Detection of slanders through Euclidean distance similarity assessment for securing e-commerce agents in P2P decentralised electronic communities

Mobile Agents migrate autonomously through the network. During execution, agents are controlled by the hosts. Hence, the need arises to protect agent against malicious intentions of hosts. Proposed model 'MRep' computes reputation of Destination Host DH with which agent wishes to do transaction. Hosts as recommenders may give fair/unfair recommendations for the DH. Our approach calculates Euclidean Distance ED between Source Host pre-trusted and recommender. If ED lies in similarity range, the recommendation of the recommender is fair else, it is unfair. If ED lies between similarity and dissimilarity range, correlation is calculated to estimate strong, medium or weak similarity. High area under the curve proves a high association in receiver operating characteristic ROC curves. Results show that model possess 80% accuracy in the Final Reputation score for the DH before slandering while only 50% accuracy is achieved after slandering. This concludes that the existence of slanders lowers the performance of the model.

[1]  Lik Mui,et al.  A Computational Model of Trust and Reputation for E-businesses , 2002 .

[2]  Chrysanthos Dellarocas,et al.  Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior , 2000, EC '00.

[3]  Ling Liu,et al.  A reputation-based trust model for peer-to-peer ecommerce communities , 2003, EC.

[4]  Yanjun Shi,et al.  A novel trust model based on probability and statistics for Peer to Peer networks , 2013, 2013 International Conference on Quality, Reliability, Risk, Maintenance, and Safety Engineering (QR2MSE).

[5]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[6]  V. Valli Kumari,et al.  Credibility Based Corrective Mechanism for Reputation Computation in Peer-to-Peer Communities , 2008 .

[7]  Feng Xu,et al.  Addressing Common Vulnerabilities of Reputation Systems for Electronic Commerce , 2012, J. Theor. Appl. Electron. Commer. Res..

[8]  Vegi Srinivas,et al.  Credibility Based Reputation Calculation in P2P Networks , 2008, ICDCIT.

[9]  Nicholas R. Jennings,et al.  A Probabilistic Trust Model for Handling Inaccurate Reputation Sources , 2005, iTrust.

[10]  Jordi Sabater-Mir,et al.  Social ReGreT, a reputation model based on social relations , 2001, SECO.

[11]  Yuefeng Li,et al.  The state-of-the-art in personalized recommender systems for social networking , 2012, Artificial Intelligence Review.

[12]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[13]  Aphrodite Tsalgatidou,et al.  Credible recommendation exchange mechanism for P2P reputation systems , 2013, SAC '13.

[14]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[15]  Li Lifen Trust Derivation and Transitivity in a Recommendation Trust Model , 2008, 2008 International Conference on Computer Science and Software Engineering.

[16]  Aphrodite Tsalgatidou,et al.  Credibility Enhanced Reputation Mechanism for Distributed E-communities , 2011, 2011 19th International Euromicro Conference on Parallel, Distributed and Network-Based Processing.

[17]  Ahmad Ridha,et al.  Feedback behavior and its role in trust assessment for peer-to-peer systems , 2010, Telecommun. Syst..

[18]  Christos H. Papadimitriou,et al.  Free-riding and whitewashing in peer-to-peer systems , 2006, IEEE J. Sel. Areas Commun..

[19]  Aphrodite Tsalgatidou,et al.  Taxonomy of attacks and defense mechanisms in P2P reputation systems - Lessons for reputation system designers , 2012, Comput. Sci. Rev..

[20]  S Hailes,et al.  Using Recommendations for Managing Trust in Distributed Systems , 1997 .

[21]  Yan Sun,et al.  Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..

[22]  Aphrodite Tsalgatidou,et al.  Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework , 2006, TrustBus.

[23]  José M. Molina,et al.  Fuzzy referral based cooperation in social networks of agents , 2005 .

[24]  Ma Li,et al.  A Synthesize Trust Degree Evaluation method in distributed system , 2010, 2010 8th World Congress on Intelligent Control and Automation.

[25]  Mudhakar Srivatsa,et al.  Securing decentralized reputation management using TrustGuard , 2006, J. Parallel Distributed Comput..

[26]  Nicola Zannone,et al.  A reference model for reputation systems , 2014, Decis. Support Syst..

[27]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[28]  Giorgos Zacharia,et al.  Collaborative reputation mechanisms in electronic marketplaces , 1999, Proceedings of the 32nd Annual Hawaii International Conference on Systems Sciences. 1999. HICSS-32. Abstracts and CD-ROM of Full Papers.

[29]  Ali Chehab,et al.  PATROL: a comprehensive reputation-based trust model , 2007 .

[30]  Baolin,et al.  Reputation-based Trust Model in Grid Security System , 2006 .

[31]  Liang Gu,et al.  Rectifying Prejudicial Feedback Ratings in Reputation based Trust Management , 2007, IEEE International Conference on Services Computing (SCC 2007).

[32]  José M. Molina López,et al.  A fuzzy model of reputation in multi-agent systems , 2001, AGENTS '01.

[33]  B. Esfandiari,et al.  On How Agents Make Friends: Mechanisms for Trust Acquisition , 2000 .

[34]  Weisong Shi,et al.  PET: A PErsonalized Trust Model with Reputation and Risk Evaluation for P2P Resource Sharing , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.

[35]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[36]  Michal Feldman,et al.  The evolution of cooperation under cheap pseudonyms , 2005, Seventh IEEE International Conference on E-Commerce Technology (CEC'05).

[37]  Audun Jøsang,et al.  Trust Transitivity and Conditional Belief Reasoning , 2012, IFIPTM.

[38]  Chang Guofeng,et al.  A reputation model of web services , 2011, 2011 IEEE 3rd International Conference on Communication Software and Networks.

[39]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[40]  Ayman I. Kayssi,et al.  TRUMMAR - A Trust Model for Mobile Agent Systems Based on Reputation , 2004, The IEEE/ACS International Conference on Pervasive Services.

[41]  Nicholas R. Jennings,et al.  An efficient and versatile approach to trust and reputation using hierarchical Bayesian modelling , 2012, Artif. Intell..

[42]  Félix Gómez Mármol,et al.  Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..

[43]  Bharat K. Bhargava,et al.  SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[44]  Audun Jøsang,et al.  A Normal-Distribution Based Reputation Model , 2014, TrustBus.

[45]  Sarvapali D. Ramchurn,et al.  Trust evaluation through relationship analysis , 2005, AAMAS '05.

[46]  Stephen Marsh,et al.  Multi-layer cognitive filtering by behavioral modeling , 2011, AAMAS.

[47]  Weisong Shi,et al.  Performance evaluation of rating aggregation algorithms in reputation systems , 2005, 2005 International Conference on Collaborative Computing: Networking, Applications and Worksharing.

[48]  Nicholas R. Jennings,et al.  Coping with inaccurate reputation sources: experimental analysis of a probabilistic trust model , 2005, AAMAS '05.

[49]  M. Hajli,et al.  Establishing trust in social commerce through social word of mouth , 2013, 7th International Conference on e-Commerce in Developing Countries:with focus on e-Security.

[50]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[51]  Munindar P. Singh,et al.  A Social Mechanism of Reputation Management in Electronic Communities , 2000, CIA.

[52]  Paul Resnick,et al.  Reputation systems , 2000, CACM.

[53]  Patrick Schweitzer,et al.  On Beta Models with Trust Chains , 2013, IFIPTM.

[54]  Nicholas R. Jennings,et al.  On Handling Inaccurate Witness Reports , 2005 .

[55]  Yuhong Liu,et al.  Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis , 2010, 2010 IEEE Second International Conference on Social Computing.

[56]  Chunyan Miao,et al.  An Entropy-Based Approach to Protecting Rating Systems from Unfair Testimonies , 2006, IEICE Trans. Inf. Syst..

[57]  Munindar P. Singh,et al.  Detecting deception in reputation management , 2003, AAMAS '03.

[58]  Vegi Srinivas,et al.  An Effective Calculation of Reputation in P2P Networks , 2009, J. Networks.

[59]  Ali Payandeh,et al.  DTM: An Efficient and Dynamic Trust and Reputation Model for E-commerce Agents , 2013 .

[60]  Markus Schneider,et al.  Applying trust policies for protecting mobile agents against DoS , 2002, Proceedings Third International Workshop on Policies for Distributed Systems and Networks.

[61]  Mohan S. Kankanhalli,et al.  Building trust in peer-to-peer systems: a review , 2006, Int. J. Secur. Networks.

[62]  Kamal Kant Bharadwaj,et al.  Fuzzy computational models for trust and reputation systems , 2009, Electron. Commer. Res. Appl..

[63]  Xinhui Yi,et al.  False reputation in online transactions: An empirical study , 2014, 2014 11th International Conference on Service Systems and Service Management (ICSSSM).

[64]  Joongheon Kim,et al.  The Sybil Attacks and Defenses: A Survey , 2013, Smart Comput. Rev..

[65]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[66]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .