffman K., Zage D., Nita-Rotaru C., A Survey of Attack and Defense Techniques for Reputation Systems (to appear), ACM Computing Surveys, 42, 1, (2009)
[8]  
Martucci L.A., Ries S., Muhlhauser M., Sybil-Free Pseudonyms, Privacy and Trust: Identity Management in the Internet of Services, Journal of Information Processing, 19, 1, pp. 1-15, (2011)
[9]  
Gupta M., Judge P., Ammar M., A reputation system for peer-to-peer networks, (2003)
[10]  
Voss M., Heinemann A., Muhlhauser M., A privacy preserving reputation system for mobile information dissemination networks, In SECURECOMM '05: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), pp. 171-181, (2005)