Fine-grained Privacy-preserving Reputation System for Online Social Networks

被引:0
作者
Guo, Linke [1 ]
Fang, Yuguang [1 ]
Wei, Lingbo [2 ,3 ]
机构
[1] Univ Florida, Dept Elect & Comp Engn, Gainesville, FL 32611 USA
[2] Shanghai Jiao Tong Univ, Dept CSE, Shanghai 200030, Peoples R China
[3] Chinese Acad Sci, State Key Lab Informat Secur, Inst Informat Engn, Beijing 100893, Peoples R China
来源
2013 IEEE/CIC INTERNATIONAL CONFERENCE ON COMMUNICATIONS IN CHINA (ICCC) | 2013年
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Reputation; Zero-Knowledge Proof; Privacy; Homomorphic encryption; TRUST; SIGNATURES;
D O I
暂无
中图分类号
TM [电工技术]; TN [电子技术、通信技术];
学科分类号
0808 ; 0809 ;
摘要
Recently, Online Social Networks (OSNs) have revolutionarily changed the way people connect with each other and share information. The key to this success is reputation systems which enable strangers to establish trust based on the past experience. Existing reputation systems assess general reputation purely relying on the real identity rather than the behaviors of users, e. g., the content or comments posted. Furthermore, the general reputation cannot clearly depict the massive and distinct behaviors of one particular user. In this paper, we propose a fine-grained attribute-based reputation system which represents users' reputation in terms of attributes and enables users to rate each other's attributes instead of real identities. Our scheme verifies users' attributes used to derive the reputation, and further uses the verified information to vote on the posted attribute-associated messages, where the verification process provides authenticity of the reputation value while not revealing the actual value to entities who do not have the privilege. To the best of our knowledge, we are the first to define a fine-grained reputation value based on users' verified attributes in OSNs with privacy preservation. We also present the security analysis along with the simulation results to verify both the privacy-preservation and practicality of our proposed scheme.
引用
收藏
页码:230 / 235
页数:6
相关论文
共 17 条
[1]  
Barua M., 2011, IEEE INFOCOM 2011 - IEEE Conference on Computer Communications. Workshops, P970, DOI 10.1109/INFCOMW.2011.5928953
[2]   Ciphertext-policy attribute-based encryption [J].
Bethencourt, John ;
Sahai, Amit ;
Waters, Brent .
2007 IEEE SYMPOSIUM ON SECURITY AND PRIVACY, PROCEEDINGS, 2007, :321-+
[3]  
Bethencourt J, 2010, LECT NOTES COMPUT SC, V6052, P400, DOI 10.1007/978-3-642-14577-3_35
[4]   Short group signatures [J].
Boneh, D ;
Boyen, X ;
Shacham, H .
ADVANCES IN CRYPTOLOGY - CRYPTO 2004, PROCEEDINGS, 2004, 3152 :41-55
[5]   Identity-based encryption from the Weil pairing [J].
Boneh, D ;
Franklin, M .
SIAM JOURNAL ON COMPUTING, 2003, 32 (03) :586-615
[6]   Short signatures without random oracles and the SDH assumption in bilinear groups [J].
Boneh, Dan ;
Boyen, Xavier .
JOURNAL OF CRYPTOLOGY, 2008, 21 (02) :149-177
[7]   Self-organized public-key management for mobile ad hoc networks [J].
Capkun, S ;
Buttyán, L ;
Hubaux, JP .
IEEE TRANSACTIONS ON MOBILE COMPUTING, 2003, 2 (01) :52-64
[8]   A Survey on Trust Management for Mobile Ad Hoc Networks [J].
Cho, Jin-Hee ;
Swami, Ananthram ;
Chen, Ing-Ray .
IEEE COMMUNICATIONS SURVEYS AND TUTORIALS, 2011, 13 (04) :562-583
[9]  
Groth J, 2007, LECT NOTES COMPUT SC, V4833, P164
[10]  
Groth J, 2008, LECT NOTES COMPUT SC, V4965, P415