Abstract
Reputation management is a powerful security tool that helps establish the trustworthiness of users in online applications. One of the most successful uses of reputation systems is on e-commerce web sites such as eBay.com and Amazon.com, which use reputation systems to root out fraudulent sellers. Reputation systems can also play an important role in social networks to enforce various security requirements. For example, a reputation system can help filter fake user profiles. However, a major challenge in developing reputation systems for social networks is that users often hesitate to publicly rate fellow users or friends due to the fear of retaliation. This trend prevents a reputation system from accurately computing reputation scores. Privacy preserving reputation systems hide the individual ratings of users about others and only reveal the aggregated community reputation score thus allowing users to rate without the fear of retaliation. In this chapter, we describe privacy preserving reputation management in social networks and the associated challenges. In particular, we look at privacy preserving reputation management in decentralized social networks, where there is no central authority or trusted third parties, thus making the task of preserving privacy particularly challenging.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Amirbekyan, A., Estivill-Castro, V.: A new efficient privacy-preserving scalar product protocol. In: Proceedings of the Sixth Australasian Conference on Data Mining and Analytics, 2007
Androulaki, E., Choi, S.G., Bellovin, S.M., Malkin, T.: Reputation systems for anonymous networks. In: Proc. of PETS’08, 2008
Atallah, M.J., Du, W.: Secure multi-party computational geometry. In: Proceedings of the Seventh International Workshop on Algorithms and Data Structures (WADS 2001), 2001
Belenkiy, M., Chase, M., Erway, C.C., Jannotti, J., Kupcu, A., Lysyanskaya, A., Rachlin, E.: Making p2p accountable without losing privacy. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, 2007
Belenkiy, M., Chase, M., Kohlweiss, M., Lysyanskaya, A.: P-signatures and noninteractive anonymous credentials. In: Theory of Cryptography, 2008
Bertino, E., Ferrari, E., Squicciarini, A.C.: Trust-x: A peer-to-peer framework for trust establishment. IEEE Trans. Knowl. Data Eng. 16(7), 827–842 (2004)
Bigley, G.A., Pearce, J.L.: Straining for shared meaning in organization science: Problems of trust and distrust. Acad. Manag. Rev. 23(3), 405–421 (1998)
Bo, Y., Min, Z., Guohuan, L.: A reputation system with privacy and incentive. In: Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing (SNPD’07), 2007
Burt, R.: Structural Holes: The Social Structure of Competition. Harvard University Press, Cambridge (1995)
Camenisch, J., Lysyanskaya, A.: An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In: EUROCRYPT 2001, 2001
Camenisch, J., Lysyanskaya, A., Meyerovich, M.: Endorsed e-cash. In: Proceedings of the IEEE Symposium on Security and Privacy, 2007
Capra, L.: Engineering human trust in mobile system collaborations. In: Proceedings of the 12th ACM SIGSOFT International Symposium on Foundations of Software Engineering, Newport Beach, CA, USA, 2004
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Comm. ACM 24(2), 84–88 (1981)
Chaum, D.: Blind signatures for untraceable payments. In: Proc. Advances in Cryptology (CRYPTO ’82), 1982
Chaum, D.: Blind signature systems. In: Advances in Cryptology (CRYPTO’83), 1983
Clifton, C., Kantarcioglu, M., Vaidya, J., Lin, X., Zhu, M.Y.: Tools for privacy preserving distributed data mining. SIGKDD Explor. 4(2), 28–34 (2003)
Dingledine, R., Freedman, M.J., Hopwood, D., Molnar, D.: A reputation system to increase mix-net reliability. In: Proceedings of the 4th International Workshop on Information Hiding, 2001
Dingledine, R., Mathewson, N., Syverson, P.: Reputation in privacy enhancing technologies. In: Proceedings of the 12th Annual Conference on Computers, Freedom and Privacy, 2002
Dingledine, R., Mathewson, N., Syverson, P.: Reputation in p2p anonymity systems. In: Proceedings of the Workshop on Economics of Peer-to-Peer Systems, 2003
Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: The second-generation onion router. In: Proceedings of the USENIX Security Symposium, 2004
Du, W.: A study of several specific secure two-party computation problems. PhD thesis, Purdue University, West Lafayette, IN (2001)
ElGamal, T.: A public-key cryptosystem and a signature scheme based on discrete logarithms. IEEE Trans. Inform. Theor IT-31(4), 469–472 (1985)
Gal-Oz, N., Gudes, E., Hendler, D.: A robust and knot-aware trust-based reputation model. In: Proceedings of the Joint iTrust and PST Conferences on Privacy, Trust Management and Security (IFIPTM 2008), 2008
Gambetta, D.: Trust: Making and Breaking Cooperative Relations, chapter Can We Trust Trust? pp. 213–237. University of Oxford, Oxford (2000)
Gilbert, E., Karahalios, K.: Predicting tie strength with social media. In: Proceedings of the Conferece on Human Factors in Computing Systems (CHI’09), 2009
Goldreich, O.: The Foundations of Crypto. - Vol. 2. Cambridge University Press, Cambridge (2004)
Granovetter, M.: The strength of weak ties. Am. J. Sociol. 78, 1360–1380 (1973)
Gudes, E., Gal-Oz, N., Grubshtein, A.: Methods for computing trust and reputation while preserving privacy. In: Proc. of DBSec’09, 2009
Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the International World Wide Web Conference (WWW 2004), 2004
Hasan, O., Bertino, E., Brunie, L.: Efficient privacy preserving reputation protocols inspired by secure sum. In: Proceedings of the 8th International Conference on Privacy, Security and Trust (PST 2010), Ottawa, Canada, August 17–19 2010
Hasan, O., Brunie, L., Bertino, E.: k-shares: A privacy preserving reputation protocol for decentralized environments. In: Proceedings of the 25th IFIP International Information Security Conference (SEC 2010), pp. 253–264, Brisbane, Australia, September 20–23 2010
Hasan, O., Brunie, L., Bertino, E.: Preserving privacy of feedback providers in decentralized reputation systems. Comput. Secur. 31(7), 816–826 (2012)
Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 41(4) (2009)
Homans, G.: The Human Group. Harcourt, Brace, & World, New York (1950)
Ioannidis, I., Grama, A., Atallah, M.: A secure protocol for computing dot-products in clustered and distributed environments. In: Proceedings of the 2002 International Conference on Parallel Processing, 2002
Josang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, Bled, Slovenia, 2002
Kinateder, M., Pearson, S.: A privacy-enhanced peer-to-peer reputation system. In: Proc. of the 4th Intl. Conf. on E-Commerce and Web Technologies, 2003
Kinateder, M., Terdic, R., Rothermel, K.: Strong pseudonymous communication for peer-to-peer reputation systems. In: Proceedings of the 2005 ACM Symposium on Applied computing, 2005
Kissner, L.: Privacy-preserving distributed information sharing. PhD thesis, Computer Science Department, Carnegie Mellon University, PA, USA, July 2006. CMU-CS-06-149
Lin, N., Ensel, W.M., Vaughn, J.C.: Social resources and strength of ties: Structural factors in occupational status attainment. Am. Socio. Rev. 46(4), 393–405 (1981)
Marsden, P.V., Campbell, K.E.: Measuring tie-strength. Social Forces 63, 482–501 (1984)
McKnight, D.H., Cummings, L.L., Chervany, N.L.: Initial trust formation in new organizational relationships. Acad. Manag. Rev. 23(3), 473–490 (1998)
Mika, P., Gangemi, A.: Descriptions of social relations. Technical report, Department of Business Informatics, Free University Amsterdam, The Netherlands, Retrieved February 17, 2011
Mitchell, C. (ed.): Trusted computing. The Institution of Engineering and Technology, Stevenage, Herts., SG1 2AY, UK (2005)
Nin, J., Carminati, B., Ferrari, E., Torra, V.: Computing reputation for collaborative private networks. In: Proceedings of the 33rd Annual IEEE International Computer Software and Applications Conference, 2009
Pavlov, E., Rosenschein, J.S., Topol, Z.: Supporting privacy in decentralized additive reputation systems. In: Proceedings of the Second International Conference on Trust Management (iTrust 2004), Oxford, UK, 2004
Pearson, S., Balacheff, B. (eds.): Trusted Computing Platforms: TCPA Technology in Context. Prentice Hall, Upper Saddle River, NJ 07458, USA (2003)
Pedersen, T.P.: Non-interactive and information-theoretic secure verifiable secret sharing. In: Proceedings of the 11th Annual International Cryptology Conference on Advances in Cryptology, 1991
Pennebaker, J.W., Francis, M.E., Booth, R.: Linguistic Inquiry and Word Count: LIWC2001. Erlbaum Publishers, Mahwah, NJ (2001)
Petroczi, A., Nepusz, T., Bazso, F.: Measuring tie-strength in virtual social networks. Connections 27(2), 39–52 (2007)
Pingel, F., Steinbrecher, S.: Multilateral secure cross-community reputation systems for internet communities. In: Proceedings of the Fifth International Conference on Trust and Privacy in Digital Business (TrustBus 2008), 2008
Pouwelse, J.A., Garbacki, P., Epema, D.H.J., Sips, H.J.: The bittorrent p2p file-sharing system: Measurements and analysis. In: Peer-to-Peer Systems IV, 2005
Resnick, P., Zeckhauser, R.: Trust among strangers in internet transactions: empirical analysis of ebay’s reputation system. In: Volume 11 of Advances in Applied Microeconomics, pp. 127–157, 2002
Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation systems. Comm. ACM 43(12), 45–48 (2000)
Schiffner, S., Clauß, S., Steinbrecher, S.: Privacy and liveliness for reputation systems. In: Proc. of EuroPKI’09, pp. 209–224, 2009
Steinbrecher, S.: Design options for privacy-respecting reputation systems. In: Security and Privacy in Dynamic Environments, 2006
Voss, M., Heinemann, A., Muhlhauser, M.: A privacy preserving reputation system for mobile information dissemination networks. In: Proceedings of the First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM), 2005
Wellman, B., Wortley, S.: Different strokes from different folks: community ties and social support. Am. J. Sociol. 96(3), 558–588 (1990)
Yao, A.C.: Protocols for secure computations. In: Proceedings of the 23rd Annual Symposium on Foundations of Computer Science, 1982
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2013 Springer-Verlag Wien
About this chapter
Cite this chapter
Hasan, O., Brunie, L. (2013). Privacy Preserving Reputation Management in Social Networks. In: Chbeir, R., Al Bouna, B. (eds) Security and Privacy Preserving in Social Networks. Lecture Notes in Social Networks. Springer, Vienna. https://doi.org/10.1007/978-3-7091-0894-9_8
Download citation
DOI: https://doi.org/10.1007/978-3-7091-0894-9_8
Published:
Publisher Name: Springer, Vienna
Print ISBN: 978-3-7091-0893-2
Online ISBN: 978-3-7091-0894-9
eBook Packages: Computer ScienceComputer Science (R0)