A Survey of Security Issues in Trust and Reputation Systems for E-Commerce
Trust and reputation systems are always subject to attacks if an adversary can gain a benefit in doing so. The list of different attacks against them is extensive. Attacks like bad mouthing, newcomer, sybil, collusion and many more are subject to current research. Some of them present methods that allow to detect adversarial behaviour, hence providing protection against attacks. However, smart adversaries will adapt their behaviour strategies to the existing protection mechanisms and bypass some of the security methods.
In this paper, we discuss the options available to adversaries for achieving their goal: Gaining a benefit. For this, we analyse the well-known attacks and propose security methods which provide resistance or immunity against them at any time, hence independently from the cleverness or strategy of adversaries. Our second focus is to elaborate on the problem of reliably identifying an adversary amongst transacting participants and its influence on possible security methods.
KeywordsTrust model adversary security methods
Unable to display preview. Download preview PDF.
- 1.Anderson, S., Friedman, D., Milam, G., Singh, N.: Seller strategies on ebay. In: Industrial Organization 0412004, EconWPA (December 2004)Google Scholar
- 2.Brown, J., Morgan, J.: Reputation in online markets: Some negative feedback (February 2006)Google Scholar
- 3.Buchegger, S., Le Boudec, J-Y.: A robust reputation system for mobile ad-hoc networks. Technical report, Proceedings of P2PEcon (2003)Google Scholar
- 4.Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: EC 2000: Proceedings of the 2nd ACM Conference on Electronic Commerce, pp. 150–157. ACM, New York (2000)Google Scholar
- 6.Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)Google Scholar
- 7.Kerr, R.C.: Toward Secure Trust and Reputation Systems for Electronic Marketplaces. PhD thesis, University of Waterloo, Diploma Thesis (2007)Google Scholar
- 11.Spitz, S., Tüchelmann, Y.: A trust model considering the aspects of time. In: The 2nd International Conference on Computer and Electrical Engineering (2009); ISBN: 978-1-4244-5365-8Google Scholar
- 12.Sun, Y.L., Han, Z., Yu, W., Ray Liu, K.J.: A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: IEEE INFOCOM, pp. 230–236 (2006)Google Scholar
- 13.Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: WI 2003: Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence, p. 372. IEEE Computer Society, Washington, DC, USA (2003)Google Scholar
- 14.Whitby, A., Jøsang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems (2004)Google Scholar
- 16.Fees for selling on ebay. Ebay Homepage (2011)Google Scholar