A Model for a Testbed for Evaluating Reputation Systems

The lack of an universal model in reputation systems makes it challenging to evaluate and compare them against attacks. While there are test beds that provide application domain specific metrics to evaluate reputation systems, in this paper we propose a model for a test bed that is application agnostic. It is a workflow of graph transformations that is generic enough to accommodate a number of reputation systems in existing literature. In doing so, we note that these reputation systems work at different stages in the workflow and as a result, a byproduct of this model is a new classification method. We also describe various attacks using our model.

[1]  Alice Cheng,et al.  Sybilproof reputation mechanisms , 2005, P2PECON '05.

[2]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[3]  R. Guha,et al.  Open Rating Systems , 2002 .

[4]  Jeffrey M. Hausdorff,et al.  Self-Organized Biological Dynamics and Nonlinear Control: Fractal mechanisms in neuronal control: human heartbeat and gait dynamics in health and disease , 2000 .

[5]  Laurent Vercouter,et al.  The Agent Reputation and Trust ( ART ) Testbed Game Description ( version 2 . 1 ) , 2006 .

[6]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[7]  Jeffrey M. Hausdorff,et al.  Physionet: Components of a New Research Resource for Complex Physiologic Signals". Circu-lation Vol , 2000 .

[8]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[9]  Brian Neil Levine,et al.  Quantifying Resistance to the Sybil Attack , 2008, Financial Cryptography.

[10]  Emin Gün Sirer,et al.  Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.

[11]  Michael Kaminsky,et al.  SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.

[12]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[13]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[14]  Kenneth Showalter,et al.  Self-Organized Biological Dynamics and Nonlinear Control: Controlling chaos in dynamical systems , 2000 .

[15]  Cai-Nicolas Ziegler,et al.  On Propagating Interpersonal Trust in Social Networks , 2009, Computing with Social Trust.

[16]  Robin Cohen,et al.  TREET: the Trust and Reputation Experimentation and Evaluation Testbed , 2010, Electron. Commer. Res..

[17]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[18]  Jennifer Golbeck,et al.  Computing and Applying Trust in Web-based Social Networks , 2005 .

[19]  Robin Cohen,et al.  Smart cheaters do prosper: defeating trust and reputation systems , 2009, AAMAS.

[20]  Raph Levien,et al.  Attack-Resistant Trust Metrics , 2009, Computing with Social Trust.

[21]  Jennifer Golbeck,et al.  Computing with Social Trust , 2008, Human-Computer Interaction Series.

[22]  Alexander Aiken,et al.  Attack-Resistant Trust Metrics for Public Key Certification , 1998, USENIX Security Symposium.