Abstract
There are various websites presently used by us and the situation arises where people transact with unknown agents and take decision for these agents for by considering the stature score. Here we have proposed homomorphic cryptosystem to preserve the privacy of an agent’s message value which can be used for e voting that is particularly suitable for the peer to peer network. It does not require any centralized trusted third parties, or specialized platforms and trusted hardware. Initially Paillier system was used which has been replaced by updated elgamal approach which was previously only multiplicative homomorphic. Hence the privacy of the submitted score is enhanced.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
References
Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. HICSS. Proceedings of the 35th Annual Hawaii International Conference on System Sciences, IEEE, 2002
Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decis. Support Syst. 43(2), 618–644 (2007)
Hoffman, K., Zage, D., Nita Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. (CSUR) 42(1), 1 (2009)
Lee, H., Alves-Foss, J., Harrison, S.: The use of encrypted functions for mobile agent security. In: Proceedings of the 37th Annual Hawaii International Conference on System Sciences, pp. 10, IEEE, 2004
Van Dijk, M., et al.: Fully Homomorphic Encryption Over the Integers. Advances in Cryptology–EUROCRYPT 2010, pp. 24–43. Springer, Berlin (2010)
Paillier, P., Pointcheval, D.: Efficient public-key cryptosystems provably secure against active adversaries. Advances in Cryptology-ASIACRYPT’99, pp. 165–179. Springer, Berlin (1999)
Baudron, O., et al. Practical multi-candidate election system. In: Proceedings of the Twentieth Annual ACM Symposium on Principles of Distributed Computing, ACM, 2001
Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference, 2002
Schneier, B.: Applied Cryptography, 2nd edn. Wiley, New York (1995)
Gupta, M., Judge, J., Ammar, M.: A reputation system for peer-to-peer networks. In: Proceedings of the 13th International Workshop on Network and Operating Systems Support for Digital Audio and Video, ACM, 2003
Zhou, R.,Hwang, K.: Powertrust: a robust and scalable stature system for trusted peer-to-peer computing. IEEE Trans. Parallel Distrib. Syst. 18, 4 (2007)
Androulaki, Elli, et al. “Reputation systems for anonymous networks.” Privacy Enhancing Technologies. Springer Berlin Heidelberg, 2008
Zhou, Runfang, Hwang, Kai, Cai, Min: Gossiptrust for fast reputation aggregation i peer-to-peer networks. IEEE Trans. Knowl. Data Eng. 20(9), 1282–1295 (2008)
Kerschbaum, F.: A verifiable, centralized, coercion-free stature system. In: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society, ACM, 2009
Hasan, Omar, et al.: A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Trans. Inf. Forensics Secur. 8(6), 949–962 (2013)
Goldwasser, S., Micali, S., Racko, C.: The knowledge complexity of interactive proof systems. SIAM J. Comput. 18(1), 186208 (1989)
Fiat, A., Shamir, A.: How to prove yourself: practical solutions to identification and signature problems. In: CRYPTO’86, 1986
Hasan, O., Bertino, E., Brunie, L.: Efficient privacy preserving reputation protocols inspired by secure sum. In: 2010 Eighth Annual International Conference on Privacy Security and Trust (PST), IEEE, 2010
Clifton, Chris, et al.: Tools for privacy preserving distributed data mining. ACM SIGKDD Explor. Newsl. 4(2), 28–34 (2002)
Hasan, Omar, Brunie, Lionel, Bertino, Elisa: k-Shares: A Privacy Preserving Reputation Protocol for Decentralized Environments. Security and Privacy–Silver Linings in the Cloud, pp. 253–264. Springer, Berlin (2010)
Hasan, Omar, et al.: A decentralized privacy preserving reputation protocol for the malicious adversarial model. IEEE Trans. Inf. Forensics Secur. 8(6), 949–962 (2013)
Levien, R.: Advogato Website, Advogato Trust Metric. http://www.advogato.org/trust-metric.html
Parmar, V., Payal, et al.: Survey of various homomorphic encryption algorithms and schemes. Int. J. Comput. Appl. 91(8), 26–32 (2014)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2015 Springer India
About this paper
Cite this paper
Thadani, A., Gupta, V. (2015). Enhancing Privacy Preservation of Stature System Through Homomorphic System. In: Shetty, N., Prasad, N., Nalini, N. (eds) Emerging Research in Computing, Information, Communication and Applications. Springer, New Delhi. https://doi.org/10.1007/978-81-322-2550-8_42
Download citation
DOI: https://doi.org/10.1007/978-81-322-2550-8_42
Published:
Publisher Name: Springer, New Delhi
Print ISBN: 978-81-322-2549-2
Online ISBN: 978-81-322-2550-8
eBook Packages: EngineeringEngineering (R0)