Skip to main content
Log in

CellTrust: a reputation model for C2C commerce

  • Published:
Electronic Commerce Research Aims and scope Submit manuscript

Abstract

The improvement of wireless technologies and the increasing spread of mobile phones open new possibilities to perform mobile Customer-to-Customer commercial activities. In this new scenario, where users cannot rely on stable connections, it assumes a great relevance how to trust the counterpart in a transaction and how to avoid that a disconnection, possible in wireless connections, can encourage users to cheat. To tackle these issues we propose a feedback-based reputation mechanism able to detect malicious users better than other state-of-the-art techniques, as shown by the large number of experiments run to measure the accuracy of the compared methods in the most common situations.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In HICSS ’00: Proceedings of the 33rd Hawaii international conference on system sciences (Vol. 6). Washington: IEEE Computer Society.

    Google Scholar 

  2. Aberer, K. (2001). P-grid: A self-organizing access structure for P2P information retrieval. In Lecture notes in computer science : Vol. 2172. COOPIS 2001: Proceedings of the ninth international conference on cooperative information systems (pp. 179–194). London: Springer.

    Google Scholar 

  3. Arboit, G., Crépeau, C., Davis, C. R., & Maheswaran, M. (2008). A localized certificate revocation scheme for mobile ad hoc networks. Ad Hoc Networks, 6(1), 17–31.

    Article  Google Scholar 

  4. Avancha, S., D’Souza, P., Perich, F., Joshi, A., & Yesha, Y. (2003). P2P M-commerce in pervasive environments. SIGecom Exchange, 3(4), 1–9.

    Article  Google Scholar 

  5. Banks, M. (2005). The eBay survival guide: How to make money and avoid losing your shirt. San Francisco: No Starch Press.

    Google Scholar 

  6. Birk, A. (2000). Boosting cooperation by evolving trust. Applied Artificial Intelligence, 14(8), 769–784.

    Article  Google Scholar 

  7. Buchegger, S., & Le Boudec, J. Y. (2004). A robust reputation system for P2P and mobile ad-hoc networks. In P2PEcon 2004: Proceedings of the 2nd workshop on the economics of peer-to-peer systems. Harvard, MA, USA.

  8. Carbó, J., Molina, J. M., & Dávila, J. Trust management through fuzzy reputation. Journal of Cooperative Information Systems.

  9. Carbó, J., Molina, J. M., & Dávila, J. (2005). Fuzzy referral based cooperation in social networks of agents. AI Commun., 18(1), 1–13.

    Google Scholar 

  10. Chinni, S., Thomas, J., Ghinea, G., & Shen, Z. (2008). Trust model for certificate revocation in ad hoc networks. Ad Hoc Networks, 6(3), 441–457.

    Article  Google Scholar 

  11. Conte, R., & Paolucci, M. (2002). Reputation in artificial societies: Social beliefs for social order. Hingham: Kluwer Academic.

    Google Scholar 

  12. Dellarocas, C. (2003). The digitization of word of mouth: promise and challenges of online feedback mechanisms. Management Science, 49(10), 1407–1424.

    Article  Google Scholar 

  13. Despotovic, Z., & Aberer, K. (2006). P2P reputation management: probabilistic estimation vs. social networks. Computer Networks, 50(4), 485–500.

    Article  Google Scholar 

  14. Falcone, R., & Castelfranchi, C. (2001). Social trust: a cognitive approach. Norwell: Kluwer Academic.

    Google Scholar 

  15. Falcone, R., & Castelfranchi, C. (2001). The socio-cognitive dynamics of trust: Does trust create trust? In Proceedings of the workshop on deception, fraud, and trust in agent societies held during the autonomous agents conference (pp. 55–72). London: Springer.

    Google Scholar 

  16. Grandison, T., & Sloman, M. (2000). A survey of trust in Internet application. IEEE Communication Surveys. Fourth quarter.

  17. Housley, R., Polk, W., Ford, W., & Solo, D. (2002). RFC 3280—Internet X. 509 public key infrastructure certificate and certificate revocation list (CRL) profile. http://www.faqs.org/rfcs/rfc3280.html.

  18. http://auctions.amazon.com (2008).

  19. http://grouper.ieee.org/groups/802/11/index.html (2008).

  20. http://www.bluetooth.com (2008).

  21. http://www.ebay.com (2008).

  22. Huynh, T. D., Jennings, N. R., & Shadbolt, N. R. (2006). An integrated trust and reputation model for open multi-agent system. Autonomous Agent and Multi Agent Systems, 13, 119–154.

    Article  Google Scholar 

  23. Josang, A., Gray, E., & Kinateder, M. (2006). Simplification and analysis of transitive trust networks. Web Intelligence and Agent Systems, 4(2), 139–161.

    Google Scholar 

  24. Josang, A., Ismail, R., & Boyd, C. (2005). A survey of trust and reputation systems for online service provision. Decision Support System, 43(2), 618–644.

    Article  Google Scholar 

  25. Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in P2P networks. In WWW ’03: Proceedings of the 12th international conference on World Wide Web (pp. 640–651). New York: ACM.

    Google Scholar 

  26. Karp, D. A. (2003). eBay Hacks: 100 industrial-strength tips & tools. San Francisco: O’Reilly Media.

    Google Scholar 

  27. Kleist, V. F. (2004). A transaction cost model of electronic trust: transactional return, incentives for network security and optimal risk in the digital economy. Electronic Commerce Research, 4(1–2), 41–57.

    Article  Google Scholar 

  28. Kong, J., Luo, H., Xu, K., Gu, D. L., Gerla, M., & Lu, S. (2002). Adaptive security for multi-layer ad-hoc networks. Wireless Communication and Mobile Computing, 2, 533–547.

    Article  Google Scholar 

  29. Lax, G., & Sarné, G. M. L. (2006). Blue: a reputation-based multi-agent system to support C2C in P2P bluetooth networks. In ICE-B 2006: Proceedings of the international conference on E-business (pp. 97–104).

  30. Marsh, S. P. (1994). Formalizing trust as a computational concept. Ph.D. thesis, Department of Computing Science and Mathematics, University of Stirling.

  31. Marti, S., & Garcia-Molina, H. (2006). Taxonomy of trust: categorizing P2P reputation systems. Computer Networks, 50(4), 472–484.

    Article  Google Scholar 

  32. Massa, P. (2006). A survey of trust use and modeling in current real systems. In: Song, R., Korba, L., Yee, G. (Eds.), Trust in E-services: Technologies, practices and challenges. Idea Group Publishing.

  33. Misra, S. K., & Wickamasinghe, N. (2004). Security of a mobile transaction: a trust model. Electronic Commerce Research, 4(4), 359–372.

    Article  Google Scholar 

  34. Misztal, B. M. (1996). Trust in modern societies. Cambridge: Polity.

    Google Scholar 

  35. Mui, L., Mohtashemi, M., & Halberstadt, A. (2002). Notions of reputation in multi-agents systems: a review. In Proceedings of the first international joint conference on autonomous agents and multiagent systems (AAMAS ’02) (pp. 280–287). New York: ACM.

    Chapter  Google Scholar 

  36. Mundinger, J., & Le Boudec, J. Y. (2005). The impact of liars on reputation in social networks. In Proceedings of social network analysis: advances and empirical application forum.

  37. Myers, M., Ankney, R., Malpani, A., Galperin, S., & Adams, C. (1999). RFC 2560—X. 509 Internet public key infrastructure online certificate status protocol—OCSP. http://www.faqs.org/rfcs/rfc2560.html.

  38. O’Mahony, D., Pierce, M., & Tewari, H. (2001). Electronic payment systems for E-commerce. Norwood: Artech House.

    Google Scholar 

  39. Ondrus, J., & Pigneur, Y. (2006). Towards a holistic analysis of mobile payments: a multiple perspectives approach. Electronic Commerce Research and Applications, 5(3), 246–257.

    Article  Google Scholar 

  40. Patton, M. A., & Josang, A. (2004). Technologies for trust in electronic commerce. Electronic Commerce Research, 4(1–2), 9–21.

    Article  Google Scholar 

  41. Perich, F., Joshi, A., Yesha, Y., & Finin, T. (2003). Neighborhood-consistent transaction management for pervasive computing environments. In Lecture notes in computer science : Vol. 2736. Proceedings of the 14th international conference on database and expert systems applications (DEXA 2003) (pp. 276–286). Berlin: Springer.

    Google Scholar 

  42. Perich, F., Undercoffer, J., Kagal, L., Joshi, A., Finin, T., & Yesha, Y. (2004). In reputation we believe: query processing in mobile ad-hoc networks. In Proceedings of the first annual international conference on mobile and ubiquitous systems: Networking and services (MOBIQUITOUS 2004) (pp. 326–334). Baltimore: Maryland University Press.

    Chapter  Google Scholar 

  43. Ramchurn, S. D., Huynh, D., & Jennings, N. R. (2004). Trust in multi-agent systems. Knowledge Engineering Review, 19(1), 1–25.

    Google Scholar 

  44. Ravi, S., Raghunathan, A., Kocher, P., & Hattangady, S. (2004). Security in embedded systems: design challenges. Transactions on Embedded Computing Systems, 3(3), 461–491.

    Article  Google Scholar 

  45. Reichling, F. (2004). Effects of reputation mechanisms on fraud. Prevention in eBay auctions. Thesis. Stanford University.

  46. Resnick, P., & Zeckhauser, R. (2002). Trust among strangers in Internet transactions: Empirical analysis of eBay’s reputation system. In M. R. Baye (Ed.), Advances in Applied Microeconomics : Vol. 11. The economics of the Internet and E-commerce. Amsterdam: Elsevier Science.

    Chapter  Google Scholar 

  47. Resnick, P., Zeckhauser, R., Friedman, E., & Kuwabara, K. (2000). Reputation systems. Communicatons of ACM, 43(12), 45–48.

    Article  Google Scholar 

  48. Rietjens, B. (2006). Trust and reputation on eBay: Towards a legal framework for feedback intermediaries. Information & Communications Technology Law, 15(1), 55–78.

    Article  Google Scholar 

  49. Sabater, J., & Sierra, C. (2001). REGRET: Reputation in Gregarious societies. In AGENTS ’01: Proceedings of the fifth international conference on autonomous agents (pp. 194–195). New York: ACM.

    Chapter  Google Scholar 

  50. Sabater, J., & Sierra, C. (2005). Review on computational trust and reputation models (pp. 33–60). Norwell: Kluwer Academic.

    Google Scholar 

  51. Serrano-Alvarado, P., Roncancio, C., & Adiba, M. (2004). A survey of mobile transactions. Distributed Parallel Databases, 16(2), 193–230.

    Article  Google Scholar 

  52. Shaked, Y., & Wool, A. (2005). Cracking the bluetooth PIN. In Proceedings of the 3rd international conference on mobile systems, applications, and services (MobiSys ’05) (pp. 39–50). New York: ACM.

    Chapter  Google Scholar 

  53. Sherwood, R., Lee, S., & Bhattacharjee, B. (2006). Cooperative peer groups in NICE. Computer Networks, 50(4), 523–544.

    Article  Google Scholar 

  54. Song, S., Hwang, K., Zhou, R., & Kwok, Y. K. (2005). Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Computing, 9(6), 24–34.

    Article  Google Scholar 

  55. Tan, Y. H., & Thoen, W. (2000). An outline of a trust model for electronic commerce. Applied Artificial Intelligence, 14(8), 849–862.

    Article  Google Scholar 

  56. Veijalainen, J., Terziyan, V. Y., & Tirri, H. (2006). Transaction management for M-commerce at a mobile terminal. Electronic Commerce Research and Applications, 5(3), 229–245.

    Article  Google Scholar 

  57. Wang, Y. F., Hori, Y., & Sakurai, K. (2008). Characterizing economic and social properties of trust and reputation systems in P2P environment. Journal of Computer Science and Technology, 23(1), 129–140.

    Article  Google Scholar 

  58. Xiong, L., & Liu, L. (2004). PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7), 843–857.

    Article  Google Scholar 

  59. Zacharia, G., & Maes, P. (2000). Trust management through reputation mechanisms. Applied Artificial Intelligence, 14(9), 881–907.

    Article  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Gianluca Lax.

Additional information

An abridged version of this paper appeared in Proceedings of the ICE-B International Conference on E-Business 2006 (ICE-B 2006) 29.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lax, G., Sarné, G.M.L. CellTrust: a reputation model for C2C commerce. Electron Commer Res 8, 193–216 (2008). https://doi.org/10.1007/s10660-008-9019-8

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10660-008-9019-8

Keywords

Navigation