Please wait a minute...
J4  2011, Vol. 45 Issue (3): 405-411    DOI: 10.3785/j.issn.1008-973X.2011.03.001
    
Attack-resistant model of reputation and trust
ZHENG Xiao-lin, LIU Chi, BEI Yi-jun, CHEN De-ren
College of Computer Science and Technology, Zhejiang University, Hangzhou 310027, China
Download:   PDF(0KB) HTML
Export: BibTeX | EndNote (RIS)      

Abstract  

The reputation mechanism of the third party trading platform is easy to be attacked by fraud, and it always cannot characterize the actual trustworthy between the buyers and sellers. To solve this problem, an attack-resistant reputation and trust model based on social network was proposed. A reputation model was firstly established based on dealers rating, then trust was modeled using the transfer algorithm in a social network constructed by dealing relationships. A correcting parameter was introduced to obtain objective reputation value and subjective trust value, which would help dealers make decisions. In addition, two-dimensional cluster filtering was employ to get rid of cheating data. The experimental results show that the model can properly describe the trust relationships between dealers, and performs well in resisting attack behaviors such as cheating feedback and shilling attack.



Published: 16 March 2012
CLC:  TP 319  
  TP 391  
Cite this article:

ZHENG Xiao-lin, LIU Chi, BEI Yi-jun, CHEN De-ren. Attack-resistant model of reputation and trust. J4, 2011, 45(3): 405-411.

URL:

http://www.zjujournals.com/eng/10.3785/j.issn.1008-973X.2011.03.001     OR     http://www.zjujournals.com/eng/Y2011/V45/I3/405


具有抗攻击能力的信誉与信任模型

 针对互联网第三方交易平台中的信誉体系容易受到欺诈行为攻击,以及不能真实反映买卖双方信任度的问题,提出一种基于社会网络的具有抗攻击能力的信誉与信任模型.基于交易者评分建立信誉评估算法,通过信任链传递算法建立基于社会网络的信任评估模型,并采用二维聚类过滤算法实现对欺诈数据的排查.通过引入纠偏参数,实现信誉值的客观化与信任值的主观化,为交易者做出最终交易提供决策帮助.实验表明,该信誉与信任模型能够客观反映交易者的服务质量以及交易双方的信任关系,并对不诚实反馈和串通欺骗等攻击行为具有较高的抵抗能力.

[1] RASMUSSON L, JANSSON S. Simulated social control for secure Internet commerce[C]∥New Security Paradigms. Lake Arrowhead, United States: ACM, 1996:18-25.
[2] JOSANG A, ISMAIL R, BOYD C. A survey of trust and reputation systems for online service provision[J]. Decision Support Systems,2007, 43(2): 618-644.
[3] TEACY W T, PATEL J, JENNINGS N R, et al. TRAVOS: trust and reputation in the context of inaccurate information sources[J]. Autonomous Agents and MultiAgent Systems, 2006, 12(2): 183-198.
[4] JOSANG A, HALLER J. Dirichlet reputation systems[C]∥Proceedings of the 2th International Conference on Availability, Reliability and Security.Vienna, Austria: IEEE Computer Society, 2007:112-119.
[5] JOSANG A, HAYWARD R, POPE S. Trust network analysis with subjective logic[C]∥Proceedings of the 29th Australasian Computer Science Conference.Hobart, Australia: Australian Computer Society,2006:85-94.
[6] JOSANG A, BHUIYAN T, XU Y, et al. Combining trust and reputation management for webbased services[C]∥Trust, Privacy and Security in Digital Business. Turin, Italy: SpringerVerlag, 2008:90-99.
[7] LIANG Z, SHI W. PET: a personalized trust model with reputation and risk evaluation for P2P resource sharing[C]∥Proceedings of the Proceedings of the 38th Annual Hawaii International Conference on System Sciences. Big Island, Hawaii, USA: IEEE Computer Society, 2005:201-202.
[8] 胡斌, 梁锡坤, 高济. 基于模糊逻辑的Agent社会信用评价模型[J]. 浙江大学学报:工学版,2008, 42(5): 725-730.
HU Bin, LIANG Xikun, GAO Ji. Fuzzylogic based credit evaluation model for agent society[J]. Journal of Zhejiang University : Engineering Science, 2008, 42(5): 725-730.
[9] DELLAROCAS C. Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior[C]∥Electronic Commerce. Minneapolis, Minnesota, United States: ACM, 2000:150-157.
[10] FENG Q, YANG Y, SUN Y L, et al. Modeling attack behaviors in rating systems[C]∥Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems Workshops. Beijing,China:IEEE Computer Society, 2008: 241-248.
[11] LAM S K, RIEDL J. Shilling recommender systems for fun and profit[C]∥Proceedings of 13th International Conference on World Wide Web. New York, NY, USA: ACM, 2004:393-402.
[12] YANG Y, FENG Q, SUN Y L, et al. RepTrap : a novel attack on feedbackbased reputation systems[C]∥Security and Privacy in Communication Netowrks. Istanbul, Turkey: ACM, 2008:1-11.
[13] BHATTACHARJEE R, GOEL A. Avoiding ballot stuffing in eBaylike reputation systems[C]∥Economics of PeertoPeer Systems. Philadelphia, Pennsylvania, USA: ACM, 2005:133-137.
[14] ZHANG J, COHEN R. An incentive mechanism for eliciting fair ratings of sellers in emarketplaces[C]∥Autonomous Agents and Multiagent Systems. Honolulu, Hawaii: ACM, 2007:1-3.
[15] DELLAROCAS C. Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems[C]∥Information Systems. Brisbane, Australia: Association for Information Systems, 2000:520-525.
[16] SU X, ZENG H, CHEN Z. Finding group shilling in recommendation system[C]∥World Wide Web. Chiba, Japan: ACM, 2005:960-961.
[17] 田春岐, 邹仕洪, 王文东,等. 一种基于推荐证据的有效抗攻击P2P网络信任模型[J]. 计算机学报, 2008, 31(2): 270-281.
TIAN Chunqi, ZOU Shihong, WANG Wendong, et al. A new trust model based on recommendation evidence for P2P networks[J]. Chinese Journal of Computers, 2008, 31(2): 270-281.
[18] MACNAUGHTON S P, WILLIAMS W T, DALE M B, et al. Dissimilarity analysis: a new technique of hierarchical subdivision[J]. Nature, 1964, 202(493): 1034-1035.

[1] HU Zhong-kai, ZHENG Xiao-lin, WU Ya-feng, CHEN De-ren. Product recommendation algorithm based on users’ reviews mining[J]. J4, 2013, 47(8): 1475-1485.
[2] ZHENG Si-yuan, WANG Qing, LI Jiang-xiong, KE Ying-lin,LI Song. Design and integration technology of communication system of
finish machining for aircraft fuselage-wing joints
[J]. J4, 2013, 47(7): 1274-1280.
[3] ZHANG Shao-zhong, FANG Zhao-xi, CHEN Jun-gan, SHI Jiong. Community clustering model for E-commerce trust based on social network[J]. J4, 2013, 47(4): 656-661.
[4] LI Jun, ZHENG Xiao-lin, CHEN De-ren. A trust-based selection approach for composite service[J]. J4, 2012, 46(5): 885-892.