Privacy Preserving Online Reputation Systems

Reputation systems evolve as a mechanism to build trust in dynamic electronic societies. However, they are also a danger to privacy because they monitor a user’ s behavior. At the same time reputation systems offer the possibility to limit the information a user has to give away during a transaction to ensure accountablity.Privacy preserving reputation systems solve the conflict between anonymity and accountability. This paper examines privacy problems of current reputation systems and classifies them with respect to the location of stored information. Requirements for reputation systems that provide privacy protection are derived from this analysis. As result a new privacy preserving online reputation system is presented that uses locally stored coins to represent reputation information.

[1]  Stéphane Bressan,et al.  Efficient Distributed Reputation Scheme for Peer-to-Peer Systems , 2003, Human.Society@Internet 2003.

[2]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[3]  Joseph S. Fulda,et al.  Reputation as property, and its relation to privacy , 2001, CSOC.

[4]  Winfried Lamersdorf,et al.  Transactional Security for a Distributed Reputation Management System , 2002, EC-Web.

[5]  Ian Goldberg,et al.  A pseudonymous communications infrastructure for the internet , 2000 .

[6]  Stefan A. Brands,et al.  Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .

[7]  Siani Pearson,et al.  A Privacy-Enhanced Peer-to-Peer Reputation System , 2003, EC-Web.

[8]  Mikko Tarkiainen,et al.  Privacy Enhancing Service Architectures , 2002, Privacy Enhancing Technologies.

[9]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[10]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[11]  D. B. Davis,et al.  Sun Microsystems Inc. , 1993 .

[12]  Mostafa H. Ammar,et al.  A reputation system for peer-to-peer networks , 2003, NOSSDAV '03.

[13]  Ernesto Damiani,et al.  Choosing reputable servents in a P2P network , 2002, WWW.

[14]  Nick Mathewson,et al.  Reputation in privacy enhancing technologies , 2002, CFP '02.

[15]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[16]  David Chaum,et al.  Security without identification: transaction systems to make big brother obsolete , 1985, CACM.

[17]  Andreas Pfitzmann,et al.  Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[18]  Emin Gün Sirer,et al.  KARMA : A Secure Economic Framework for Peer-to-Peer Resource Sharing , 2003 .

[19]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[20]  L. Mui,et al.  A computational model of trust and reputation , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.

[21]  Lik Mui,et al.  Notions of reputation in multi-agents systems: a review , 2002, AAMAS '02.

[22]  J. Wooders,et al.  Reputation in Auctions: Theory, and Evidence from Ebay , 2006 .

[23]  Naren Ramakrishnan,et al.  Privacy Risks in Recommender Systems , 2001, IEEE Internet Comput..

[24]  Christian Grothoff,et al.  An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks , 2005 .

[25]  Hannes Federrath,et al.  Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.