A Survey of Security Issues in Trust and Reputation Systems for E-Commerce

  • Stefan Spitz
  • York Tüchelmann
Part of the Lecture Notes in Computer Science book series (LNCS, volume 6906)


Trust and reputation systems are always subject to attacks if an adversary can gain a benefit in doing so. The list of different attacks against them is extensive. Attacks like bad mouthing, newcomer, sybil, collusion and many more are subject to current research. Some of them present methods that allow to detect adversarial behaviour, hence providing protection against attacks. However, smart adversaries will adapt their behaviour strategies to the existing protection mechanisms and bypass some of the security methods.

In this paper, we discuss the options available to adversaries for achieving their goal: Gaining a benefit. For this, we analyse the well-known attacks and propose security methods which provide resistance or immunity against them at any time, hence independently from the cleverness or strategy of adversaries. Our second focus is to elaborate on the problem of reliably identifying an adversary amongst transacting participants and its influence on possible security methods.


Trust model adversary security methods 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Anderson, S., Friedman, D., Milam, G., Singh, N.: Seller strategies on ebay. In: Industrial Organization 0412004, EconWPA (December 2004)Google Scholar
  2. 2.
    Brown, J., Morgan, J.: Reputation in online markets: Some negative feedback (February 2006)Google Scholar
  3. 3.
    Buchegger, S., Le Boudec, J-Y.: A robust reputation system for mobile ad-hoc networks. Technical report, Proceedings of P2PEcon (2003)Google Scholar
  4. 4.
    Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: EC 2000: Proceedings of the 2nd ACM Conference on Electronic Commerce, pp. 150–157. ACM, New York (2000)Google Scholar
  5. 5.
    Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)CrossRefGoogle Scholar
  6. 6.
    Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)Google Scholar
  7. 7.
    Kerr, R.C.: Toward Secure Trust and Reputation Systems for Electronic Marketplaces. PhD thesis, University of Waterloo, Diploma Thesis (2007)Google Scholar
  8. 8.
    Kotha, S., Rajgopal, S., Rindova, V.: Reputation building and performance: An empirical analysis of the top-50 pure internet firms. European Management Journal 19(6), 571–586 (2001)CrossRefGoogle Scholar
  9. 9.
    Melnik, M.I., Alm, J.: Does a seller’s ecommerce reputation matter? evidence from ebay auctions. Journal of Industrial Economics 50(3), 337–349 (2002)CrossRefGoogle Scholar
  10. 10.
    Ries, S.: Extending bayesian trust models regarding context-dependence and user friendly representation. In: SAC 2009: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 1294–1301. ACM, New York (2009)CrossRefGoogle Scholar
  11. 11.
    Spitz, S., Tüchelmann, Y.: A trust model considering the aspects of time. In: The 2nd International Conference on Computer and Electrical Engineering (2009); ISBN: 978-1-4244-5365-8Google Scholar
  12. 12.
    Sun, Y.L., Han, Z., Yu, W., Ray Liu, K.J.: A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: IEEE INFOCOM, pp. 230–236 (2006)Google Scholar
  13. 13.
    Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: WI 2003: Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence, p. 372. IEEE Computer Society, Washington, DC, USA (2003)Google Scholar
  14. 14.
    Whitby, A., Jøsang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems (2004)Google Scholar
  15. 15.
    Yang, Y., Sun, Y.L., Kay, S., Yang, Q.: Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In: SAC 2009: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 1308–1315. ACM, New York (2009)CrossRefGoogle Scholar
  16. 16.
    Fees for selling on ebay. Ebay Homepage (2011)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2011

Authors and Affiliations

  • Stefan Spitz
    • 1
  • York Tüchelmann
    • 1
  1. 1.Department of Electrical Engineering and Information Sciences Research Group Integrated Information SystemsRuhr-University BochumGermany

Personalised recommendations