A reference model for reputation systems

Recent advances in ICT have led to a vast and expeditious development of e-services and technology. Trust is a fundamental aspect for the acceptance and adoption of these new services. Reputation is commonly employed as the measure of the trustworthiness of users in on-line communities. However, to facilitate their acceptance, reputation systems should be able to deal with the trust challenges and needs of those services. The aim of this survey is to propose a framework for the analysis of reputation systems. We elicit the requirements for reputations metrics along with the features necessary to achieve such requirements. The identied requirements and features form a reference framework which allows an objective evaluation and comparison of reputation systems. We demonstrate its applicability by analyzing and classifying a number of existing reputation systems. Our framework can serve as a reference model for the analysis of reputation systems. It is also helpful for the design of new reputation systems as it provides an analysis of the implications of design choices.

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Audun Jøsang,et al.  Online Reputation Systems for the Health Sector , 2008 .

[3]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[4]  Joongheon Kim,et al.  The Sybil Attacks and Defenses: A Survey , 2013, Smart Comput. Rev..

[5]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[6]  Antonino Simone,et al.  Flow-Based Reputation: More than Just Ranking , 2012, Int. J. Inf. Technol. Decis. Mak..

[7]  Petteri Nurmi,et al.  A Bayesian framework for online reputation systems , 2006, Advanced Int'l Conference on Telecommunications and Int'l Conference on Internet and Web Applications and Services (AICT-ICIW'06).

[8]  Lea Kutvonen,et al.  Trust Management Survey , 2005, iTrust.

[9]  Ling Liu,et al.  Systematic analysis of centralized online reputation systems , 2012, Decis. Support Syst..

[10]  Milan Petkovic,et al.  Reliable Personal Health Records , 2008, MIE.

[11]  L. Smeltzer The Meaning and Origin of Trust in Buyer-Supplier Relationships , 1997 .

[12]  Paolo Avesani,et al.  A trust-enhanced recommender system application: Moleskiing , 2005, SAC '05.

[13]  Madjid Merabti,et al.  Deterring whitewashing attacks in reputation based schemes for mobile ad hoc networks , 2010, 2010 IFIP Wireless Days.

[14]  Paul Resnick,et al.  Trust among strangers in internet transactions: Empirical analysis of eBay' s reputation system , 2002, The Economics of the Internet and E-commerce.

[15]  Tharam S. Dillon,et al.  Fuzzy trust evaluation and credibility development in multi-agent systems , 2007, Appl. Soft Comput..

[16]  Nathan Griffiths,et al.  Fuzzy Trust for Peer-to-Peer Systems , 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06).

[17]  Atul Singh,et al.  Scrivener: Providing Incentives in Cooperative Content Distribution Systems , 2005, Middleware.

[18]  Kamal Kant Bharadwaj,et al.  Fuzzy computational models for trust and reputation systems , 2009, Electron. Commer. Res. Appl..

[19]  Gade Krishna,et al.  A scalable peer-to-peer lookup protocol for Internet applications , 2012 .

[20]  E. Friedman,et al.  Algorithmic Game Theory: Manipulation-Resistant Reputation Systems , 2007 .

[21]  Milan Petkovic,et al.  Hedaquin: A Reputation-based Health Data Quality Indicator , 2008, STM@ESORICS.

[22]  Nicola Zannone,et al.  Impact of ICT on Home Healthcare , 2012, HCC.

[23]  Shanshan Song,et al.  Trusted P2P transactions with fuzzy reputation aggregation , 2005, IEEE Internet Computing.

[24]  Audun Jøsang,et al.  Trust Transitivity and Conditional Belief Reasoning , 2012, IFIPTM.

[25]  Prasant Mohapatra,et al.  Trust Computations and Trust Dynamics in Mobile Adhoc Networks: A Survey , 2012, IEEE Communications Surveys & Tutorials.

[26]  Stelvio Cimato,et al.  Encyclopedia of Cryptography and Security , 2005 .

[27]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[28]  Aphrodite Tsalgatidou,et al.  Reputation-Based Trust Systems for P2P Applications: Design Issues and Comparison Framework , 2006, TrustBus.

[29]  Refik Molva,et al.  Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks , 2002, Communications and Multimedia Security.

[30]  Czesław Kościelny,et al.  Public Key Infrastructure , 2013 .

[31]  Svein J. Knapskog,et al.  A Probabilistic Reputation Algorithm for Decentralized Multi-Agent Environments , 2009, Electron. Notes Theor. Comput. Sci..

[32]  Audun Jøsang,et al.  Subjective Logic , 2016, Artificial Intelligence: Foundations, Theory, and Algorithms.

[33]  Yolanda Gil,et al.  A survey of trust in computer science and the Semantic Web , 2007, J. Web Semant..

[34]  Nicholas R. Jennings,et al.  An efficient and versatile approach to trust and reputation using hierarchical Bayesian modelling , 2012, Artif. Intell..

[35]  Mark Witkowski,et al.  Experiments in Building Experiential Trust in a Society of Objective-Trust Based Agents , 2000, Trust in Cyber-societies.

[36]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[37]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM '01.

[38]  Lea Kutvonen,et al.  Reputation Management Survey , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[39]  Hector Garcia-Molina,et al.  Taxonomy of trust: Categorizing P2P reputation systems , 2006, Comput. Networks.

[40]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[41]  Shlomo Moran,et al.  The stochastic approach for link-structure analysis (SALSA) and the TKC effect , 2000, Comput. Networks.

[42]  Mudhakar Srivatsa,et al.  TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.

[43]  Feng Xu,et al.  Addressing Common Vulnerabilities of Reputation Systems for Electronic Commerce , 2012, J. Theor. Appl. Electron. Commer. Res..

[44]  Sergey Brin,et al.  The Anatomy of a Large-Scale Hypertextual Web Search Engine , 1998, Comput. Networks.

[45]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[46]  A. Jøsang,et al.  Filtering Out Unfair Ratings in Bayesian Reputation Systems , 2004 .

[47]  Henk C. A. van Tilborg,et al.  Encyclopedia of Cryptography and Security, 2nd Ed , 2005 .

[48]  Nicholas R. Jennings,et al.  An integrated trust and reputation model for open multi-agent systems , 2006, Autonomous Agents and Multi-Agent Systems.

[49]  Patrick Schweitzer,et al.  On Beta Models with Trust Chains , 2013, IFIPTM.

[50]  Ghassan O. Karame,et al.  SuperTrust: a secure and efficient framework for handling trust in super-peer networks , 2007, PODC '07.

[51]  J. Mattausch,et al.  Cooperation among strangers with limited information about reputation , 2008 .

[52]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[53]  Max Mühlhäuser,et al.  CertainLogic: A Logic for Modeling Trust and Uncertainty - (Short Paper) , 2011, TRUST.

[54]  Cristina Nita-Rotaru,et al.  A survey of attack and defense techniques for reputation systems , 2009, CSUR.

[55]  Jordi Sabater-Mir,et al.  Reputation and social network analysis in multi-agent systems , 2002, AAMAS '02.