Reputation-Based Collusion Detection with Majority of Colluders

被引:0
|
作者
Hur, Junbeom [1 ]
Guo, Mengxue [2 ]
Park, Younsoo [2 ]
Lee, Chan-Gun [2 ]
Park, Ho-Hyun [2 ]
机构
[1] Korea Univ, Seoul 02841, South Korea
[2] Chung Ang Univ, Seoul 06974, South Korea
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2016年 / E99D卷 / 07期
基金
新加坡国家研究基金会;
关键词
cloud computing; collusion detection; majority voting; reputation; SABOTAGE-TOLERANCE; SYSTEM;
D O I
10.1587/transinf.2015EDP7318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The reputation-based majority-voting approach is a promising solution for detecting malicious workers in a cloud system. However, this approach has a drawback in that it can detect malicious workers only when the number of colluders make up no more than half of all workers. In this paper, we simulate the behavior of a reputation-based method and mathematically analyze its accuracy. Through the analysis, we observe that, regardless of the number of colluders and their collusion probability, if the reputation value of a group is significantly different from those of other groups, it is a completely honest group. Based on the analysis result, we propose a new method for distinguishing honest workers from colluders even when the colluders make up the majority group. The proposed method constructs groups based on their reputations. A group with the significantly highest or lowest reputation value is considered a completely honest group. Otherwise, honest workers are mixed together with colluders in a group. The proposed method accurately identifies honest workers even in a mixed group by comparing each voting result one by one. The results of a security analysis and an experiment show that our method can identify honest workers much more accurately than a traditional reputation-based approach with little additional computational overhead.
引用
收藏
页码:1822 / 1835
页数:14
相关论文
共 50 条
  • [1] The Effectiveness of Reputation-Based Voting for Collusion Tolerance in Large-Scale Grids
    Bendahmane, Ahmed
    Essaaidi, Mohamed
    El Moussaoui, Ahmed
    Younes, Ali
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (06) : 665 - 674
  • [2] Detection mechanism for reputation-based selfishness prevention in MANETs
    Rodriguez-Mayol, Alberto
    Gozalvez, Javier
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2013, 24 (06): : 582 - 588
  • [3] Secure Reputation-Based Authentication With Malicious Detection in VANETs
    Yang, Xu
    Zhu, Fei
    Yang, Xuechao
    Luo, Junwei
    Yi, Xun
    Ning, Jianting
    Huang, Xinyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 359 - 372
  • [4] Reputation-based trust management
    Shmatikov, Vitaly
    Talcott, Carolyn
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) : 167 - 190
  • [5] Reputation-based Scheme for Delay Tolerant Networks
    Zhang, Xi
    Wang, Xiaofei
    Liu, Anna
    Zhang, Quan
    Tang, Chaojing
    2011 INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND NETWORK TECHNOLOGY (ICCSNT), VOLS 1-4, 2012, : 974 - 978
  • [6] Fuzzy reputation-based trust model
    Tajeddine, Ayman
    Kayssi, Ayman
    Chehab, Ali
    Artail, Hassan
    APPLIED SOFT COMPUTING, 2011, 11 (01) : 345 - 355
  • [7] The psychological foundations of reputation-based cooperation
    Manrique, Hector M.
    Zeidler, Henriette
    Roberts, Gilbert
    Barclay, Pat
    Walker, Michael
    Samu, Flora
    Farina, Andrea
    Bshary, Redouan
    Raihani, Nichola
    PHILOSOPHICAL TRANSACTIONS OF THE ROYAL SOCIETY B-BIOLOGICAL SCIENCES, 2021, 376 (1838)
  • [8] A Reputation-Based Game for Tasks Allocation
    Yahyaoui, Hamdi
    ENTERPRISE INFORMATION SYSTEMS-BK, 2009, 24 : 728 - 736
  • [9] Study of Reputation-based Trust Management
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 1132 - 1135
  • [10] Reputation-Based Networked Control with Data-Corrupting Channels
    Sundaram, Shreyas
    Chang, Jian
    Krishna, K.
    Enyioha, Chinwendu
    Lee, Insup
    Pappas, George J.
    HSCC 11: PROCEEDINGS OF THE 14TH INTERNATIONAL CONFERENCE ON HYBRID SYSTEMS: COMPUTATION AND CONTROL, 2011, : 291 - 300