Vulnerabilities of Decentralized Additive Reputation Systems Regarding the Privacy of Individual Votes
نویسندگان
چکیده
In this paper, we focus on attacks and defense mechanisms in additive reputation systems. We start by surveying the most important protocols that aim to provide privacy between individual voters. Then, we categorize attacks against additive reputation systems considering both malicious querying nodes and malicious reporting nodes that collaborate in order to undermine the vote privacy of the remaining users. To the best of our knowledge this is the first work that provides a description of such malicious behavior against such systems. In light of this analysis we demonstrate the inefficiencies of existing protocols.
منابع مشابه
Supporting Privacy in Decentralized Additive Reputation Systems
Previous studies have been suggestive of the fact that reputation ratings may be provided in a strategic manner for reasons of reciprocation and retaliation, and therefore may not properly reflect the trustworthiness of rated parties. It thus appears that supporting privacy of feedback providers could improve the quality of their ratings. We argue that supporting perfect privacy in decentralize...
متن کاملPrivacy Preserving Reputation Systems for Decentralized Environments
Reputation systems are a key technology for making users accountable for their behavior in online communities. A reputation system computes the reputation of a user based on the feedback provided by the community. If the user draws negative feedback, it loses good reputation and may eventually be excluded from the network. It has been observed that users in a reputation system often hesitate in...
متن کاملPrivacy Preserving Reputation Systems
Reputation systems provide mechanisms for multiple parties, in a community, to quantify the trust between one another and to encourage adherence to contract in e-commerce. In this thesis we provide two protocols to calculate the reputation value of participant agents in peer to peer community, using a private, additive and fully decentralized manner. The first protocol considers the churn rate ...
متن کاملExtending Signatures of Reputation
Reputation mechanisms are a powerful tool to reduce the potential risk of interacting with almost or completely unknown users in environments in which there is no incentive to behave trustworthily, e.g. in open and large-scale systems. However, by collecting feedback about users, reputation mechanisms can easily be manipulated to deduce users’ profiles; thus, these mechanisms jeopardize users’ ...
متن کاملPartial identities as a foundation for trust and reputation
This paper explores the relationships between the hard security concepts of identity and privacy on the one hand, and the soft security concepts of trust and reputation on the other hand. We specifically focus on two vulnerabilities that current trust and reputation systems have: the change of identity and multiple identities problems. As a result, we provide a privacy-preserving solution to th...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
- Wireless Personal Communications
دوره 66 شماره
صفحات -
تاریخ انتشار 2012