Preserving privacy of feedback providers in decentralized reputation systems

Reputation systems make the users of a distributed application accountable for their behavior. The reputation of a user is computed as an aggregate of the feedback provided by other users in the system. Truthful feedback is clearly a prerequisite for computing a reputation score that accurately represents the behavior of a user. However, it has been observed that users often hesitate in providing truthful feedback, mainly due to the fear of retaliation. We present a decentralized privacy preserving reputation protocol that enables users to provide feedback in a private and thus uninhibited manner. The protocol has linear message complexity, which is an improvement over comparable decentralized reputation protocols. Moreover, the protocol allows users to quantify and maximize the probability that their privacy will be preserved.

[1]  Elisa Bertino,et al.  Efficient privacy preserving reputation protocols inspired by secure sum , 2010, 2010 Eighth International Conference on Privacy, Security and Trust.

[2]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[3]  David Chaum,et al.  Blind Signatures for Untraceable Payments , 1982, CRYPTO.

[4]  Ehud Gudes,et al.  A Robust and Knot-Aware Trust-Based Reputation Model , 2008, IFIPTM.

[5]  S. Buchegger,et al.  A Robust Reputation System for Peer-to-Peer and Mobile Ad-hoc Networks , 2004 .

[6]  Jacques Stern,et al.  Practical multi-candidate election system , 2001, PODC '01.

[7]  Ehud Gudes,et al.  Methods for Computing Trust and Reputation While Preserving Privacy , 2009, DBSec.

[8]  Jussara M. Almeida,et al.  Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).

[9]  Elisa Bertino,et al.  Elimination of Subjectivity from Trust Recommendation , 2009, IFIPTM.

[10]  Pascal Paillier,et al.  Public-Key Cryptosystems Based on Composite Degree Residuosity Classes , 1999, EUROCRYPT.

[11]  Audun Jøsang,et al.  Private Reputation Schemes for P2P systems , 2004, WOSIS.

[12]  Florian Kerschbaum,et al.  A verifiable, centralized, coercion-free reputation system , 2009, WPES '09.

[13]  Michael Wiener,et al.  Advances in Cryptology — CRYPTO’ 99 , 1999 .

[14]  Diego Gambetta Trust : making and breaking cooperative relations , 1992 .

[15]  Jeffrey S. Rosenschein,et al.  Supporting Privacy in Decentralized Additive Reputation Systems , 2004, iTrust.

[16]  C. Costa,et al.  Reputation Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems , 2007 .

[17]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[18]  Roslan Ismail,et al.  Strong Privacy in Reputation Systems , 2003 .

[19]  Mike Burmester,et al.  LARS: a locally aware reputation system for mobile ad hoc networks , 2006, ACM-SE 44.

[20]  Yang Bo,et al.  A Reputation System with Privacy and Incentive , 2007, Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD 2007).

[21]  Jean-Yves Le Boudec,et al.  Performance analysis of the CONFIDANT protocol , 2002, MobiHoc '02.

[22]  Tal Malkin,et al.  Reputation Systems for Anonymous Networks , 2008, Privacy Enhancing Technologies.

[23]  Max Mühlhäuser,et al.  A Privacy Preserving Reputation System for Mobile Information Dissemination Networks , 2005, First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05).

[24]  Ernesto Damiani,et al.  Privacy Preserving Reputation Systems for Decentralized Environments , 2010 .

[25]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[26]  Chris Clifton,et al.  Tools for privacy preserving distributed data mining , 2002, SKDD.

[27]  Prateek Mittal,et al.  X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.

[28]  Lan Yu A reputation system for BitTorrent peer-to-peer file-sharing networks , 2006 .