[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
research-article

Modeling Decentralized Reputation-Based Trust for Initial Transactions in Digital Environments

Published: 01 May 2013 Publication History

Abstract

The advent of digital environments has generated significant benefits for businesses, organizations, governments, academia and societies in general. Today, over millions of transactions take place on the Internet. Although the widespread use of digital environments has generally provided opportunities for societies, a number of threats have limited their adoption. The de-facto standard today is for certification authorities to authenticate the identity of service providers while trust on the provided services is implied. This approach has certain shortcomings, for example, single point of failure, implied trust rather than explicit trust and others. One approach for minimizing such threats is to introduce an effective and resilient trust mechanism that is capable of determining the trustworthiness of service providers in providing their services. Determining the trustworthiness of services reduces invalid transactions in digital environments and further encourages collaborations. Evaluating trustworthiness of a service provider without any prior historical transactions (i.e. the initial transaction) pose a number of challenging issues. This article presents TIDE - a decentralized reputation trust mechanism that determines the initial trustworthiness of entities in digital environments. TIDE improves the precision of trust computation by considering raters’ feedback, number of transactions, credibility, incentive to encourage raters’ participation, strategy for updating raters’ category, and safeguards against dynamic personalities. Furthermore, TIDE classifies raters into three categories and promotes the flexibility and customization through its parameters. Evaluation of TIDE against several attack vectors demonstrates its accuracy, robustness and resilience.

References

[1]
Breslau, L., Cao, P., Fan, L., Phillips, G., and Shenker, S. 1999. Web caching and Zipf-like distributions: Evidence and implications. In Proceedings of the 18th Annual Conference of the IEEE Computer and Communications Societies.
[2]
Caronni, G. 2000. Walking the web of trust. In Proceedings of the IEEE 9th International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE).
[3]
Chang, E., Dillon, T., and Hussain, F. K. 2006. Trust Reputation for Service-Oriented Environments. Wiley, West Sussex, UK.
[4]
Charette, R. 2011. DigiNotar certificate authority breach crashes e-Government in the Netherlands. IEEE Spectrum. http://spectrum.ieee.org/riskfactor/telecom/security/diginotar-certificate-authority-breach-crashes-egovernment-in-the-netherlands.
[5]
Chou, W. 2002. Inside SSL: The Secure Sockets Layer Protocol. IEEE Computer Society: IT Professional.
[6]
Damiani, E. and Vimercati, S. 2003. Managing and sharing servents’ reputations in P2P systems. IEEE Trans. Knowl. Data Engi. 15, 4, 840--854.
[7]
Dellarocas, C. 2000. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of the 2nd ACM Conference on Electronic Commerce.
[8]
Douceur, J. R. and Donath, J. S. 2002. The Sybil attack. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS’01). 251--260.
[9]
Dong, H., Hussain, F., and Chang, E. 2007. Exploring the conceptual model of digital ecosystem. In Proceedings of the 2nd International Conference on Digital Telecommunications (ICDT’07).
[10]
European Commission. 2005. Communication from the commission: What is an European digital ecosystem? Introductory paper. http://ec.europa.eu/enterprise/ict/conferences/doc/p5_de2.pdf.
[11]
Golbeck, J. and Hendler, J. 2006a. Inferring binary trust relationships in web-based social networks. ACM Trans. Internet Tech. 6, 4, 497--529.
[12]
Golbeck, J. and Hendler, J. 2006b. FilmTrust: Movie recommendations using trust in web-based social networks. In Proceedings of the IEEE Consumer Communications and Networking Conference.
[13]
Goldberg, D., Nichols, D., Oki, B. M., and Terry, D. 1992. Using collaborative filtering to weave an information tapestry. Comm. ACM 35, 12, 61--70.
[14]
Grandison, T. and Sloman, M. 2000. A survey of trust in Internet applications. IEEE Commun. Surv. Tutor. Fourth Quarter. http://www.comsoc.org/pubs/surveys/.
[15]
Ion, M., Danzi, A., Koshuntanski, H., and Telesca, L. 2008. A peer-to-peer multidimensional trust model for digital ecosystems. In Proceedings of the 2nd IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST’08).
[16]
Josang, A. and Ismail, R. 2002. The beta reputation system. In Proceedings of the 15th Bled Electronic Commerce Conference.
[17]
Josang, A., Hayward, R., and Pope, S. 2006. Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference.
[18]
Josang, A., Ismail, R., and Boyd, C. 2007. A survey of trust and reputation systems for online service provisioning. Dec. Supp. Syst. 43, 618--644.
[19]
Kamvar, S., Schlosser, M., and Garcia-Molina, H. 2003. The EigenTrust algorithm for reputation management in P2P networks. In Proceedings of the 12th ACM International Conference on World Wide Web.
[20]
Kerschbaum, F., Haller, J., Karabulut, Y., and Robinson. P. 2006. Pathtrust: A trust-based reputation service for virtual organization formation. In Proceedings of the 4th International Conference on Trust Management (iTrust’06).
[21]
Knapskog, S. and Tavakolifard, M. 2011. Trust evaluation initialization using contextual information. In Proceedings of the 2nd ACM International Conference on Management of Emergent Digital EcoSystems (MEDES’11).
[22]
Kuter, U. and Golbeck, J. 2010. Using probabilistic confidence models for trust inference in Web-based social networks. ACM Trans. Internet Tech. 10, 2, Article 8.
[23]
Lemos, R. 2001. Microsoft warns of hijacked certificates. CNET news, http://news.cnet.com/2100-1001-254586.html.
[24]
Lesniewski-Laas, C. and Kaashoek, M. F. 2010. Whanau: A Sybil-proof distributed hash table. In Proceedings of the 7th USENIX Conference on Networked Systems (NSDI’10).
[25]
Malik, Z. and Bougettaya, A. 2007. Evaluating rater credibility for reputation assessment of web services. In Proceedings of the 8th International Conference on Web Information Systems Engineering (WISE).
[26]
Massa, P. and Avesani, P. 2004. Trust-aware collaborative filtering for recommender systems. In Proceedings of the International Conference on Cooperative Information Systems (CoopIS).
[27]
Mei, Y., Dong, X.,Tian, Z., Guan, S., and Chen, H. 2008. EntityTrust: Feedback credibility-based global reputation mechanism in cooperative computing system. In Proceedings of the 12th International Conference on Computer Supported Cooperative Work in Design (CSCWD’08).
[28]
Nachira, F., Chiozza, E., Ihonen, H., Manzoni, M., and Cunningham, F. 2002. Towards a network of digital business ecosystems fostering the local development. Discussion paper. http://www.digital-ecosystems.org/do/discussionpaper.pdf.
[29]
Nachira, F., Dini, P., and Nicolai. A. 2007. A network of digital business ecosystems for Europe: roots, processes and perspectives. Introductory paper. http://www.digital-ecosystems.org/book/DBE-2007.pdf.
[30]
Noorian, Z., Marsh, S., and Fleming, M. 2011. Multi-layer cognitived filtering by behavioural modelling. In Proceedings of the 10th International Conference on Autonomous Agents and Multiagent Systems (AAMAS’11).
[31]
Page, L., Brin, S., Motwani, R., and Winograd, T. 1998. The PageRank citation ranking: Bringing order to the web. Tech. rep., Stanford University, Stanford, CA.
[32]
Pranata, I., Skinner, G., and Athauda, R. 2011. TIDE: Measuring and evaluating trustworthiness and credibility of enterprises in digital ecosystem. In Proceedings of the 2nd ACM International Conference on Management of Emergent Digital EcoSystems (MEDES’11).
[33]
Regan, K., Poupart, P., and Cohen., R. 2006. Bayesian reputation modelling in e-marketplaces sensitive to subjectivity deception and change. In Proceedings of the American Association for Artificial Intelligence.
[34]
Resnick, P., Zeckhauser, R., Swanson, J., and Lockwood, K. 2006. The value of reputation on eBay: A controlled experiment. Experim. Econom. 9, 79--101.
[35]
Richardson, M., Agrawal, R., and Domingos, P. 2003. Trust management for the semantic web. In Proceedings of the 2nd International Semantic Web Conference.
[36]
Sabater, J. and Sierra, C. 2001. REGRET: A reputation model for gregarious societies. In Proceedings of the 5th International Conference on Autonomous Agents.
[37]
Schmidt, S., Steele, R., and Dillon, T. 2007. DEco Arch: Trust and reputation aware service brokering architecture in digital ecosystems. In Proceedings the Inaugural IEEE International Conference on Digital Ecosystems and Technologies (IEEE DEST).
[38]
Singh, A. and Liu, L. 2003. TrustMe: Anonymous management of trust relationships in decentralized P2P systems. In Proceedings of the 3rd International Conference on Peer-to-Peer Computing.
[39]
Srivatsa, M., Xiong, L., and Liu, L. 2005. TrustGuard: Countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of the International World Wide Web Conference (WWW’05).
[40]
Swamynathan, G., Zhao, B. Y., Almeroth, K. C., and Zheng, H. 2007. Globally decoupled reputations for large distributed networks. Adv. Multimed. 2007, 92485.
[41]
Teacy, W. T. L., Patel, J., Jennings, N. R., and Luck, M. 2006. Travos: Trust and reputation in the context of inaccurate information sources. J. Autonom. Agents Multi-Agent Syst. 12, 2.
[42]
University of Pennsylvania. TM/RM Simulator. http://rtg.cis.upenn.edu/qtm/p2psim.php3.
[43]
West, A. G., Kannan, S., Lee, I., and Sokolsky, O. 2010. An evaluation framework for reputation management systems. In Trust Modeling and Management in Digital Environments: From Social Concept to System Development, Y. Zheng Ed.
[44]
Xiong, L. and Liu, L. 2004. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16, 843--857.
[45]
Yu, H., Kaminsky, M., Gibbons, P., and Flaxman, A. 2006. SybilGuard: Defending against sybil attacks via social networks. In Proceedings of the ACM Annual Conference of the Special Interest Group on Data Communication (SIGCOMM’06).
[46]
Zacharia, G. and Maes, P. 2000. Trust management through reputation mechanisms. Appl. Artif. Intell. 14, 9, 881--907.
[47]
Zacharia, G., Moukas, A., and Maes, P. 1999. Collaborative reputation mechanisms in electronic marketplaces. In Proceedings of the 32nd Annual Hawaii International Conference on System Sciences (HICSS’99).
[48]
Zhang, J. and Cohen, R. 2008. Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach. Elsevier J. Electro. Commerce Res. Appl. 7, 330--340.
[49]
Ziegler, C. N. and Lausen, G. 2004. Spreading activation models for trust propagation. In Proceedings of the IEEE International Conference on E-Technology, E-Commerce, and E-Service.
[50]
Zimmermann, P. R. 1995. The Official PGP User’s Guide. Massachusetts. MIT Press, Cambridge, MA.
[51]
Zipf, G. K. 1949. Human Behavior and the Principle of Least Effort. Addison-Wesley Press, Reading, MA.

Cited By

View all
  • (2023)Architecture and Governance of Digital Business Ecosystems: A Systematic Literature ReviewInformation Systems Management10.1080/10580530.2023.219406341:1(58-90)Online publication date: 24-Mar-2023
  • (2022)Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technologyInternational Journal of Information Security10.1007/s10207-021-00561-821:3(527-546)Online publication date: 1-Jun-2022
  • (2017)A User Trust System for Online Games—Part II: A Subjective Logic Approach for Trust InferenceIEEE Transactions on Computational Intelligence and AI in Games10.1109/TCIAIG.2016.25930009:4(354-368)Online publication date: Dec-2017
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Transactions on Internet Technology
ACM Transactions on Internet Technology  Volume 12, Issue 3
May 2013
94 pages
ISSN:1533-5399
EISSN:1557-6051
DOI:10.1145/2461321
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 May 2013
Accepted: 01 February 2013
Revised: 01 November 2012
Received: 01 May 2012
Published in TOIT Volume 12, Issue 3

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. Trust
  2. digital environments online communities
  3. reputation
  4. trust models

Qualifiers

  • Research-article
  • Research
  • Refereed

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)13
  • Downloads (Last 6 weeks)1
Reflects downloads up to 15 Jan 2025

Other Metrics

Citations

Cited By

View all
  • (2023)Architecture and Governance of Digital Business Ecosystems: A Systematic Literature ReviewInformation Systems Management10.1080/10580530.2023.219406341:1(58-90)Online publication date: 24-Mar-2023
  • (2022)Insider attack mitigation in a smart metering infrastructure using reputation score and blockchain technologyInternational Journal of Information Security10.1007/s10207-021-00561-821:3(527-546)Online publication date: 1-Jun-2022
  • (2017)A User Trust System for Online Games—Part II: A Subjective Logic Approach for Trust InferenceIEEE Transactions on Computational Intelligence and AI in Games10.1109/TCIAIG.2016.25930009:4(354-368)Online publication date: Dec-2017
  • (2016)Are the most popular users always trustworthy? The case of YelpElectronic Commerce Research and Applications10.1016/j.elerap.2016.09.00520:C(30-41)Online publication date: 1-Nov-2016
  • (2015)A Reputation-Based Identity Management Model for Cloud ComputingMathematical Problems in Engineering10.1155/2015/2382452015(1-15)Online publication date: 2015
  • (2014)A security extension for securing the feedback & rating values in TIDE frameworkProceedings of International Conference on Information, Communication Technology and System (ICTS) 201410.1109/ICTS.2014.7010588(227-232)Online publication date: Sep-2014
  • (2014)An incentive compatible reputation mechanism for P2P systemsThe Journal of Supercomputing10.1007/s11227-014-1204-z69:3(1382-1409)Online publication date: 1-Sep-2014

View Options

Login options

Full Access

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media