[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/2133601.2133617acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
short-paper

Bounding trust in reputation systems with incomplete information

Published: 07 February 2012 Publication History

Abstract

Reputation mechanisms represent a major class of techniques for managing trust in decentralized systems. Quite a few reputation-based trust functions have been proposed in the literature for use in many different application domains. However, in many situations, one cannot always obtain all of the information required by the trust evaluation process. For example, access control restrictions or high collection costs might limit one's ability to gather every possible feedback that could be aggregated. Thus, one key question is how to analytically quantify the quality of reputation scores computed using incomplete information.
In this paper, we start a first effort towards answering the above question by studying the following problem: given the existence of certain missing information, what are the worst and best trust scores (i.e., the bounds of trust) a target entity can be assigned by a given reputation function? We formulate this problem based on a general model of reputation systems, and then examine the ability to bound a collection representative trust functions in the literature. We show that most existing trust functions are monotonic in terms of direct missing information about the target of a trust evaluation, which greatly simplifies this process. The problem of trust bounding with the presence of indirect missing information is much more complicated. We show that many well-known trust functions are not monotonic regarding indirect missing information, which means that a case-by-case analysis needs to be conducted for each trust function in order to bound an entity's trust.

References

[1]
E. Damiani, S. D. Capitani, S. Paraboschi, F. Violante, and D. E. I. Politecnico. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In Proceedings of the 9th ACM CCS, pages 207--216, 2002.
[2]
K. Hoffman, D. Zage, and C. Nita-Rotaru. A survey of attack and defense techniques for reputation systems. In ACM Computing Surveys, volume 42, pages 1--31, Dec. 2009.
[3]
A. Jø sang and R. Ismail. The Beta Reputation System. In Proceedings of the 15th Bled eCommerce Conference, 2002.
[4]
A. Jø sang, R. Ismail, and C. Boyd. A survey of trust and reputation systems for online service provision. In Decision Support Systems, volume 43, pages 618--644, Mar. 2007.
[5]
S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The Eigentrust algorithm for reputation management in P2P networks. In WWW Conference Series, pages 640--651, 2003.
[6]
S. Lee, R. Sherwood, and B. Bhattacharjee. Cooperative peer groups in NICE. In Proceeding of the INFOCOM 2003, 2003.
[7]
C. D. Meyer. The role of the group generalized inverse in the theory of finite markov chains*. Review Literature And Arts Of The Americas, 17(3), 1975.
[8]
P. Michiardi and R. Molva. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Proceedings of the 6th CMS, pages 107--121, Deventer, The Netherlands, 2002.
[9]
M. Richardson, R. Agrawal, and P. Domingos. Trust management for the semantic web. In Proceeding of the ISWC, 2003.
[10]
M. Srivatsa, L. Xiong, and L. Liu. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the 14th WWW conference, 2005.
[11]
E. S. Staab. The Pudding of Trust Editor's Perspective. IEEE Intelligent Systems, 3(4):19(5):74--88, 2004.
[12]
K. Walsh and E. Sirer. Experience with an object reputation system for peer-to-peer filesharing. In Proceedings of the 3rd NCDI conference, 2006.
[13]
L. Xiong and L. Liu. Building trust in decentralized peer-to-peer electronic communities. Electronic Commerce Research, 2002.
[14]
Q. Zhang, W. Wei, and T. Yu. On the modeling of honest players in reputation systems. Journal of Computer Science and Technology, 24:808--819, 2009.
[15]
H. Zhao and X. Li. VectorTrust: trust vector aggregation scheme for trust management in peer-to-peer networks. The Journal of Supercomputing, pages 1--25, 2011.

Cited By

View all
  • (2022)Information management for trust computation on resource-constrained IoT devicesFuture Generation Computer Systems10.1016/j.future.2022.05.004135:C(348-363)Online publication date: 1-Oct-2022
  • (2013)Bounding trust under uncertain topology information in reputation-based trust systemsProceedings of the 14th international conference on Web-Age Information Management10.1007/978-3-642-38562-9_65(643-648)Online publication date: 14-Jun-2013

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
CODASPY '12: Proceedings of the second ACM conference on Data and Application Security and Privacy
February 2012
338 pages
ISBN:9781450310918
DOI:10.1145/2133601
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 07 February 2012

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. missing information
  2. reputation
  3. trust

Qualifiers

  • Short-paper

Conference

CODASPY'12
Sponsor:

Acceptance Rates

CODASPY '12 Paper Acceptance Rate 21 of 113 submissions, 19%;
Overall Acceptance Rate 149 of 789 submissions, 19%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)1
  • Downloads (Last 6 weeks)0
Reflects downloads up to 16 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2022)Information management for trust computation on resource-constrained IoT devicesFuture Generation Computer Systems10.1016/j.future.2022.05.004135:C(348-363)Online publication date: 1-Oct-2022
  • (2013)Bounding trust under uncertain topology information in reputation-based trust systemsProceedings of the 14th international conference on Web-Age Information Management10.1007/978-3-642-38562-9_65(643-648)Online publication date: 14-Jun-2013

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media