Reputation-Based Collusion Detection with Majority of Colluders

被引:0
|
作者
Hur, Junbeom [1 ]
Guo, Mengxue [2 ]
Park, Younsoo [2 ]
Lee, Chan-Gun [2 ]
Park, Ho-Hyun [2 ]
机构
[1] Korea Univ, Seoul 02841, South Korea
[2] Chung Ang Univ, Seoul 06974, South Korea
来源
IEICE TRANSACTIONS ON INFORMATION AND SYSTEMS | 2016年 / E99D卷 / 07期
基金
新加坡国家研究基金会;
关键词
cloud computing; collusion detection; majority voting; reputation; SABOTAGE-TOLERANCE; SYSTEM;
D O I
10.1587/transinf.2015EDP7318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The reputation-based majority-voting approach is a promising solution for detecting malicious workers in a cloud system. However, this approach has a drawback in that it can detect malicious workers only when the number of colluders make up no more than half of all workers. In this paper, we simulate the behavior of a reputation-based method and mathematically analyze its accuracy. Through the analysis, we observe that, regardless of the number of colluders and their collusion probability, if the reputation value of a group is significantly different from those of other groups, it is a completely honest group. Based on the analysis result, we propose a new method for distinguishing honest workers from colluders even when the colluders make up the majority group. The proposed method constructs groups based on their reputations. A group with the significantly highest or lowest reputation value is considered a completely honest group. Otherwise, honest workers are mixed together with colluders in a group. The proposed method accurately identifies honest workers even in a mixed group by comparing each voting result one by one. The results of a security analysis and an experiment show that our method can identify honest workers much more accurately than a traditional reputation-based approach with little additional computational overhead.
引用
收藏
页码:1822 / 1835
页数:14
相关论文
共 50 条
  • [41] Reputation-based QoS Provisioning in Cloud Computing via Dirichlet Multinomial Model
    Xiao, Yanping
    Lin, Chuang
    Jiang, Yixin
    Chu, Xiaowen
    Shen, Xuemin
    2010 IEEE INTERNATIONAL CONFERENCE ON COMMUNICATIONS, 2010,
  • [42] Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol
    Nadia Moati
    Hadi Otrok
    Azzam Mourad
    Jean-Marc Robert
    Wireless Personal Communications, 2014, 75 : 1747 - 1768
  • [43] Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol
    Moati, Nadia
    Otrok, Hadi
    Mourad, Azzam
    Robert, Jean-Marc
    WIRELESS PERSONAL COMMUNICATIONS, 2014, 75 (03) : 1747 - 1768
  • [44] A Game for Task Offloading in Reputation-Based Consortium Blockchain Networks
    Wang, Die
    Jia, Yunjian
    Liang, Liang
    Dong, Mianxiong
    Ota, Kaoru
    IEEE WIRELESS COMMUNICATIONS LETTERS, 2022, 11 (07) : 1508 - 1512
  • [45] Four Puzzles of Reputation-Based CooperationContent, Process, Honesty, and Structure
    Francesca Giardini
    Daniel Balliet
    Eleanor A. Power
    Szabolcs Számadó
    Károly Takács
    Human Nature, 2022, 33 : 43 - 61
  • [46] RIPsec - Using reputation-based multilayer security to protect MANETs
    Lacey, T. H.
    Mills, R. F.
    Mullins, B. E.
    Raines, R. A.
    Oxley, M. E.
    Rogers, S. K.
    COMPUTERS & SECURITY, 2012, 31 (01) : 122 - 136
  • [47] Prisoner's dilemma game on reputation-based weighted network
    Chen, Ya-Shan
    Yang, Han-Xin
    Guo, Wen-Zhong
    Liu, Geng-Geng
    CHAOS SOLITONS & FRACTALS, 2018, 110 : 64 - 68
  • [48] A reputation-based dynamic reorganization scheme for blockchain network sharding
    Zhang, Shuhui
    Tian, Hanwen
    Wang, Lianhai
    Xu, Shujiang
    Shao, Wei
    CONNECTION SCIENCE, 2024, 36 (01)
  • [49] Reputation-based Web service orchestration in cloud computing: A survey
    Marmol, Felix Gomez
    Kuhnen, Marcus Quintino
    CONCURRENCY AND COMPUTATION-PRACTICE & EXPERIENCE, 2015, 27 (09) : 2390 - 2412
  • [50] Trust and reputation-based multi-agent recommender system
    Bedi, Punam
    Agarwal, Sumit Kumar
    Richa
    INTERNATIONAL JOURNAL OF COMPUTATIONAL SCIENCE AND ENGINEERING, 2018, 16 (04) : 350 - 362