Dynamic, Privacy-Preserving Decentralized Reputation Systems

被引:23
作者
Clark, Michael R. [1 ,2 ]
Stewart, Kyle [1 ]
Hopkinson, Kenneth M. [1 ]
机构
[1] Air Force Inst Technol, Wright Patterson AFB, OH 45433 USA
[2] Tenet 3 LLC, Wright Patterson AFB, OH 45433 USA
关键词
Reputation systems; cryptography; multiparty computation; mobile ad-hoc networks;
D O I
10.1109/TMC.2016.2635645
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
Reputation systems provide an important basis for judging whether to interact with others in a networked system. Designing such systems is especially interesting in decentralized environments such as mobile ad-hoc networks, as there is no trusted authority to manage reputation feedback information. Such systems also come with significant privacy concerns, further complicating the issue. Researchers have proposed privacy-preserving decentralized reputation systems (PDRS) which ensure individual reputation information is not leaked. Instead, aggregate information is exposed. Unfortunately, in existing PDRS, when a party leaves the network, all of the reputation information they possess about other parties in the network leaves too. This is a significant problem when applying such systems to the kind of dynamic networks we see in mobile computing. In this article, we introduce dynamic, privacy-preserving reputation systems (Dyn-PDRS) to solve the problem. We enumerate the features that a reputation system must support in order to be considered a Dyn-PDRS. Furthermore, we present protocols to enable these features and describe how our protocols are composed to form a Dyn-PDRS. We present simulations of our ideas to understand how a Dyn-PDRS impacts information availability in the network, and report on an implementation of our protocols, including timing experiments.
引用
收藏
页码:2506 / 2517
页数:12
相关论文
共 30 条
  • [11] Damgård I, 2009, LECT NOTES COMPUT SC, V5443, P160
  • [12] Damgard Ivan, 2012, Report 2012/642
  • [13] de Jong I., 2014, PYROPYTHON REMOTE OB
  • [14] Desmedt Y., 1997, TR9701 ISSE G MAS U
  • [15] Dimitriou T., 2012, New Technologies, Mobility and Security (NTMS), 2012 5th International Conference on, P1
  • [16] Dolev S., 2010, Proceedings of the 2010 ACM Symposium on Applied Computing, P1460
  • [17] Reputation-based framework for high integrity sensor networks
    Ganeriwal, Saurabh
    Balzano, Laura K.
    Srivastava, Mani B.
    [J]. ACM TRANSACTIONS ON SENSOR NETWORKS, 2008, 4 (03)
  • [18] Goldreich O., 2004, Basic Applications
  • [19] Gudes E, 2009, LECT NOTES COMPUT SC, V5645, P291, DOI 10.1007/978-3-642-03007-9_20
  • [20] A Decentralized Privacy Preserving Reputation Protocol for the Malicious Adversarial Model
    Hasan, Omar
    Brunie, Lionel
    Bertino, Elisa
    Shang, Ning
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2013, 8 (06) : 949 - 962