Skip to main content
Log in

A trustworthy online recommendation system based on social connections in a privacy-preserving manner

  • Published:
Multimedia Tools and Applications Aims and scope Submit manuscript

Abstract

Certain consumer websites provide reviews from previous buyers to help new customers make purchasing decisions. However, fake reviews can have an adverse impact on user trust. Most previous suggestions for addressing this problem are still subject to various security concerns in terms of privacy, reliability, and authenticity. To ensure the security of online review systems, this paper proposes the development of a secure online-evaluation method based on social connections to establish evaluation authenticity and provide protection against evaluation forgery while preserving the reviewer’s identity. The proposed method enables users to recognize evaluations from their friends to identify reviews from more trustworthy sources, and authenticates online reviews to prevent possible forgery. In addition, it preserves the privacy of friendship relationships from application server and other users and identifier relations between the personal identifier and online identifier. The proposed approach can be applied to Internet auctions and online games, and is shown to be secure and efficient, with sufficient matching probability to be practical.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6

Similar content being viewed by others

References

  1. Agrawal R, Evfimievski A, Srikant R (2003) Information sharing across private databases. In: Proceedings of the 2003 ACM SIGMOD international conference on management of data. ACM, New York, pp 86–97

  2. Al-Saidi NM, Said MRM, Othman WAM (2012) Password authentication based on fractal coding scheme. Int J Appl Math 2012, Article ID 340,861, 16 pp

  3. Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for dns. In: 19th Usenix security symposium

  4. Bashir S (2015) Ranking entities on the basis of users’ opinions. Multimed Tools Appl 1–23

  5. Bellare M, Canetti R, Krawczyk H (1996) Keying hash functions for message authentication. In: Advances in cryptology XCRYPTO 96. Springer, pp 1–15

  6. Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319

    Article  MathSciNet  MATH  Google Scholar 

  7. Chiou SY (2013) Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties. Mathematical Problems in Engineering 2013, Article ID 858,579, 11 pp

  8. Chiou SY (2013) Secure method for biometric-based recognition with integrated cryptographic functions. BioMed Res Int 2013, Article ID 623,815, 12 pp

  9. Chiou SY, Huang YH (2013) Mobile common friends discovery with friendship ownership and replay-attack resistance. Wirel Netw:1839–1850. http://link.springer.com/article/10.1007/s11276-013-0577-x/fulltext.html

  10. Chiou SY, Luo CS (2014) An authenticated privacy-preserving mobile matchmaking protocol based on social connections with friendship ownership. Math Probl Eng 2014

  11. Dietrich J, Jones N, Wright J (2008) Using social networking and semantic web technology in software engineering–use cases, patterns, and a case study. J Syst Softw 81(12):2183–2193

    Article  Google Scholar 

  12. Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654

    Article  MathSciNet  MATH  Google Scholar 

  13. Freedman M, Nicolosi A (2007) Efficient private techniques for verifying social proximity. In: Sixth international workshop on peer-to-peer systems (IPTPS07), pp 1–7

  14. Freedman M, Nissim K, Pinkas B et al (2004) Efficient private matching and set intersection. Lect Notes Comput Sci 1–19

  15. Hogg T, Adamic L (2004) Enhancing reputation mechanisms via online social networks. In: Proceedings of the 5th ACM conference on electronic commerce. ACM, New York, pp 236–237

  16. Kissner L, Song D (2005) Privacy-preserving set operations. In: Advances in Cryptology–CRYPTO 2005. Springer, pp 241–257

  17. Kucherawy M, Borenstein N (2011) A model for reputation interchange (2011)

  18. Kuo Y, Wu F, Hsiao R (2007) A trust evaluation to help on-line consumer to choose the provider in auction web site. In: 2007 international conference on service systems and service management, pp 1–6

  19. Li Y, Tygar JD, Hellerstein JM (2005) Computer security in the 21st century, vol. Chapter 3. Springer-US

  20. Paillier P (1999) Public-Key cryptosystems based on composite degree residuosity classes. Lect Notes Comput Sci 1592:223–238

    Article  MathSciNet  MATH  Google Scholar 

  21. Pandit S, Chau D, Wang S, Faloutsos C (2007) Netprobe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the 16th international conference on World Wide Web. ACM Press, New York, pp 201–210

  22. Pujol J, Sangüesa R, Delgado J (2002) Extracting reputation in multi agent systems by means of social network topology. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 1. ACM, New York, pp 467–474

  23. Rawashdeh M, Alhamid MF, Alja’am JM, Alnusair A, El Saddik A (2015) Tag-based personalized recommendation in social media services. Multimed Tools Appl 1–17

  24. Rebahi Y, Sisalem D, Magedanz T (2006) SIP spam detection. In: Proceedings of the international conference on digital telecommunications. IEEE Computer Society Washington, DC

  25. Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 43(12):45–48

    Article  Google Scholar 

  26. Sabater J, Sierra C (2002) Reputation and social network analysis in multi-agent systems. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 1. ACM Press, New York, pp 475–482

  27. Stickel SE (2012) Reputation and performance among security analysts. J Financ 47(5):1811–1836

    Article  Google Scholar 

  28. Swamynathan G, Wilson C, Boe B, Almeroth K, Zhao B (2008) Do social networks improve e-commerce?: A study on social marketplaces. In: Proceedings of the first workshop on online social networks. ACM, New York, pp 1–6

  29. Wang W, Zhao L, Yuan R (2006) Improving cooperation in peer-to-peer systems using social networks. In: Proceedings of IEEE IPDPS 2006

  30. Xu G, Zhang G, Xu C, Liu B, Li M, Ren Y, Li X, Feng Z, Zhang D (2015) A multi-attribute rating based trust model: improving the personalized trust modeling framework. Multimed Tools Appl 1–17

  31. Zhang B, Zhou Y, Faloutsos C (2008) Toward a comprehensive model in internet auction fraud detection. In: Hawaii international conference on system sciences, Proceedings of the 41st Annual, pp 79–79

  32. Zhang W, Bi J, Wu J, Qin Z (2007) An approach to optimize local trust algorithm in SureMsg Service. In: ECSIS symposium on bio-inspired, learning, and intelligent systems for security, 2007. BLISS 2007, pp 51–54

Download references

Acknowledgments

This work is partially supported by the MOST project under Grant MOST 104-2221-E-182-012. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Shin-Yan Chiou.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Chiou, SY. A trustworthy online recommendation system based on social connections in a privacy-preserving manner. Multimed Tools Appl 76, 9319–9336 (2017). https://doi.org/10.1007/s11042-016-3534-8

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11042-016-3534-8

Keywords

Navigation