Privacy and Liveliness for Reputation Systems

Privacy-respecting reputation systems have been constructed based on anonymous payment systems in order to implement raters' anonymity. To the best of our knowledge, all these systems suffer from the problem of having a "final state", i. e., a system state in which users have no incentive anymore to behave honestly because they reached a maximum reputation or they can no longer be rated. Thus the reputation is in fact no longer lively. We propose a novel approach to address the problem of liveliness by the employment of negative ratings. We tie ratings to actual interactions to force users to also deposit their negative ratings at the reputation server. Otherwise they would not be able to interact any more. Additionally we enhance users' anonymity by limiting timing attacks through the use of transferable-eCash-based payment systems.

[1]  Jim Greer,et al.  Reputation Management in Privacy-Enhanced E-learning , 2006 .

[2]  Sébastien Canard,et al.  Anonymity in Transferable E-cash , 2008, ACNS.

[3]  Chrysanthos Dellarocas,et al.  The Digitization of Word-of-Mouth: Promise and Challenges of Online Feedback Mechanisms , 2003, Manag. Sci..

[4]  Sandra Steinbrecher Design Options for Privacy-Respecting Reputation Systems within Centralised Internet Communities , 2006, SEC.

[5]  Sandra Steinbrecher,et al.  Jason: A Scalable Reputation System for the Semantic Web , 2009, SEC.

[6]  Max Mühlhäuser,et al.  A Privacy Preserving Reputation System for Mobile Information Dissemination Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[7]  Hannes Federrath,et al.  Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[8]  Tal Malkin,et al.  Reputation Systems for Anonymous Networks , 2008, Privacy Enhancing Technologies.

[9]  Siani Pearson,et al.  A Privacy-Enhanced Peer-to-Peer Reputation System , 2003, EC-Web.

[10]  Sandra Steinbrecher,et al.  Enhancing Multilateral Security in and by Reputation Systems , 2008, FIDIS.

[11]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[12]  Jeffrey S. Rosenschein,et al.  Supporting Privacy in Decentralized Additive Reputation Systems , 2004, iTrust.

[13]  Lik Mui,et al.  Computational models of trust and reputation: agents, evolutionary games, and social networks , 2002 .

[14]  T. Mahler,et al.  Reputation Systems and Data Protection Law , 2007 .

[15]  L. Bygrave Data Protection Law, Approaching Its Rationale, Logic and Limits , 2002 .

[16]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[17]  Sandra Steinbrecher,et al.  Multilateral Secure Cross-Community Reputation Systems for Internet Communities , 2008, TrustBus.

[18]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[19]  Chrysanthos Dellarocas,et al.  How Often Should Reputation Mechanisms Update a Trader's Reputation Profile? , 2006, Inf. Syst. Res..

[20]  Marco Voss,et al.  Privacy Preserving Online Reputation Systems , 2004, International Information Security Workshops.

[21]  Amos Fiat,et al.  Untraceable Electronic Cash , 1990, CRYPTO.

[22]  P. Kollock The Production of Trust in Online Markets , 1999 .

[23]  Marit Hansen,et al.  Privacy-enhancing identity management , 2004, Inf. Secur. Tech. Rep..

[24]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[25]  Stefan A. Brands,et al.  A Technical Overview of Digital Credentials , 2002 .