In a typical reputation management system, after each transaction, the buyer (who receives a service or purchases a product) provides its report/rating about the quality of the seller for that transaction. In such a system, the problem of reputation management is to compute two sets of variables: 1. the (global) reputation parameters of entities who act as sellers, and 2. the trustworthiness parameters of the entities who act as the raters (i.e., buyers). In this paper, for the first time, we introduce an iterative probabilistic method for reputation management. The proposed scheme, referred to as RPM, relies on a probabilistic message passing algorithm in the graph-based representation of the reputation management problem on an appropriately chosen factor graph. In the graph representation of the problem, the sellers and buyers are arranged as two sets of variable and factor nodes, respectively, that are connected via some edges. Then, the reputation and trustworthiness parameters are computed by a fully iterative and probabilistic message passing algorithm between these nodes in the graph. We provide a detailed evaluation of RPM via computer simulations. We observe that RPM iteratively reduces the error in the reputation estimates of the sellers due to the malicious raters. Finally, comparison of RPM with some well- known and commonly used reputation management techniques (e.g., Averaging Scheme, Bayesian Approach and Cluster Filtering) indicates the superiority of the proposed scheme both in terms of robustness against attacks (e.g., ballot-stuffing, bad-mouthing) and computational efficiency.
[1]
A. Jøsang,et al.
Filtering Out Unfair Ratings in Bayesian Reputation Systems
,
2004
.
[2]
Judea Pearl,et al.
Probabilistic reasoning in intelligent systems - networks of plausible inference
,
1991,
Morgan Kaufmann series in representation and reasoning.
[3]
Chrysanthos Dellarocas,et al.
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
,
2000,
EC '00.
[4]
Karl Aberer,et al.
Managing trust in a peer-2-peer information system
,
2001,
CIKM '01.
[5]
Glenn Shafer,et al.
A Mathematical Theory of Evidence
,
2020,
A Mathematical Theory of Evidence.
[6]
Hector Garcia-Molina,et al.
The Eigentrust algorithm for reputation management in P2P networks
,
2003,
WWW '03.
[7]
Yicheng Zhang,et al.
Referee networks and their spectral properties
,
2005
.
[8]
Paul Resnick,et al.
Reputation Systems: Facilitating Trust in Internet Interactions
,
2000
.
[9]
Paul Resnick,et al.
Reputation systems
,
2000,
CACM.
[10]
Qinyuan Feng,et al.
RepTrap: a novel attack on feedback-based reputation systems
,
2008,
SecureComm.
[11]
Erman Ayday,et al.
An iterative algorithm for trust and reputation management
,
2009,
2009 IEEE International Symposium on Information Theory.
[12]
Ernesto Damiani,et al.
A reputation-based approach for choosing reliable resources in peer-to-peer networks
,
2002,
CCS '02.