ABSTRACT
Distributed reputation systems establish trust among strangers in online communities and provide incentives for users to contribute. In these systems, each user monitors the interactions of others and computes the reputations accordingly. Collecting information for computing the reputations is challenging for the users due to their vulnerability to attacks, their limited resources, and the burst of their interactions. The low cost of creating accounts in most reputation systems makes them popular to million of users, but also enables malicious users to boost their reputations by performing Sybil attacks. Furthermore, the burst of user interactions causes an information overload. To avoid the impact of malicious users and information overload, we propose EscapeLimit, a sybil attack-resistant, computationally simple, and fully distributed method for information collection. EscapeLimit leverages user interactions as indicators of trust and similarity between the corresponding users, and collects relevant and trusted information by limiting the escape probability into the Sybil area. We evaluate it by emulating interaction patterns derived from synthetic and real-world networks. Our evaluation shows EscapeLimit's effectiveness in terms of its resilience to Sybil attacks, its scalability, and its ability to provide relevant information to each user.
- The distributed asci supercomputer 4. http://www.cs.vu.nl/das4/, 2014.Google Scholar
- C. Ballester and M. Vorsatz. Random walk based segregation measures. Review of Economics and Statistics, 2011.Google Scholar
- A. L. Barabási and R. Albert. Emergence of Scaling in Random Networks. Science, pages 509--512, 1999.Google Scholar
- Z. Burda, J. Duda, J. M. Luck, and B. Waclaw. Localization of the Maximal Entropy Random Walk. Physical Review Letters, 102(16):160602--4, 2009.Google ScholarCross Ref
- Z. Burda, J. Duda, J. M. Luck, and B. Waclaw. The various facets of random walk entropy. Acta Phys. Polon. B, 2010.Google Scholar
- G. C., M. M., and S. A. Random walks in peer-to-peer networks: algorithms and evaluation. Perform. Eval., 2006. Google ScholarDigital Library
- Q. Cao, M. Sirivianos, X. Yang, and T. Pregueiro. Aiding the detection of fake accounts in large scale social online services. In NSDI, 2012. Google ScholarDigital Library
- R. Chakravorty, S. Agarwal, and S. Banerjee. Mob: A mobile bazaar for wide-area wireless services. In ACM MobiCom, 2005. Google ScholarDigital Library
- G. Danezis and P. Mittal. SybilInfer: Detecting Sybil Nodes using Social Networks. In NDSS, 2009.Google Scholar
- R. Delaviz, J. Pouwelse, and D. Epema. Targeted and scalable information dissemination in a distributed reputation mechanism. In Proceedings of the seventh ACM Workshop on Scalable Trusted Computing (ACM STC), 2012. Google ScholarDigital Library
- R. Delaviz, N. Zeilemaker, J. Pouwelse, and D. Epema. A network science perspective of a distributed reputation mechanism. IFIP Networking, 2013.Google Scholar
- P. Felber, A.-M. Kermarrec, L. Leonini, É. Rivière, and S. Voulagris. PULP: an Adaptive Gossip-Based Dissemination Protocol for Multi-Source Message Streams. Peer-to-Peer Networking and Applications, Springer, 2011.Google Scholar
- M. Feldman, K. Lai, I. Stoica, and J. Chuang. Robust incentive techniques for peer-to-peer networks. In ACM EC, 2004. Google ScholarDigital Library
- D. Gkorou, T. Vinkó, J. Pouwelse, and D. Epema. Leveraging node properties in random walks for robust reputations in decentralized networks. In IEEE P2P Computing, 2013.Google ScholarCross Ref
- W. K. Hastings. Monte Carlo sampling methods using Markov chains and their applications. Biometrika, 57(1):97--109, 1970.Google ScholarCross Ref
- S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. The eigentrust algorithm for reputation management in p2p networks. In WWW, 2003. Google ScholarDigital Library
- A. Mohaisen, N. Hopper, and Y. Kim. Keep your friends close: Incorporating trust into social network-based sybil defenses. In INFOCOM, 2011.Google ScholarCross Ref
- P. Papadimitriou, A. Dasdan, and H. Garcia-Molina. Web graph similarity for anomaly detection. J. Internet Services and Applications, 2010.Google ScholarCross Ref
- M. Piatek, T. Isdal, A. Krishnamurthy, and T. Anderson. One hop reputations for peer to peer file sharing workloads. In NSDI'08, 2008. Google ScholarDigital Library
- J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. van Steen, and H. J. Sips. Tribler: a social-based peer-to-peer system. Concurr. Comput.: Pract. Exper., 2008. Google ScholarDigital Library
- D. Quercia and S. Hailes. Sybil attacks against mobile users: friends and foes to the rescue. In INFOCOM, 2010. Google ScholarDigital Library
- R. Sinatra, J. Gómez-Gardeñes, R. Lambiotte, V. Nicosia, and V. Latora. Maximal-entropy random walks in complex networks with limited information. In Phys. Rev. E, 2011.Google ScholarCross Ref
- H. Tong, C. Faloutsos, and J.-Y. Pan. Fast random walk with restart and its applications. In ICDM, 2006. Google ScholarDigital Library
- N. Tran, B. Min, J. Li, and L. Subramanian. Sybil-resilient online content voting. In NSDI, 2009. Google ScholarDigital Library
- B. Viswanath, A. Mislove, M. Cha, and K. P. Gummadi. On the evolution of user interaction in facebook. In ACM WOSN, 2009. Google ScholarDigital Library
- C. Wilson, B. Boe, A. Sala, K. P. Puttaswamy, and B. Y. Zhao. User interactions in social networks and their implications. In Proceedings of the 4th ACM European Conference on Computer Systems, EuroSys, 2009. Google ScholarDigital Library
- Z. Yang, C. Wilson, X. Wang, T. Gao, B. Y. Zhao, and Y. Dai. Uncovering social network sybils in the wild. IMC, 2011. Google ScholarDigital Library
- H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao. Sybillimit: A near-optimal social network defense against sybil attacks. In IEEE Symposium on Security and Privacy, 2008. Google ScholarDigital Library
- H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. In SIGCOMM, 2006. Google ScholarDigital Library
Index Terms
- Trust-based collection of information in distributed reputation networks
Recommendations
A Distributed Trust-based Reputation Model in P2P System
SNPD '07: Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 01The P2P system is an anonymous and dynamic system, thus, some malicious behaviour can't be punished. In order to restrict the malicious behaviour in the P2P system, researchers have focused on establishing effective reputation systems. However, the ...
The Role of Reputation on Trust and Loyalty: A Cross-Cultural Analysis of Tablet E-Tailing
The purpose of this article is to empirically examine the role of online retailer's website reputation on tablet commerce and to compare the trust arbitration between reputation and loyalty in two cultures-Finland and Nigeria. Data was collected from ...
A Reputation Based Attack Resistant Distributed Trust Management Model in P2P Networks
ISECS '10: Proceedings of the 2010 Third International Symposium on Electronic Commerce and SecurityAn important challenge regarding peer’s trust valuation in peer-to-peer (P2P) networks is how to cope with such problems as dishonest feedbacks from malicious peers, collusions and complex strategic frauds, which cannot be effectively tackled by the ...
Comments