Skip to main content

Enhancing Privacy Preservation of Stature System Through Homomorphic System

  • Conference paper
  • First Online:
Emerging Research in Computing, Information, Communication and Applications

Abstract

There are various websites presently used by us and the situation arises where people transact with unknown agents and take decision for these agents for by considering the stature score. Here we have proposed homomorphic cryptosystem to preserve the privacy of an agent’s message value which can be used for e voting that is particularly suitable for the peer to peer network. It does not require any centralized trusted third parties, or specialized platforms and trusted hardware. Initially Paillier system was used which has been replaced by updated elgamal approach which was previously only multiplicative homomorphic. Hence the privacy of the submitted score is enhanced.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 169.00
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 219.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 219.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

References

  1. Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. HICSS. Proceedings of the 35th Annual Hawaii International Conference on System Sciences, IEEE, 2002

    Google Scholar 

  2. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)

    Article  Google Scholar 

  3. Hoffman, K., Zage, D., Nita Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. (CSUR) 42(1), 1 (2009)

    Google Scholar 

  4. Lee, H., Alves-Foss, J., Harrison, S.: The use of encrypted functions for mobile agent security. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pp. 10, IEEE, 2004

    Google Scholar 

  5. Van Dijk, M., et al.: Fully Homomorphic Encryption Over the Integers. Advances in Cryptology–EUROCRYPT 2010, pp. 24–43. Springer, Berlin (2010)

    Google Scholar 

  6. Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. Advances in Cryptology-ASIACRYPT’99, pp. 165–179. Springer, Berlin (1999)

    Google Scholar 

  7. Baudron, O., et al. Practical multi-candidate election system. In: Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, ACM, 2001

    Google Scholar 

  8. Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, 2002

    Google Scholar 

  9. Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1995)

    Google Scholar 

  10. Gupta, M., Judge, J., Ammar, M.: A reputation system for peer-to-peer networks. In: Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video, ACM, 2003

    Google Scholar 

  11. Zhou, R.,Hwang, K.: Powertrust: a robust and scalable stature system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18, 4 (2007)

    Google Scholar 

  12. Androulaki, Elli, et al. “Reputation systems for anonymous networks.” Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2008

    Google Scholar 

  13. Zhou, Runfang, Hwang, Kai, Cai, Min: Gossiptrust for fast reputation aggregation i peer-to-peer networks. IEEE Trans. Knowl. Data Eng. 20(9), 1282–1295 (2008)

    Article  Google Scholar 

  14. Kerschbaum, F.: A verifiable, centralized, coercion-free stature system. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, ACM, 2009

    Google Scholar 

  15. Hasan, Omar, et al.: A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Trans. Inf. Forensics Secur. 8(6), 949–962 (2013)

    Article  Google Scholar 

  16. Goldwasser, S., Micali, S., Racko, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186208 (1989)

    Google Scholar 

  17. Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: CRYPTO’86, 1986

    Google Scholar 

  18. Hasan, O., Bertino, E., Brunie, L.: Efficient privacy preserving reputation protocols inspired by secure sum. In: 2010 Eighth Annual International Conference on Privacy Security and Trust (PST), IEEE, 2010

    Google Scholar 

  19. Clifton, Chris, et al.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. Newsl. 4(2), 28–34 (2002)

    Article  MathSciNet  Google Scholar 

  20. Hasan, Omar, Brunie, Lionel, Bertino, Elisa: k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. Security and Privacy–Silver Linings in the Cloud, pp. 253–264. Springer, Berlin (2010)

    Google Scholar 

  21. Hasan, Omar, et al.: A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Trans. Inf. Forensics Secur. 8(6), 949–962 (2013)

    Article  Google Scholar 

  22. Levien, R.: Advogato Website, Advogato Trust Metric. http://www.advogato.org/trust-metric.html

  23. Parmar, V., Payal, et al.: Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl. 91(8), 26–32 (2014)

    MATH  Google Scholar 

  24. https://www.trustlet.org/wiki/Downloaded_Epinions_dataset

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2015 Springer India

About this paper

Cite this paper

Thadani, A., Gupta, V. (2015). Enhancing Privacy Preservation of Stature System Through Homomorphic System. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2550-8_42

Download citation

  • DOI: https://doi.org/10.1007/978-81-322-2550-8_42

  • Published:

  • Publisher Name: Springer, New Delhi

  • Print ISBN: 978-81-322-2549-2

  • Online ISBN: 978-81-322-2550-8

  • eBook Packages: EngineeringEngineering (R0)

Publish with us

Policies and ethics