Applicability of Trust Management Algorithm in C2C services

The emergence of Consumer-to-Consumer (C2C) platforms has allowed consumers to buy and sell goods directly, but it has also created problems, such as commodity fraud and fake reviews. Trust Management Algorithms (TMAs) are expected to be a countermeasure to detect fraudulent users. However, it is unknown whether TMAs are as effective as reported as they are designed for Peer-to-Peer (P2P) communications between devices on a network. Here we examine the applicability of `EigenTrust', a representative TMA, for the use case of C2C services using an agent-based model. First, we defined the transaction process in C2C services, assumed six types of fraudulent transactions, and then analysed the dynamics of EigenTrust in C2C systems through simulations. We found that EigenTrust could correctly estimate low trust scores for two types of simple frauds. Furthermore, we found the oscillation of trust scores for two types of advanced frauds, which previous research did not address. This suggests that by detecting such oscillations, EigenTrust may be able to detect some (but not all) advanced frauds. Our study helps increase the trustworthiness of transactions in C2C services and provides insights into further technological development for consumer services.

[1]  Jingping Bi,et al.  Decentralized Trust Management , 2019, ACM Comput. Surv..

[2]  Yongxia Zhou,et al.  Trust Model and Anti-Attack Analysis for Social Computing , 2018, 2018 IEEE SmartWorld, Ubiquitous Intelligence & Computing, Advanced & Trusted Computing, Scalable Computing & Communications, Cloud & Big Data Computing, Internet of People and Smart City Innovation (SmartWorld/SCALCOM/UIC/ATC/CBDCom/IOP/SCI).

[3]  Mohammad Reza Meybodi,et al.  A dynamic algorithm for stochastic trust propagation in online social networks: Learning automata approach , 2018, Comput. Commun..

[4]  Mingchu Li,et al.  GroupTrust: Dependable Trust Management , 2017, IEEE Transactions on Parallel and Distributed Systems.

[5]  Muhammad Al-Qurishi,et al.  Sybil Defense Techniques in Online Social Networks: A Survey , 2017, IEEE Access.

[6]  Jia Guo,et al.  Trust-Based Service Management for Social Internet of Things Systems , 2016, IEEE Transactions on Dependable and Secure Computing.

[7]  Mingchu Li,et al.  Reliable and Resilient Trust Management in Distributed Service Provision Networks , 2015, ACM Trans. Web.

[8]  Boris Pittel,et al.  Distance between two random k-out digraphs, with and without preferential attachment , 2013, Advances in Applied Probability.

[9]  Mingchu Li,et al.  ServiceTrust: Trust Management in Service Provision Networks , 2013, 2013 IEEE International Conference on Services Computing.

[10]  Mingchu Li,et al.  EigenTrustp++: Attack resilient trust management , 2012, 8th International Conference on Collaborative Computing: Networking, Applications and Worksharing (CollaborateCom).

[11]  Yan Sun,et al.  Security of Online Reputation Systems: The evolution of attacks and defenses , 2012, IEEE Signal Process. Mag..

[12]  Mudhakar Srivatsa,et al.  Securing decentralized reputation management using TrustGuard , 2006, J. Parallel Distributed Comput..

[13]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[14]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[15]  Bharat K. Bhargava,et al.  SORT: A Self-ORganizing Trust Model for Peer-to-Peer Systems , 2013, IEEE Transactions on Dependable and Secure Computing.

[16]  Ling Liu,et al.  The SocialTrust framework for trusted social information management: Architecture and algorithms , 2010, Inf. Sci..

[17]  Audun Jøsang,et al.  Trust and Reputation Systems , 2007, FOSAD.

[18]  A. Jøsang,et al.  The Beta Reputation System , 2002, Bled eConference.