Formal Verification of e-Reputation Protocols

被引:1
|
作者
Kassem, Ali [2 ]
Lafourcade, Pascal [1 ]
Lakhnech, Yassine [2 ]
机构
[1] Univ Auvergne, LIMOS, Clermont Ferrand, France
[2] Univ Grenoble Alpes, VERIMAG, CNRS, St Martin Dheres, France
来源
FOUNDATIONS AND PRACTICE OF SECURITY (FPS 2014) | 2015年 / 8930卷
关键词
Reputation protocols; Formal verification; Privacy; Authentication; Verifiability; Applied pi-calculus; ProVerif; PRIVACY; SYSTEMS;
D O I
10.1007/978-3-319-17040-4_16
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reputation systems are often useful in large online communities in which most of the users are unknown to each other. They are good tools to force the users to act in truthfulness way. However, for a reputation system to work effectively users have to be willing to provide rates. In order to incentivize the users to provide honest rates, a reputation system have to ensure their privacy and anonymity. Users are also concerned about verifying the correctness of the reputation score. In the applied pi-calculus, we define a formal framework and several fundamental privacy, authentication, and verifiability properties suitable for the security analysis of e-reputation protocols. As proof of concept, using ProVerif, we analyze a simple additive decentralized reputation protocol proposed to ensure rate privacy if all users are honest.
引用
收藏
页码:247 / 261
页数:15
相关论文
共 50 条
  • [31] Formal verification for a PMQTT protocol
    Elemam, Eman
    Bahaa-Eldin, Ayman M.
    Shaker, Nabil H.
    Sobh, Mohamed
    EGYPTIAN INFORMATICS JOURNAL, 2020, 21 (03) : 169 - 182
  • [32] Formal Analysis of V2X Revocation Protocols
    Whitefield, Jorden
    Chen, Liqun
    Kargl, Frank
    Paverd, Andrew
    Schneider, Steve
    Treharne, Helen
    Wesemeyer, Stephan
    SECURITY AND TRUST MANAGEMENT (STM 2017), 2017, 10547 : 147 - 163
  • [33] Model-driven approach supporting formal verification for web service composition protocols
    Dumez, C.
    Bakhouya, M.
    Gaber, J.
    Wack, M.
    Lorenz, P.
    JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2013, 36 (04) : 1102 - 1115
  • [34] A Review of Automated Formal Verification of Ad Hoc Routing Protocols for Wireless Sensor Networks
    Chen, Zhe
    Zhang, Daqiang
    Zhu, Rongbo
    Ma, Yinxue
    Yin, Ping
    Xie, Feng
    SENSOR LETTERS, 2013, 11 (05) : 752 - 764
  • [35] Formal modeling and verification of security protocols on cloud computing systems based on UML 2.3
    Fang, Kunding
    Li, Xiaohong
    Hao, Jianye
    Feng, Zhiyong
    2016 IEEE TRUSTCOM/BIGDATASE/ISPA, 2016, : 852 - 859
  • [36] Formal Verification
    Meenakshi, B.
    RESONANCE-JOURNAL OF SCIENCE EDUCATION, 2005, 10 (05): : 26 - 38
  • [37] Formal verification
    B Meenakshi
    Resonance, 2005, 10 (5) : 26 - 38
  • [38] Formal Verification of Browser Fingerprinting and Mitigation with Inlined Reference Monitors
    Joslin, Nathan
    Phu H. Phung
    Luan Viet Nguyen
    SECURE IT SYSTEMS, NORDSEC 2024, 2025, 15396 : 303 - 321
  • [39] Formal Verification of Grid Frequency Controllers
    Mohapatra, Anurag
    Peric, Vedran S.
    Hamacher, Thomas
    2021 IEEE PES INNOVATIVE SMART GRID TECHNOLOGY EUROPE (ISGT EUROPE 2021), 2021, : 643 - 648
  • [40] FVF-AKA: A Formal Verification Framework of AKA Protocols for Multi-server IoT
    Fei, Yuan
    Zhu, Huibiao
    Yin, Jiaqi
    FORMAL ASPECTS OF COMPUTING, 2023, 35 (04)