skip to main content
10.1145/2557547.2557565acmconferencesArticle/Chapter ViewAbstractPublication PagescodaspyConference Proceedingsconference-collections
research-article

COMPARS: toward an empirical approach for comparing the resilience of reputation systems

Authors Info & Claims
Published:03 March 2014Publication History

ABSTRACT

Reputation is a primary mechanism for trust management in decentralized systems. Many reputation-based trust functions have been proposed in the literature. However, picking the right trust function for a given decentralized system is a non-trivial task. One has to consider and balance a variety of factors, including computation and communication costs, scalability and resilience to manipulations by attackers. Although the former two are relatively easy to evaluate, the evaluation of resilience of trust functions is challenging. Most existing work bases evaluation on static attack models, which is unrealistic as it fails to reflect the adaptive nature of adversaries (who are often real human users rather than simple computing agents).

In this paper, we highlight the importance of the modeling of adaptive attackers when evaluating reputation-based trust functions, and propose an adaptive framework - called COMPARS - for the evaluation of resilience of reputation systems. Given the complexity of reputation systems, it is often difficult, if not impossible, to exactly derive the optimal strategy of an attacker. Therefore, COMPARS takes a practical approach that attempts to capture the reasoning process of an attacker as it decides its next action in a reputation system. Specifically, given a trust function and an attack goal, COMPARS generates an attack tree to estimate the possible outcomes of an attacker's action sequences up to certain points in the future. Through attack trees, COMPARS simulates the optimal attack strategy for a specific reputation function f, which will be used to evaluate the resilience of f. By doing so, COMPARS allows one to conduct a fair and consistent comparison of different reputation functions.

References

  1. R. Aringhieri, E. Damiani, S. D. C. D. Vimercati, S. Paraboschi, and P. Samarati. Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems. J. Am. Soc. Inf. Sci. Technol., 57(4):528--537, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. P. Chandrasekaran and B. Esfandiari. A model for a testbed for evaluating reputation systems. In Trust, Security and Privacy in Computing and Communications (TrustCom), 2011 IEEE 10th International Conference on, pages 296--303. IEEE, 2011. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. Cheng and E. Friedman. Sybilproof reputation mechanisms. In Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pages 128--132. ACM, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Z. Cheng and N. Hurley. Analysis of robustness in trust-based recommender systems. In Adaptivity, Personalization and Fusion of Heterogeneous Information, pages 114--121. LE CENTRE DE HAUTES ETUDES INTERNATIONALES D'INFORMATIQUE DOCUMENTAIRE, 2010. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. M. Fan, Y. Tan, and A. B. Whinston. Evaluation and design of online cooperative feedback mechanisms for reputation management. IEEE Transactions on Knowledge and Data Engineering, 17:244--254, 2005. Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. J. Feng, Y. Zhang, S. Chen, and A. Fu. Rephi: A novel attack against p2p reputation systems. In Computer Communications Workshops (INFOCOM WKSHPS), 2011 IEEE Conference on, pages 1088--1092. IEEE, 2011.Google ScholarGoogle ScholarCross RefCross Ref
  7. K. K. Fullam, T. Klos, G. Muller, J. Sabater-Mir, K. S. Barber, and L. Vercouter. The agent reputation and trust (art) testbed. In Trust Management, pages 439--442. Springer, 2006. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. C. J. Hazard and M. P. Singh. Reputation dynamics and convergence: A basis for evaluating reputation systems. 2009.Google ScholarGoogle Scholar
  9. K. Hoffman, D. Zage, and C. Nita-Rotaru. A survey of attack and defense techniques for reputation systems. ACM.Google ScholarGoogle Scholar

Index Terms

  1. COMPARS: toward an empirical approach for comparing the resilience of reputation systems

          Recommendations

          Comments

          Login options

          Check if you have access through your login credentials or your institution to get full access on this article.

          Sign in
          • Published in

            cover image ACM Conferences
            CODASPY '14: Proceedings of the 4th ACM conference on Data and application security and privacy
            March 2014
            368 pages
            ISBN:9781450322782
            DOI:10.1145/2557547

            Copyright © 2014 ACM

            Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

            Publisher

            Association for Computing Machinery

            New York, NY, United States

            Publication History

            • Published: 3 March 2014

            Permissions

            Request permissions about this article.

            Request Permissions

            Check for updates

            Qualifiers

            • research-article

            Acceptance Rates

            CODASPY '14 Paper Acceptance Rate19of119submissions,16%Overall Acceptance Rate149of789submissions,19%

            Upcoming Conference

            CODASPY '24

          PDF Format

          View or Download as a PDF file.

          PDF

          eReader

          View online with eReader.

          eReader