Trust Transfer: Encouraging Self-recommendations Without Sybil Attack
نویسندگان
چکیده
Trading privacy for trust thanks to the linkage of pseudonyms has been proposed to mitigate the inherent conflict between trust and privacy. This necessitates fusionym, that is, the calculation of a unique trust value supposed to reflect the overall trustworthiness brought by the set of linked pseudonyms. In fact, some pieces of evidence may overlap and be overcounted, leading to an incorrect trust value. In this approach, self-recommendations are possible during the privacy/trust trade. However, this means that Sybil attacks, where thousands of virtual identities belonging to the same real-world entity recommend each other, are potentially easier to carry out, as selfrecommendations are an integral part of the attack. In this paper, trust transfer is used to achieve safe fusionym and protect against Sybil attacks when pieces of evidence are limited to direct observations and recommendations based on the count of event outcomes. Trust transfer implies that recommendations move some of the trustworthiness of the recommending entity to the trustworthiness of the trustee. It is demonstrated and tailored to email anti-spam settings.
منابع مشابه
Interaction Modelling using Trust and Recommendation in Cloud Computing Environment
To ensure a secure computing in a cloud environment, recommendation and trust-based access control model is proposed. The proposed model allows calculation of direct trust and indirect trust based on recommendations. It handles cases where the requesting entity may have a past interaction experience or fresh entity without any past experience with the service. It includes the capability to caus...
متن کاملRandom Key Pre-Distribution Techniques against Sybil Attacks
Sybil attacks pose a serious threat for Wireless Sensor Networks (WSN) security. They can create problems in routing, voting schemes, decision making, distributed storage and sensor re-programming. In a Sybil attack, the attacker masquerades as multiple sensor identities that are actually controlled by one or a few existing attacker nodes. Sybil identities are fabricated out of stolen keys, obt...
متن کاملDetection of Sybil Attack in VANETs by Trust Establishment in Clusters
Vehicular ad hoc networks (VANET) are a class of ad hoc networks build to ensure the safety of traffic. Trust and security remain a major concern in VANET since a simple mistake can have catastrophic consequence. A crucial point in VANET is how to trust the information transmitted when the neighbouring vehicles are rapidly changing and moving in and out of range. The main aim of this paper is t...
متن کاملSybil-Resilient Online Content Rating
Obtaining user feedback (using votes) is essential in ranking user-generated online content. However, any online voting system is susceptible to the Sybil attack where adversaries can out-vote real users by creating several Sybil identities. In this paper, we present SumUp, a Sybilresilient online content rating system that leverages trust networks among users to defend against Sybil attacks wi...
متن کاملAn Efficient Method to Detect Sybil Attack using Trust based Model
Sybil attack is one of the most severe attacks in the vast domain of ad-hoc network. Mobile Ad-hoc Network (MANET) has to face this attack in its different application areas due to its inherent properties like mobility, absence of centralized infrastructure and limited resources. In this paper the threats of Sybil attacks in different environment of MANET is discussed briefly and taxonomy of va...
متن کامل