Review of threats on trust and reputation models

被引:5
作者
Sun, Po-Ling [1 ]
Ku, Cheng-Yuan [1 ]
机构
[1] Natl Chung Cheng Univ, Dept Informat Management, Min Hsiung, Chia Yi County, Taiwan
关键词
Security threats; Trust and reputation management; Web service selection;
D O I
10.1108/IMDS-11-2013-0470
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Purpose - As the number of available services increases on the web, it becomes greatly vital in service-oriented computing to discover a trustworthy service for a service composition so as to best-fit business requirements. However, some dishonest service providers may advertise more than what they can offer and cause a great loss to users. In the last few years, trust and reputation management over web service selection mechanism becomes an emerging way of dealing with security deficiencies which are inherent in web services environment. The purpose of this paper is to review the security threats carefully and expect that the results serve as a reference guide for designing the robust trust and reputation management mechanisms. Design/methodology/approach - Based on the published literature, the paper reviews and categorizes the most critical and important security threats that apply to trust and reputation models. Findings - A detailed review and a dedicated taxonomy table are derived. As emphasized earlier, they could serve as the most important guideline for design of trust and reputation mechanisms. Originality/value - The papers work contributes to: first, understand in details what kind of security threats may cause damage to trust and reputation management mechanisms for web services selection; and second, categorize these complex security threats and then assist in planning the defense mechanisms.
引用
收藏
页码:472 / 483
页数:12
相关论文
共 24 条
  • [1] [Anonymous], J INFORM COMPUTATION
  • [2] [Anonymous], INT J WEB SERV PRACT
  • [3] [Anonymous], 2009, P 5 INT WORKSH SEC T
  • [4] [Anonymous], 27 INT C DISTR COMP
  • [5] Chang E., 2006, Trust and Reputation for Service-Oriented Environments
  • [6] CHERIAN R., 2010, INT J COMPUT APPL, V1, P79
  • [7] Techniques to support Web Service selection and consumption with QoS characteristics
    Diamadopoulou, Vassiliki
    Makris, Christos
    Panagis, Yannis
    Sakkopoulos, Evangelos
    [J]. JOURNAL OF NETWORK AND COMPUTER APPLICATIONS, 2008, 31 (02) : 108 - 130
  • [8] Dynamic security perimeters for inter-enterprise service integration
    Djordjevic, I.
    Dimitrakos, T.
    Romano, N.
    Mac Randal, D.
    Ritrovato, P.
    [J]. FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF GRID COMPUTING THEORY METHODS AND APPLICATIONS, 2007, 23 (04): : 633 - 657
  • [9] Security threats scenarios in trust and reputation models for distributed systems
    Gomez Marmol, Felix
    Martinez Perez, Gregorio
    [J]. COMPUTERS & SECURITY, 2009, 28 (07) : 545 - 556
  • [10] A Survey of Attack and Defense Techniques for Reputation Systems
    Hoffman, Kevin
    Zage, David
    Nita-Rotaru, Cristina
    [J]. ACM COMPUTING SURVEYS, 2009, 42 (01)