Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments

The advent of digital environments has generated significant benefits for businesses, organizations, governments, academia and societies in general. Today, over millions of transactions take place on the Internet. Although the widespread use of digital environments has generally provided opportunities for societies, a number of threats have limited their adoption. The de-facto standard today is for certification authorities to authenticate the identity of service providers while trust on the provided services is implied. This approach has certain shortcomings, for example, single point of failure, implied trust rather than explicit trust and others. One approach for minimizing such threats is to introduce an effective and resilient trust mechanism that is capable of determining the trustworthiness of service providers in providing their services. Determining the trustworthiness of services reduces invalid transactions in digital environments and further encourages collaborations. Evaluating trustworthiness of a service provider without any prior historical transactions (i.e. the initial transaction) pose a number of challenging issues. This article presents TIDE - a decentralized reputation trust mechanism that determines the initial trustworthiness of entities in digital environments. TIDE improves the precision of trust computation by considering raters’ feedback, number of transactions, credibility, incentive to encourage raters’ participation, strategy for updating raters’ category, and safeguards against dynamic personalities. Furthermore, TIDE classifies raters into three categories and promotes the flexibility and customization through its parameters. Evaluation of TIDE against several attack vectors demonstrates its accuracy, robustness and resilience.

[1]  Athman Bouguettaya,et al.  Evaluating Rater Credibility for Reputation Assessment of Web Services , 2007, WISE.

[2]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[3]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[4]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[5]  Georg Lausen,et al.  Spreading activation models for trust propagation , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.

[6]  Pascal Poupart,et al.  Bayesian Reputation Modeling in E-Marketplaces Sensitive to Subjectivity, Deception and Change , 2006, AAAI.

[7]  Rajeev Motwani,et al.  The PageRank Citation Ranking : Bringing Order to the Web , 1999, WWW 1999.

[8]  Svein J. Knapskog,et al.  Trust evaluation initialization using contextual information , 2011, MEDES.

[9]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[10]  Giorgos Zacharia,et al.  Trust management through reputation mechanisms , 2000, Appl. Artif. Intell..

[11]  F. Hussain Trust and Reputation for Service-oriented Environments , 2006 .

[12]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[13]  Germano Caronni,et al.  Walking the Web of trust , 2000, Proceedings IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE 2000).

[14]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[15]  Stephen Marsh,et al.  Multi-layer cognitive filtering by behavioral modeling , 2011, AAMAS.

[16]  Jordi Sabater-Mir,et al.  REGRET: reputation in gregarious societies , 2001, AGENTS '01.

[17]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[18]  Philip Robinson,et al.  PathTrust: A Trust-Based Reputation Service for Virtual Organization Formation , 2006, iTrust.

[19]  F. Nachira Towards a Network of Digital Business Ecosystems Fostering the Local Development , 2002 .

[20]  Michael Kaminsky,et al.  SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.

[21]  F. Nachira,et al.  A Network of Digital Business Ecosystems for Europe : Roots , Processes and Perspectives , 2007 .

[22]  Azadeh Iranmehr,et al.  Trust Management for Semantic Web , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[23]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[24]  George Kingsley Zipf,et al.  Human behavior and the principle of least effort , 1949 .

[25]  James A. Hendler,et al.  Inferring binary trust relationships in Web-based social networks , 2006, TOIT.

[26]  Ernesto Damiani,et al.  Managing and Sharing Servents' Reputations in P2P Systems , 2003, IEEE Trans. Knowl. Data Eng..

[27]  L. Telesca,et al.  A peer-to-peer multidimensional trust model for digital ecosystems , 2008, 2008 2nd IEEE International Conference on Digital Ecosystems and Technologies.

[28]  Paolo Avesani,et al.  Trust-Aware Collaborative Filtering for Recommender Systems , 2004, CoopIS/DOA/ODBASE.

[29]  C. Sierra,et al.  REGRET: A reputation model for gregarious societies , 2001 .

[30]  M. Frans Kaashoek,et al.  Whanau: A Sybil-proof Distributed Hash Table , 2010, NSDI.

[31]  Paul Resnick,et al.  The value of reputation on eBay: A controlled experiment , 2002 .

[32]  Li Fan,et al.  Web caching and Zipf-like distributions: evidence and implications , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).

[33]  W. Chou Inside SSL: the secure sockets layer protocol , 2002 .

[34]  Jie Zhang,et al.  Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach , 2008, Electron. Commer. Res. Appl..

[35]  Zhenhua Tian,et al.  EntityTrust: Feedback credibility-based global reputation mechanism in cooperative computing system , 2008, 2008 12th International Conference on Computer Supported Cooperative Work in Design.

[36]  T. Dillon,et al.  DEco Arch: Trust and Reputation Aware Service Brokering Architecture in Digital Ecosystems , 2007, 2007 Inaugural IEEE-IES Digital EcoSystems and Technologies Conference.

[37]  Ling Liu,et al.  TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[38]  Gayatri Swamynathan,et al.  Globally Decoupled Reputations for Large Distributed Networks , 2007, Adv. Multim..

[39]  Douglas B. Terry,et al.  Using collaborative filtering to weave an information tapestry , 1992, CACM.

[40]  Andrew G. West,et al.  An Evaluation Framework for Reputation Management Systems , 2009 .

[41]  E. Chang,et al.  Exploring the Conceptual Model of Digital Ecosystem , 2007, 2007 Second International Conference on Digital Telecommunications (ICDT'07).

[42]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[43]  J. Golbeck,et al.  FilmTrust: movie recommendations using trust in web-based social networks , 2006, CCNC 2006. 2006 3rd IEEE Consumer Communications and Networking Conference, 2006..

[44]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[45]  Rukshan Athauda,et al.  TIDE: measuring and evaluating trustworthiness and credibility of enterprises in digital ecosystem , 2011, MEDES.

[46]  Jennifer Golbeck,et al.  Using probabilistic confidence models for trust inference in Web-based social networks , 2010, TOIT.

[47]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.