Flow-Based Reputation: More than Just Ranking

The last years have seen a growing interest in collaborative systems like electronic marketplaces and P2P file sharing systems where people are intended to interact with other people. Those systems, however, are subject to security and operational risks because of their open and distributed nature. Reputation systems provide a mechanism to reduce such risks by building trust relationships among entities and identifying malicious entities. A popular reputation model is the so-called flow-based model. Most existing reputation systems based on such a model provide only a ranking, without absolute reputation values; this makes it difficult to determine whether entities are actually trustworthy or untrustworthy. In addition, those systems ignore a significant part of the available information; as a consequence, reputation values may not be accurate. In this paper, we present a flow-based reputation metric that gives absolute values instead of merely a ranking. Our metric makes use of all the available information. We study, both analytically and numerically, the properties of the proposed metric and the effect of attacks on reputation values.

[1]  Zaobin Gan,et al.  A Novel Reputation Computing Model for Mobile Agent-Based E-Commerce Systems , 2008, 2008 International Conference on Information Security and Assurance (isa 2008).

[2]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[3]  Ghassan O. Karame,et al.  SuperTrust: a secure and efficient framework for handling trust in super-peer networks , 2007, PODC '07.

[4]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[5]  Sandro Etalle,et al.  Reputation-Based Ontology Alignment for Autonomy and Interoperability in Distributed Access Control , 2009, 2009 International Conference on Computational Science and Engineering.

[6]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[7]  Emin Gün Sirer,et al.  Experience with an Object Reputation System for Peer-to-Peer Filesharing , 2006, NSDI.

[8]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[9]  Kamal Kant Bharadwaj,et al.  Fuzzy computational models for trust and reputation systems , 2009, Electron. Commer. Res. Appl..

[10]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[11]  Baptiste Alcalde,et al.  An Algebra for Trust Dilution and Trust Fusion , 2009, Formal Aspects in Security and Trust.

[12]  T. Raghavan,et al.  Nonnegative Matrices and Applications , 1997 .

[13]  Shlomo Moran,et al.  The stochastic approach for link-structure analysis (SALSA) and the TKC effect , 2000, Comput. Networks.

[14]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[15]  Ion Stoica,et al.  Incentives for Cooperation in Peer-to-Peer Networks , 2003 .

[16]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[17]  Ebay is the World’s Online Marketplace , 2014 .

[18]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[19]  Vladimiro Sassone,et al.  A framework for concrete reputation-systems with applications to history-based access control , 2005, CCS '05.

[20]  Shonali Krishnaswamy,et al.  A fuzzy model for reasoning about reputation in web services , 2006, SAC.

[21]  Chrysanthos Dellarocas,et al.  Analyzing the economic efficiency of eBay-like online reputation reporting mechanisms , 2011, EC '01.

[22]  Bruce Christianson,et al.  Why Isn't Trust Transitive? , 1996, Security Protocols Workshop.

[23]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[24]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[25]  Svein J. Knapskog,et al.  A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments , 2009, Electron. Notes Theor. Comput. Sci..

[26]  Audun Jøsang,et al.  Semantic Constraints for Trust Transitivity , 2005, APCCM.

[27]  Robert J. Plemmons,et al.  Nonnegative Matrices in the Mathematical Sciences , 1979, Classics in Applied Mathematics.

[28]  Audun Jøsang,et al.  A Logic for Uncertain Probabilities , 2001, Int. J. Uncertain. Fuzziness Knowl. Based Syst..

[29]  Michael Luck,et al.  A Direct Reputation Model for VO Formation , 2005, CEEMAS.

[30]  Masao Fuketa,et al.  A method of extracting and evaluating good and bad reputations for natural language expressions , 2005, Int. J. Inf. Technol. Decis. Mak..

[31]  Junseok Hwang,et al.  An Optimal Trust Management Method to Protect Privacy and Strengthen Objectivity in Utility Computing Services , 2011, Int. J. Inf. Technol. Decis. Mak..

[32]  Milan Petkovic,et al.  Hedaquin: A Reputation-based Health Data Quality Indicator , 2008, STM@ESORICS.