A whitelist and blacklist-based co-evolutionary strategy for defensing against multifarious trust attacks

With electronic commerce becoming increasingly popular, the problems of trust have become one of the main challenges in the development of electronic commerce. Although various mechanisms have been adopted to guarantee trust between customers and sellers (or platforms), trust and reputation systems are still frequently attacked by deceptive, collusive, or strategic agents. Therefore, it is difficult to keep these systems robust. It has been mentioned that a combined usage of both trust and distrust propagation can lead to better results. However, little work has been known to realize this insight successfully. Besides, literatures either use a social network with trust/distrust information or use one advisor list in evaluating all sellers, which leads to the lack of pertinence and inaccuracy of evaluation. This paper proposes a defensing strategy called WBCEA, in which, each buyer agent is modeled with two attributes (i.e., the trustworthy facet and the untrustworthy facet) and two lists (i.e., the whitelist and the blacklist). Based on the social network that are constructed and maintained according to its whitelist and blacklist, the honest buyer agent can find trustable buyers and evaluate the candidate sellers according to its own experience and ratings of trustable buyers. Experiments are designed and implemented to verify the accuracy and robustness of this strategy. Results show that our strategy outperforms existing ones, especially when majority of buyers are dishonest in the electronic market.

[1]  Norman L. Chervany,et al.  Trust and Distrust Definitions: One Bite at a Time , 2000, Trust in Cyber-societies.

[2]  R. Lewicki,et al.  Trust And Distrust: New Relationships and Realities , 1998 .

[3]  Chris Cornelis,et al.  Trust- and Distrust-Based Recommendations for Controversial Reviews , 2011, IEEE Intelligent Systems.

[4]  Munindar P. Singh,et al.  Detecting deception in reputation management , 2003, AAMAS '03.

[5]  Seema Bawa,et al.  A Privacy, Trust and Policy based Authorization Framework for Services in Distributed Environments , 2007 .

[6]  Hongfei Lin,et al.  Combating Web spam through trust-distrust propagation with confidence , 2013, Pattern Recognit. Lett..

[7]  Jie Zhang,et al.  A framework for trust modeling in multiagent electronic marketplaces with buying advisors to consider varying seller behavior and the limiting of seller bids , 2013, TIST.

[8]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[9]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[10]  Jie Zhang,et al.  Robustness of Trust Models and Combinations for Handling Unfair Ratings , 2012, IFIPTM.

[11]  Chris Cornelis,et al.  Enhancing the trust-based recommendation process with explicit distrust , 2013, TWEB.

[12]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[13]  Jie Zhang,et al.  Multi-faceted trust and distrust prediction for recommender systems , 2015, Decis. Support Syst..

[14]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[15]  Audun Jøsang,et al.  Robustness of Trust and Reputation Systems: Does It Matter? , 2012, IFIPTM.

[16]  D. Harrison McKnight,et al.  Distrust and trust in B2C e-commerce: do they differ? , 2006, ICEC '06.

[17]  Chunyan Miao,et al.  AN INTEGRATED CLUSTERING‐BASED APPROACH TO FILTERING UNFAIR MULTI‐NOMINAL TESTIMONIES , 2014, Comput. Intell..

[18]  Jie Zhang,et al.  An evolutionary model for constructing robust trust networks , 2013, AAMAS.

[19]  Dickson K. W. Chiu,et al.  A pre-evolutionary advisor list generation strategy for robust defensing reputation attacks , 2016, Knowl. Based Syst..

[20]  Masahiro Kimura,et al.  Detecting changes in information diffusion patterns over social networks , 2013, TIST.

[21]  Chunyan Miao,et al.  iCLUB: an integrated clustering-based approach to improve the robustness of reputation systems , 2011, AAMAS.

[22]  Audun Jsang,et al.  Analysing topologies of transitive trust , 2003 .

[23]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[24]  Jeff T. Larsen,et al.  Being bad isn't always good: affective context moderates the attention bias toward negative information. , 2006, Journal of personality and social psychology.