A Privacy-Enhanced Peer-to-Peer Reputation System

  • Michael Kinateder
  • Siani Pearson
Part of the Lecture Notes in Computer Science book series (LNCS, volume 2738)


In this paper, a method is described for providing a distributed reputation system with enhanced privacy and security as a design feature. This is achieved using a network of trusted agents on each client platform that exploit Trusted Computing Platform Alliance (TCPA) technology 1.


Trust Model Reputation System Trusted Platform Module Integrity Check Recommendation Target 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Trusted Computing Platform Alliance: TCPA main specification, version 1.1 (2001), Available via
  2. 2.
    Cheskin Research: Trust in the wired americas (2000), Available via
  3. 3.
    Crawford, D. (ed.) Special issue on recommender systems. Communications of the ACM 40 (1997)Google Scholar
  4. 4.
    Andy, O.: Peer-to-Peer, Harnessing the Power of Disruptive Technology. O’Reilly, Sebastopol (2001)Google Scholar
  5. 5.
    Korba, L.: Privacy in distributed electronic commerce. In: Proc. 35th Hawaii International Conference on System Sciences, Big Island, Hawaii. IEEE, Los Alamitos (2002)Google Scholar
  6. 6.
    Jonker, C., Treur, J.: Formal analysis of models for the dynamics of trust based on experiences. In: Garijo, F.J., Boman, M. (eds.) MAAMAW 1999. LNCS (LNAI), vol. 1647. Springer, Heidelberg (1999)CrossRefGoogle Scholar
  7. 7.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: Proc. 33rd Hawaii International Conference on System Sciences, Maui Hawaii (2000)Google Scholar
  8. 8.
    Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proc. 35th Hawaii International Conference on System Sciences, Big Island, Hawaii. IEEE, Los Alamitos (2002)Google Scholar
  9. 9.
    Chen, R., Yeager, W.: Poblano – a distributed trust model for peer-to-peer networks. Technical report, Sun Microsystems, Inc. (2001)Google Scholar
  10. 10.
    Aberer, K., Despotovic, Z.: Managing trust in a peer-2-peer information system. In: Proc. 9th International Conference on Information and Knowledge Management (CIKM 2001), Atlanta (2001)Google Scholar
  11. 11.
    Schneier, B.: Applied Cryptography, 2nd edn. John Wiley & Sons, New York (1996)Google Scholar
  12. 12.
    Pearson, S. (ed.): Trusted Computing Platforms: TCPA Technology in Context. Prentice-Hall, Englewood Cliffs (2002)Google Scholar
  13. 13.
    Grritzalis, D., Kyrloglou, N.: Consumer online-privacy and anonymity protection using infomediary schemes. In: Proc. SCCC 2001. IEEE Computer Society Press, Los Alamitos (2001)Google Scholar
  14. 14.
    Kinateder, M., Rothermel, K.: Architecture and Algorithms for a Distributed Reputation System. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, pp. 1–16. Springer, Heidelberg (2003)CrossRefGoogle Scholar
  15. 15.
    Chaum, D.: Untraceable electronic mail, return addresses and digital pseudonyms. Communications of the ACM 24 (1981)Google Scholar
  16. 16.
    Huberman, B., Hogg, T.: Protecting privacy while revealing data. Nature Biotech 20 (2002)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2003

Authors and Affiliations

  • Michael Kinateder
    • 1
  • Siani Pearson
    • 2
  1. 1.Institute of Parallel and Distributed Systems (IPVS)University of StuttgartStuttgartGermany
  2. 2.Hewlett-Packard Research Laboratories BristolBristolUK

Personalised recommendations