Rep on the roll:a peer to peer reputation system based on a rolling blockchain

This paper presents the first generalized reputation system that can be applied to multiple networks that is based on the blockchain. We first discuss current reputation systems, conducting a critical analysis of their current security vulnerabilities, before looking at how new blockchain-based technologies are used. We propose an innovative new reputation system that is based on blockchain technologies and which aims to solve many unanswered questions in the current generation of reputation systems, as well as blockchain systems in general. We then consider the limitations of such a system, before using simulations and analyses to demonstrate methods of overcoming these limitations, and in doing so, provide a possible solution to a fundamental issue in blockchain-based networks; scalability. We conclude by suggesting areas for future studies, and summarizing our findings.

[1]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[2]  Cristina Nita-Rotaru,et al.  A Survey of attacks on Reputation Systems , 2007 .

[3]  Karl Aberer,et al.  Managing trust in a peer-2-peer information system , 2001, CIKM '01.

[4]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[5]  Audun Jøsang,et al.  Simulating the Effect of Reputation Systems on E-markets , 2003, iTrust.

[6]  Emin Gün Sirer,et al.  Bitcoin-NG: A Scalable Blockchain Protocol , 2015, NSDI.

[7]  Joongheon Kim,et al.  The Sybil Attacks and Defenses: A Survey , 2013, Smart Comput. Rev..

[8]  A. Jøsang,et al.  Challenges for Robust Trust and Reputation Systems , 2009 .

[9]  Sandra Steinbrecher,et al.  Privacy, Liveliness and Fairness for Reputation , 2011, SOFSEM.

[10]  Chandra Prakash,et al.  SybilInfer: Detecting Sybil Nodes using Social Networks , 2011 .

[11]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[12]  Paul Chwelos,et al.  Differences in “Truthiness” across Online Reputation Mechanisms , 2007 .

[13]  Partha Dasgupta,et al.  SECURING REPUTATION DATA IN PEER-TO-PEER NETWORKS , 2004 .

[14]  Feng Xiao,et al.  SybilLimit: A Near-Optimal Social Network Defense Against Sybil Attacks , 2010, IEEE/ACM Trans. Netw..

[15]  Akbar Ghaffarpour Rahbar,et al.  PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.