Trust-based Collection of Information in Distributed Reputation Networks

被引:2
|
作者
Gkorou, Dimitra [1 ]
Pouwelse, Johan [1 ]
Epema, Dick [1 ]
机构
[1] EEMCS, Parallel & Distributed Syst, Mekelweg 4, NL-2628 CD Delft, Netherlands
关键词
D O I
10.1145/2695664.2695868
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Distributed reputation systems establish trust among strangers in online communities and provide incentives for users to contribute. In these systems, each user monitors the interactions of others and computes the reputations accordingly. Collecting information for computing the reputations is challenging for the users due to their vulnerability to attacks, their limited resources, and the burst of their interactions. The low cost of creating accounts in most reputation systems makes them popular to million of users, but also enables malicious users to boost their reputations by performing Sybil attacks. Furthermore, the burst of user interactions causes an information overload. To avoid the impact of malicious users and information overload, we propose EscapeLimit, a sybil attack-resistant, computationally simple, and fully distributed method for information collection. EscapeLimit leverages user interactions as indicators of trust and similarity between the corresponding users, and collects relevant and trusted information by limiting the escape probability into the Sybil area. We evaluate it by emulating interaction patterns derived from synthetic and real-world networks. Our evaluation shows EscapeLimit's effectiveness in terms of its resilience to Sybil attacks, its scalability, and its ability to provide relevant information to each user.
引用
收藏
页码:2312 / 2319
页数:8
相关论文
共 50 条
  • [1] On the evaluation of reputation and trust-based schemes in mobile ad hoc networks
    Abbas, Sohail
    Merabti, Madjid
    Llewellyn-Jones, David
    [J]. SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4041 - 4052
  • [2] Distributed Trust-Based Monitoring Approach for Fog/Cloud Networks
    Ben Daoud, Wided
    Meddeb-Makhlouf, Amel
    Zarai, Faouzi
    Obaidat, Mohammad S.
    [J]. EMERGING RESEARCH IN DATA ENGINEERING SYSTEMS AND COMPUTER COMMUNICATIONS, CCODE 2019, 2020, 1054 : 55 - 65
  • [3] TRUST-BASED NAVIGATION IN DISTRIBUTED SYSTEMS
    YAHALOM, R
    KLEIN, B
    BETH, T
    [J]. COMPUTING SYSTEMS, 1994, 7 (01): : 45 - 73
  • [4] Exploiting Trust-Based Social Networks for Distributed Protection of Sensitive Data
    Xu, Shouhuai
    Li, Xiaohu
    Parker, Timothy Paul
    Wang, Xueping
    [J]. IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2011, 6 (01) : 39 - 52
  • [5] An Efficient Trust-based Reputation Protocol for Wireless and Mobile Ad hoc Networks: Proof and Correctness
    Ren, Yonglin
    Boukerche, Azzedine
    [J]. GLOBECOM 2008 - 2008 IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, 2008,
  • [6] A Trust-Based Distributed Data Fault Detection Algorithm for Wireless Sensor Networks
    Taghikhaki, Zahra
    Sharifi, Mohsen
    [J]. 2008 11TH INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY: ICCIT 2008, VOLS 1 AND 2, 2008, : 893 - 898
  • [7] Building Trust-Based Sustainable Networks
    Cho, Jin-Hee
    Chan, Kevin S.
    [J]. IEEE TECHNOLOGY AND SOCIETY MAGAZINE, 2013, 32 (02) : 32 - 38
  • [8] TRAST: Trust-Based Distributed Topology Management for Wireless Multimedia Sensor Networks
    Mali, Goutam
    Misra, Sudip
    [J]. IEEE TRANSACTIONS ON COMPUTERS, 2016, 65 (06) : 1978 - 1991
  • [9] A trust-based reputation system in peer-to-peer grid
    Xiong, Zenggang
    Yang, Yang
    Zhang, Xuemin
    Yu, Dairong
    Lu, Li
    [J]. ONLINE COMMUNITIES AND SOCIAL COMPUTING, PROCEEDINGS, 2007, 4564 : 228 - +
  • [10] PathTrust: A trust-based reputation service for virtual organization formation
    Kerschbaum, Florian
    Haller, Jochen
    Karabulut, Yucel
    Robinson, Philip
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 193 - 205