An anti-attack model for centralized C2C reputation evaluation agent

被引:0
作者
Ji Shujuan [1 ,2 ]
Liu Baohua [2 ]
Zou Benfa [2 ]
Zhang Chunjin [3 ]
机构
[1] Shandong Univ Sci & Technol, Shandong Prov Key Lab Smart Mine Informat Technol, Qingdao, Peoples R China
[2] Shandong Univ Sci & Technol, Coll Informat Sci & Technol, Qingdao, Peoples R China
[3] Shandong Univ Sci & Technol, Network Informat Ctr, Qingdao, Peoples R China
来源
2016 IEEE INTERNATIONAL CONFERENCE ON AGENTS (IEEE ICA 2016) | 2016年
关键词
Electronic commerce; Customer to Customer electronic commerce mode; Reputation; Reputation evaluation model; Agent;
D O I
10.1109/ICA.2016.21
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
With the rapid development of electronic commerce, reputation attacks in C2C electronic commerce mode become more and more serious. Under the background of streaming big data, the research about effective real-time anti-attack reputation evaluation model becomes one of the four computational challenges in electronic commerce. Without considering any trustable reference standard, this paper presents a robust reputation evaluation model for the centralized evaluation agent. Based on traditional cumulative reputation evaluation method, this model fuses some incentive compatibility mechanisms and the factors such as average reputation of rated industry, rating deviations of the rater and the ratee, trading price, time discounting of ratings, the number of repeat purchases, and rater's reputation. Simulation results show that the model given in this paper can outperform existing centralized evaluation models in defensing common attacks such as alwaysUnfair, Camouflage, Whitewashing, Sybil, and Collusions.
引用
收藏
页码:63 / 69
页数:7
相关论文
共 23 条
[1]  
Bhattacharjee Rajat., 2005, P2PECON, P133, DOI DOI 10.1145/1080192.1080203
[2]   Computational Challenges in E-Commerce [J].
Feigenbaum, Joan ;
Parkes, David C. ;
Pennock, David M. .
COMMUNICATIONS OF THE ACM, 2009, 52 (01) :70-74
[3]  
[郭洪海 GUO Honghai], 2009, [管理学报, Chinese Journal of Management], V6, P1056
[4]  
Guoqiang Tian, 2003, CHINA EC Q, V2, P271
[5]   A Survey of Attack and Defense Techniques for Reputation Systems [J].
Hoffman, Kevin ;
Zage, David ;
Nita-Rotaru, Cristina .
ACM COMPUTING SURVEYS, 2009, 42 (01)
[6]  
Josang Audun., 2009, Proceedings of the 5th International Workshop on Security and Trust Management (SMT'09), P1
[7]  
Josang Audun., 2012, Trust Management VI - 6th IFIP WG 11.11 International Conference, IFIPTM 2012, Surat, India, May 21-25, 2012. Proceedings, V374, P253, DOI [10.1007/978-3-642-29852-3_21PavlouPA, DOI 10.1007/978-3-642-29852-3_21]
[8]  
Jurca R, 2007, EC'07: PROCEEDINGS OF THE EIGHTH ANNUAL CONFERENCE ON ELECTRONIC COMMERCE, P200
[9]   Unsteady Flows of a Generalized Fractional Burgers' Fluid between Two Side Walls Perpendicular to a Plate [J].
Kang, Jianhong ;
Liu, Yingke ;
Xia, Tongqiang .
ADVANCES IN MATHEMATICAL PHYSICS, 2015, 2015
[10]  
Kerr Reid., 2009, Proceedings of The 8th International Conference on Autonomous Agents and Multiagent Systems, V2, P993