Abstract
Certain consumer websites provide reviews from previous buyers to help new customers make purchasing decisions. However, fake reviews can have an adverse impact on user trust. Most previous suggestions for addressing this problem are still subject to various security concerns in terms of privacy, reliability, and authenticity. To ensure the security of online review systems, this paper proposes the development of a secure online-evaluation method based on social connections to establish evaluation authenticity and provide protection against evaluation forgery while preserving the reviewer’s identity. The proposed method enables users to recognize evaluations from their friends to identify reviews from more trustworthy sources, and authenticates online reviews to prevent possible forgery. In addition, it preserves the privacy of friendship relationships from application server and other users and identifier relations between the personal identifier and online identifier. The proposed approach can be applied to Internet auctions and online games, and is shown to be secure and efficient, with sufficient matching probability to be practical.
Similar content being viewed by others
References
Agrawal R, Evfimievski A, Srikant R (2003) Information sharing across private databases. In: Proceedings of the 2003 ACM SIGMOD international conference on management of data. ACM, New York, pp 86–97
Al-Saidi NM, Said MRM, Othman WAM (2012) Password authentication based on fractal coding scheme. Int J Appl Math 2012, Article ID 340,861, 16 pp
Antonakakis M, Perdisci R, Dagon D, Lee W, Feamster N (2010) Building a dynamic reputation system for dns. In: 19th Usenix security symposium
Bashir S (2015) Ranking entities on the basis of users’ opinions. Multimed Tools Appl 1–23
Bellare M, Canetti R, Krawczyk H (1996) Keying hash functions for message authentication. In: Advances in cryptology XCRYPTO 96. Springer, pp 1–15
Boneh D, Lynn B, Shacham H (2004) Short signatures from the weil pairing. J Cryptol 17(4):297–319
Chiou SY (2013) Authenticated blind issuing of symmetric keys for mobile access control system without trusted parties. Mathematical Problems in Engineering 2013, Article ID 858,579, 11 pp
Chiou SY (2013) Secure method for biometric-based recognition with integrated cryptographic functions. BioMed Res Int 2013, Article ID 623,815, 12 pp
Chiou SY, Huang YH (2013) Mobile common friends discovery with friendship ownership and replay-attack resistance. Wirel Netw:1839–1850. http://link.springer.com/article/10.1007/s11276-013-0577-x/fulltext.html
Chiou SY, Luo CS (2014) An authenticated privacy-preserving mobile matchmaking protocol based on social connections with friendship ownership. Math Probl Eng 2014
Dietrich J, Jones N, Wright J (2008) Using social networking and semantic web technology in software engineering–use cases, patterns, and a case study. J Syst Softw 81(12):2183–2193
Diffie W, Hellman M (1976) New directions in cryptography. IEEE Trans Inf Theory 22(6):644–654
Freedman M, Nicolosi A (2007) Efficient private techniques for verifying social proximity. In: Sixth international workshop on peer-to-peer systems (IPTPS07), pp 1–7
Freedman M, Nissim K, Pinkas B et al (2004) Efficient private matching and set intersection. Lect Notes Comput Sci 1–19
Hogg T, Adamic L (2004) Enhancing reputation mechanisms via online social networks. In: Proceedings of the 5th ACM conference on electronic commerce. ACM, New York, pp 236–237
Kissner L, Song D (2005) Privacy-preserving set operations. In: Advances in Cryptology–CRYPTO 2005. Springer, pp 241–257
Kucherawy M, Borenstein N (2011) A model for reputation interchange (2011)
Kuo Y, Wu F, Hsiao R (2007) A trust evaluation to help on-line consumer to choose the provider in auction web site. In: 2007 international conference on service systems and service management, pp 1–6
Li Y, Tygar JD, Hellerstein JM (2005) Computer security in the 21st century, vol. Chapter 3. Springer-US
Paillier P (1999) Public-Key cryptosystems based on composite degree residuosity classes. Lect Notes Comput Sci 1592:223–238
Pandit S, Chau D, Wang S, Faloutsos C (2007) Netprobe: a fast and scalable system for fraud detection in online auction networks. In: Proceedings of the 16th international conference on World Wide Web. ACM Press, New York, pp 201–210
Pujol J, Sangüesa R, Delgado J (2002) Extracting reputation in multi agent systems by means of social network topology. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 1. ACM, New York, pp 467–474
Rawashdeh M, Alhamid MF, Alja’am JM, Alnusair A, El Saddik A (2015) Tag-based personalized recommendation in social media services. Multimed Tools Appl 1–17
Rebahi Y, Sisalem D, Magedanz T (2006) SIP spam detection. In: Proceedings of the international conference on digital telecommunications. IEEE Computer Society Washington, DC
Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 43(12):45–48
Sabater J, Sierra C (2002) Reputation and social network analysis in multi-agent systems. In: Proceedings of the first international joint conference on autonomous agents and multiagent systems: part 1. ACM Press, New York, pp 475–482
Stickel SE (2012) Reputation and performance among security analysts. J Financ 47(5):1811–1836
Swamynathan G, Wilson C, Boe B, Almeroth K, Zhao B (2008) Do social networks improve e-commerce?: A study on social marketplaces. In: Proceedings of the first workshop on online social networks. ACM, New York, pp 1–6
Wang W, Zhao L, Yuan R (2006) Improving cooperation in peer-to-peer systems using social networks. In: Proceedings of IEEE IPDPS 2006
Xu G, Zhang G, Xu C, Liu B, Li M, Ren Y, Li X, Feng Z, Zhang D (2015) A multi-attribute rating based trust model: improving the personalized trust modeling framework. Multimed Tools Appl 1–17
Zhang B, Zhou Y, Faloutsos C (2008) Toward a comprehensive model in internet auction fraud detection. In: Hawaii international conference on system sciences, Proceedings of the 41st Annual, pp 79–79
Zhang W, Bi J, Wu J, Qin Z (2007) An approach to optimize local trust algorithm in SureMsg Service. In: ECSIS symposium on bio-inspired, learning, and intelligent systems for security, 2007. BLISS 2007, pp 51–54
Acknowledgments
This work is partially supported by the MOST project under Grant MOST 104-2221-E-182-012. The authors also gratefully acknowledge the helpful comments and suggestions of the reviewers, which have improved the presentation.
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Chiou, SY. A trustworthy online recommendation system based on social connections in a privacy-preserving manner. Multimed Tools Appl 76, 9319–9336 (2017). https://doi.org/10.1007/s11042-016-3534-8
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s11042-016-3534-8