Abstract
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, the calculation of a unique trust value supposed to reflect the overall trustworthiness brought by the set of linked pseudonyms. In fact, some pieces of evidence may overlap and be overcounted, leading to an incorrect trust value. In this approach, self-recommendations are possible during the privacy/trust trade. However, this means that Sybil attacks, where thousands of virtual identities belonging to the same real-world entity recommend each other, are potentially easier to carry out, as self-recommendations are an integral part of the attack. In this paper, trust transfer is used to achieve safe fusionym and protect against Sybil attacks when pieces of evidence are limited to direct observations and recommendations based on the count of event outcomes. Trust transfer implies that recommendations move some of the trustworthiness of the recommending entity to the trustworthiness of the trustee. It is demonstrated and tailored to email anti-spam settings.
Preview
Unable to display preview. Download preview PDF.
Similar content being viewed by others
References
Abadi, M., Birrell, A., Burrows, M., Dabek, F., Wobber, T.: Bankable Postage for Network Services. In: Saraswat, V.A. (ed.) ASIAN 2003. LNCS, vol. 2896, pp. 72–90. Springer, Heidelberg (2003)
Abdul-Rahman, A., Hailes, S.: Using Recommendations for Managing Trust in Distributed Systems. In: Proceedings of the Malaysia International Conference on Communication 1997. IEEE, Los Alamitos (1997)
Brin, S., Page, L.: The Anatomy of a Large-Scale Hypertextual Web Search Engine. Computer Networks 30(1-7) (1998)
Damiani, E., et al.: P2P-Based Collaborative Spam Detection and Filtering. In: Proceedings of the Conference on Peer-to-Peer Computing (2004)
Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, p. 251. Springer, Heidelberg (2002)
Friedman, E., Resnick, P.: The Social Cost of Cheap Pseudonyms. Journal of Economics and Management Strategy 10(2), 173–199 (2001)
Golbeck, J., Hendler, J.: Accuracy of Metrics for Inferring Trust and Reputation in Semantic Web-based Social Networks (2004)
Jøsang, A.: A Subjective Metric of Authentication. In: Quisquater, J.-J., Deswarte, Y., Meadows, C., Gollmann, D. (eds.) ESORICS 1998. LNCS, vol. 1485, pp. 329–344. Springer, Heidelberg (1998)
JUNG, JUNG, the Java Universal Network/Graph Framework, http://jung.sourceforge.net/index.html
Kinateder, M., Rothermel, K.: Architecture and Algorithms for a Distributed Reputation System. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 1–16. Springer, Heidelberg (2003)
Labalme, F., Burton, K.: Enhancing the Internet with Reputations (2001), www.openprivacy.org/papers/200103-white.html
Rochefoucauld, L.: Réflexions (1731)
McKnight, D.H., Chervany, N.L.: What is trust? A Conceptual Analysis and an Interdisciplinary Model. In: Proceedings of AMCIS (2000)
Mogens, N., Carbone, M., Krukow, K.: An Operational Model of Trust, SECURE Deliverable 1.2 (2004), http://secure.dsg.cs.tcd.ie
Romano, D.M.: The Nature of Trust: Conceptual and Operational Clarification. PhD Thesis, Louisiana State University (2003)
Seigneur, J.-M., Jensen, C.D.: Trading Privacy for Trust. In: Jensen, C., Poslad, S., Dimitrakos, T. (eds.) iTrust 2004. LNCS, vol. 2995, pp. 93–107. Springer, Heidelberg (2004)
Stefan, F., Philipp, O.: The Buddy System - A distributed reputation system based on social structure. Technical Report 2004-1, Universitat Karlsruhe
Winsborough, W.H., Seamons, K.E., Jones, V.E.: Automated Trust Negotiation. In: DARPA Information Survivability Conference (2000)
Ziegler, C.-N., Lausen, G.: Spreading Activation Models for Trust Propagation. In: Proceedings of the International Conference on e-Technology. e-Commerce, and e-Service. IEEE, Los Alamitos (2004)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2005 Springer-Verlag Berlin Heidelberg
About this paper
Cite this paper
Seigneur, JM., Gray, A., Jensen, C.D. (2005). Trust Transfer: Encouraging Self-recommendations Without Sybil Attack. In: Herrmann, P., Issarny, V., Shiu, S. (eds) Trust Management. iTrust 2005. Lecture Notes in Computer Science, vol 3477. Springer, Berlin, Heidelberg. https://doi.org/10.1007/11429760_22
Download citation
DOI: https://doi.org/10.1007/11429760_22
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-540-26042-4
Online ISBN: 978-3-540-32040-1
eBook Packages: Computer ScienceComputer Science (R0)