Dynamic, Privacy-Preserving Decentralized Reputation Systems

被引:23
作者
Clark, Michael R. [1 ,2 ]
Stewart, Kyle [1 ]
Hopkinson, Kenneth M. [1 ]
机构
[1] Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
[2] Tenet 3 LLC, Wright Patterson AFB, OH 45433 USA
关键词
Reputation systems; cryptography; multiparty computation; mobile ad-hoc networks;
D O I
10.1109/TMC.2016.2635645
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reputation systems provide an important basis for judging whether to interact with others in a networked system. Designing such systems is especially interesting in decentralized environments such as mobile ad-hoc networks, as there is no trusted authority to manage reputation feedback information. Such systems also come with significant privacy concerns, further complicating the issue. Researchers have proposed privacy-preserving decentralized reputation systems (PDRS) which ensure individual reputation information is not leaked. Instead, aggregate information is exposed. Unfortunately, in existing PDRS, when a party leaves the network, all of the reputation information they possess about other parties in the network leaves too. This is a significant problem when applying such systems to the kind of dynamic networks we see in mobile computing. In this article, we introduce dynamic, privacy-preserving reputation systems (Dyn-PDRS) to solve the problem. We enumerate the features that a reputation system must support in order to be considered a Dyn-PDRS. Furthermore, we present protocols to enable these features and describe how our protocols are composed to form a Dyn-PDRS. We present simulations of our ideas to understand how a Dyn-PDRS impacts information availability in the network, and report on an implementation of our protocols, including timing experiments.
引用
收藏
页码:2506 / 2517
页数:12
相关论文
共 30 条
  • [1] Aberer K., 2001, Proceedings of the 2001 ACM CIKM. Tenth International Conference on Information and Knowledge Management, P310, DOI 10.1145/502585.502638
  • [2] [Anonymous], 2002, P 15 BLED EL COMM C
  • [3] [Anonymous], 1987, 19 ACM STOC, DOI [DOI 10.1145/28395.28420, 10.1145/28395.28420]
  • [4] Ben-Or M., 1988, Proceedings of the Twentieth Annual ACM Symposium on Theory of Computing, P1, DOI 10.1145/62212.62213
  • [5] Bogdanov Dan, 2014, Privacy Technologies and Policy. Second Annual Privacy Forum, APF 2014. Proceedings: LNCS 8450, P30, DOI 10.1007/978-3-319-06749-0_3
  • [6] Bogetoft P., 2008, 2008068 CRYPT EPRINT
  • [7] Buchegger S., 2004, Proceedings of the Workshop on Economics of Peer-to-Peer Systems, P1
  • [8] Hybrid recommender systems: Survey and experiments
    Burke, R
    [J]. USER MODELING AND USER-ADAPTED INTERACTION, 2002, 12 (04) : 331 - 370
  • [9] Transferable Multiparty Computation With Applications to the Smart Grid
    Clark, Michael R.
    Hopkinson, Kenneth M.
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2014, 9 (09) : 1356 - 1366
  • [10] Damgard I., 2011, Report 2011/535