A mechanism for detecting dishonest recommendation in indirect trust computation

Indirect trust computation based on recommendations form an important component in trust-based access control models for pervasive environment. It can provide the service provider the confidence to interact with unknown service requesters. However, recommendation-based indirect trust computation is vulnerable to various types of attacks. This paper proposes a defense mechanism for filtering out dishonest recommendations based on a measure of dissimilarity function between the two subsets. A subset of recommendations with the highest measure of dissimilarity is considered as a set of dishonest recommendations. To analyze the effectiveness of the proposed approach, we have simulated three inherent attack scenarios for recommendation models (bad mouthing, ballot stuffing, and random opinion attack). The simulation results show that the proposed approach can effectively filter out the dishonest recommendations based on the majority rule. A comparison between the exiting schemes and our proposed approach is also given.

[1]  Kai Hwang,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[2]  Iraklis Varlamis,et al.  A Study on Social Network Metrics and Their Application in Trust Networks , 2010, 2010 International Conference on Advances in Social Networks Analysis and Mining.

[3]  Jie Zhang,et al.  Detecting Imprudence of 'Reliable' Sellers in Online Auction Sites , 2012, 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications.

[4]  Michael R. Lyu,et al.  Learning to recommend with social trust ensemble , 2009, SIGIR.

[5]  Athman Bouguettaya,et al.  Evaluating Rater Credibility for Reputation Assessment of Web Services , 2007, WISE.

[6]  Paddy Nixon,et al.  A formal model of trust lifecycle management , 2003 .

[7]  Jaswinder Pal Singh,et al.  Computing and using reputations for internet ratings , 2001, EC '01.

[8]  Paddy Nixon,et al.  Trusting Collaboration in Global Computing Systems , 2003, iTrust.

[9]  Prabhakar Raghavan,et al.  A Linear Method for Deviation Detection in Large Databases , 1996, KDD.

[10]  Isaac Woungang,et al.  Trust management in ubiquitous computing: A Bayesian approach , 2011, Comput. Commun..

[11]  Jennifer Golbeck,et al.  Investigating interactions of trust and interest similarity , 2007, Decis. Support Syst..

[12]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[13]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[14]  Celeste Campo,et al.  Managing Ad-Hoc Trust Relationships in Pervasive Computing Environments , 2004 .

[15]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[16]  Chunyan Miao,et al.  An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies , 2006, IEICE Trans. Inf. Syst..

[17]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[18]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.

[19]  Andrés Marín López,et al.  Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.

[20]  B. Matthews Comparison of the predicted and observed secondary structure of T4 phage lysozyme. , 1975, Biochimica et biophysica acta.

[21]  Mohsen Afsharchi,et al.  A Social Network-Based Approach to Expert Recommendation System , 2012, HAIS.

[22]  Mani B. Srivastava,et al.  Reputation-based framework for high integrity sensor networks , 2004, SASN '04.

[23]  Naima Iltaf,et al.  Modeling interaction using trust and recommendation in ubiquitous computing environment , 2012, EURASIP J. Wirel. Commun. Netw..

[24]  Jean Bacon,et al.  Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[25]  Xia Feng,et al.  New Methods for Deviation-Based Outlier Detection in Large Database , 2009, 2009 Sixth International Conference on Fuzzy Systems and Knowledge Discovery.

[26]  Chunyan Miao,et al.  AN INTEGRATED CLUSTERING‐BASED APPROACH TO FILTERING UNFAIR MULTI‐NOMINAL TESTIMONIES , 2014, Comput. Intell..

[27]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[28]  Sheikh Iqbal Ahamed,et al.  Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..

[29]  Tao Sun,et al.  Probabilistic Trust Management in Pervasive Computing , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.