Skip to main content

Privacy Preserving Reputation Management in Social Networks

  • Chapter
  • First Online:
Security and Privacy Preserving in Social Networks

Part of the book series: Lecture Notes in Social Networks ((LNSN))

  • 2571 Accesses

Abstract

Reputation management is a powerful security tool that helps establish the trustworthiness of users in online applications. One of the most successful uses of reputation systems is on e-commerce web sites such as eBay.com and Amazon.com, which use reputation systems to root out fraudulent sellers. Reputation systems can also play an important role in social networks to enforce various security requirements. For example, a reputation system can help filter fake user profiles. However, a major challenge in developing reputation systems for social networks is that users often hesitate to publicly rate fellow users or friends due to the fear of retaliation. This trend prevents a reputation system from accurately computing reputation scores. Privacy preserving reputation systems hide the individual ratings of users about others and only reveal the aggregated community reputation score thus allowing users to rate without the fear of retaliation. In this chapter, we describe privacy preserving reputation management in social networks and the associated challenges. In particular, we look at privacy preserving reputation management in decentralized social networks, where there is no central authority or trusted third parties, thus making the task of preserving privacy particularly challenging.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Amirbekyan, A., Estivill-Castro, V.: A new efficient privacy-preserving scalar product protocol. In: Proceedings of the Sixth Australasian Conference on Data Mining and Analytics, 2007

    Google Scholar 

  2. Androulaki, E., Choi, S.G., Bellovin, S.M., Malkin, T.: Reputation systems for anonymous networks. In: Proc. of PETS’08, 2008

    Google Scholar 

  3. Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Proceedings of the Seventh International Workshop on Algorithms and Data Structures (WADS 2001), 2001

    Google Scholar 

  4. Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Kupcu, A., Lysyanskaya, A., Rachlin, E.: Making p2p accountable without losing privacy. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, 2007

    Google Scholar 

  5. Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Theory of Cryptography, 2008

    Google Scholar 

  6. Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-x: A peer-to-peer framework for trust establishment. IEEE Trans. Knowl. Data Eng. 16(7), 827–842 (2004)

    Article  Google Scholar 

  7. Bigley, G.A., Pearce, J.L.: Straining for shared meaning in organization science: Problems of trust and distrust. Acad. Manag. Rev. 23(3), 405–421 (1998)

    Google Scholar 

  8. Bo, Y., Min, Z., Guohuan, L.: A reputation system with privacy and incentive. In: Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD’07), 2007

    Google Scholar 

  9. Burt, R.: Structural Holes: The Social Structure of Competition. Harvard University Press, Cambridge (1995)

    Google Scholar 

  10. Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: EUROCRYPT 2001, 2001

    Google Scholar 

  11. Camenisch, J., Lysyanskaya, A., Meyerovich, M.: Endorsed e-cash. In: Proceedings of the IEEE Symposium on Security and Privacy, 2007

    Google Scholar 

  12. Capra, L.: Engineering human trust in mobile system collaborations. In: Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Newport Beach, CA, USA, 2004

    Google Scholar 

  13. Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 24(2), 84–88 (1981)

    Article  Google Scholar 

  14. Chaum, D.: Blind signatures for untraceable payments. In: Proc. Advances in Cryptology (CRYPTO ’82), 1982

    Google Scholar 

  15. Chaum, D.: Blind signature systems. In: Advances in Cryptology (CRYPTO’83), 1983

    Google Scholar 

  16. Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. SIGKDD Explor. 4(2), 28–34 (2003)

    Article  Google Scholar 

  17. Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A reputation system to increase mix-net reliability. In: Proceedings of the 4th International Workshop on Information Hiding, 2001

    Google Scholar 

  18. Dingledine, R., Mathewson, N., Syverson, P.: Reputation in privacy enhancing technologies. In: Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002

    Google Scholar 

  19. Dingledine, R., Mathewson, N., Syverson, P.: Reputation in p2p anonymity systems. In: Proceedings of the Workshop on Economics of Peer-to-Peer Systems, 2003

    Google Scholar 

  20. Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: Proceedings of the USENIX Security Symposium, 2004

    Google Scholar 

  21. Du, W.: A study of several specific secure two-party computation problems. PhD thesis, Purdue University, West Lafayette, IN (2001)

    Google Scholar 

  22. ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theor IT-31(4), 469–472 (1985)

    Article  MathSciNet  Google Scholar 

  23. Gal-Oz, N., Gudes, E., Hendler, D.: A robust and knot-aware trust-based reputation model. In: Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2008), 2008

    Google Scholar 

  24. Gambetta, D.: Trust: Making and Breaking Cooperative Relations, chapter Can We Trust Trust? pp. 213–237. University of Oxford, Oxford (2000)

    Google Scholar 

  25. Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: Proceedings of the Conferece on Human Factors in Computing Systems (CHI’09), 2009

    Google Scholar 

  26. Goldreich, O.: The Foundations of Crypto. - Vol. 2. Cambridge University Press, Cambridge (2004)

    Google Scholar 

  27. Granovetter, M.: The strength of weak ties. Am. J. Sociol. 78, 1360–1380 (1973)

    Article  Google Scholar 

  28. Gudes, E., Gal-Oz, N., Grubshtein, A.: Methods for computing trust and reputation while preserving privacy. In: Proc. of DBSec’09, 2009

    Google Scholar 

  29. Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the International World Wide Web Conference (WWW 2004), 2004

    Google Scholar 

  30. Hasan, O., Bertino, E., Brunie, L.: Efficient privacy preserving reputation protocols inspired by secure sum. In: Proceedings of the 8th International Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, August 17–19 2010

    Google Scholar 

  31. Hasan, O., Brunie, L., Bertino, E.: k-shares: A privacy preserving reputation protocol for decentralized environments. In: Proceedings of the 25th IFIP International Information Security Conference (SEC 2010), pp. 253–264, Brisbane, Australia, September 20–23 2010

    Google Scholar 

  32. Hasan, O., Brunie, L., Bertino, E.: Preserving privacy of feedback providers in decentralized reputation systems. Comput. Secur. 31(7), 816–826 (2012)

    Article  Google Scholar 

  33. Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 41(4) (2009)

    Google Scholar 

  34. Homans, G.: The Human Group. Harcourt, Brace, & World, New York (1950)

    Google Scholar 

  35. Ioannidis, I., Grama, A., Atallah, M.: A secure protocol for computing dot-products in clustered and distributed environments. In: Proceedings of the 2002 International Conference on Parallel Processing, 2002

    Google Scholar 

  36. Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, 2002

    Google Scholar 

  37. Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: Proc. of the 4th Intl. Conf. on E-Commerce and Web Technologies, 2003

    Google Scholar 

  38. Kinateder, M., Terdic, R., Rothermel, K.: Strong pseudonymous communication for peer-to-peer reputation systems. In: Proceedings of the 2005 ACM Symposium on Applied computing, 2005

    Google Scholar 

  39. Kissner, L.: Privacy-preserving distributed information sharing. PhD thesis, Computer Science Department, Carnegie Mellon University, PA, USA, July 2006. CMU-CS-06-149

    Google Scholar 

  40. Lin, N., Ensel, W.M., Vaughn, J.C.: Social resources and strength of ties: Structural factors in occupational status attainment. Am. Socio. Rev. 46(4), 393–405 (1981)

    Article  Google Scholar 

  41. Marsden, P.V., Campbell, K.E.: Measuring tie-strength. Social Forces 63, 482–501 (1984)

    Google Scholar 

  42. McKnight, D.H., Cummings, L.L., Chervany, N.L.: Initial trust formation in new organizational relationships. Acad. Manag. Rev. 23(3), 473–490 (1998)

    Google Scholar 

  43. Mika, P., Gangemi, A.: Descriptions of social relations. Technical report, Department of Business Informatics, Free University Amsterdam, The Netherlands, Retrieved February 17, 2011

    Google Scholar 

  44. Mitchell, C. (ed.): Trusted computing. The Institution of Engineering and Technology, Stevenage, Herts., SG1 2AY, UK (2005)

    Google Scholar 

  45. Nin, J., Carminati, B., Ferrari, E., Torra, V.: Computing reputation for collaborative private networks. In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009

    Google Scholar 

  46. Pavlov, E., Rosenschein, J.S., Topol, Z.: Supporting privacy in decentralized additive reputation systems. In: Proceedings of the Second International Conference on Trust Management (iTrust 2004), Oxford, UK, 2004

    Google Scholar 

  47. Pearson, S., Balacheff, B. (eds.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, Upper Saddle River, NJ 07458, USA (2003)

    Google Scholar 

  48. Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, 1991

    Google Scholar 

  49. Pennebaker, J.W., Francis, M.E., Booth, R.: Linguistic Inquiry and Word Count: LIWC2001. Erlbaum Publishers, Mahwah, NJ (2001)

    Google Scholar 

  50. Petroczi, A., Nepusz, T., Bazso, F.: Measuring tie-strength in virtual social networks. Connections 27(2), 39–52 (2007)

    Google Scholar 

  51. Pingel, F., Steinbrecher, S.: Multilateral secure cross-community reputation systems for internet communities. In: Proceedings of the Fifth International Conference on Trust and Privacy in Digital Business (TrustBus 2008), 2008

    Google Scholar 

  52. Pouwelse, J.A., Garbacki, P., Epema, D.H.J., Sips, H.J.: The bittorrent p2p file-sharing system: Measurements and analysis. In: Peer-to-Peer Systems IV, 2005

    Google Scholar 

  53. Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: empirical analysis of ebay’s reputation system. In: Volume 11 of Advances in Applied Microeconomics, pp. 127–157, 2002

    Google Scholar 

  54. Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Comm. ACM 43(12), 45–48 (2000)

    Article  Google Scholar 

  55. Schiffner, S., Clauß, S., Steinbrecher, S.: Privacy and liveliness for reputation systems. In: Proc. of EuroPKI’09, pp. 209–224, 2009

    Google Scholar 

  56. Steinbrecher, S.: Design options for privacy-respecting reputation systems. In: Security and Privacy in Dynamic Environments, 2006

    Google Scholar 

  57. Voss, M., Heinemann, A., Muhlhauser, M.: A privacy preserving reputation system for mobile information dissemination networks. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM), 2005

    Google Scholar 

  58. Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)

    Article  Google Scholar 

  59. Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, 1982

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Omar Hasan .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Wien

About this chapter

Cite this chapter

Hasan, O., Brunie, L. (2013). Privacy Preserving Reputation Management in Social Networks. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_8

Download citation

  • DOI: https://doi.org/10.1007/978-3-7091-0894-9_8

  • Published:

  • Publisher Name: Springer, Vienna

  • Print ISBN: 978-3-7091-0893-2

  • Online ISBN: 978-3-7091-0894-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics