A collusion mitigation scheme for reputation systems

Authors

Abstract:

Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of colluders is shown to be an NP-complete problem. In this paper, we propose the Colluders Similarity Measure (CSM) which is used by a heuristic clustering algorithm (the Colluders Detection Algorithm (CDA)) to detect colluders in O (n2m + n4) in which m and n are the total number of nodes and colluders, respectively. Furthermore, we propose an architecture to implement the algorithm in a distributed manner which can be used together with compatible reputation management systems. Implementation results and comparison with other mitigation methods show that our scheme prevents colluders from unfairly increasing their reputation and decreasing the reputation of the other nodes.

Upgrade to premium to download articles

Sign up to access the full text

Already have an account?login

similar resources

Collusion-Resistant Reputation Mechanism for Multi-Agents Systems

We address the collusion problem in a reputation multi-agent system where agents represent service providers, consumers, and a controller. A game structure is proposed where players are supposed rational and seek for maximum payoffs. The main issue addressed in this paper is how to maintain a collusion-resistant reputation mechanism. We analyze the behavior of different players with respect to ...

full text

A collusion attack on the fuzzy vault scheme

The Fuzzy Vault scheme is an encryption scheme, which can tolerate errors in the keys. This leads to the possibility of enhancing the security in environments where these errors can be common, such as biometrics storage systems. Although several researchers have provided implementations, we find that the scheme is vulnerable to attacks when not properly used. This paper describes an attack on t...

full text

Making Eigenvector-Based Reputation Systems Robust to Collusion

Eigenvector based methods in general, and Google’s PageRank algorithm for rating web pages in particular, have become an important component of information retrieval on the Web. In this paper, we study the efficacy of, and countermeasures for, collusions designed to improve user rating in such systems. We define a metric, called the amplification factor, which captures the amount of PageRank-in...

full text

Identifying Collusion Attack in P2P Trust and Reputation Systems

Internet became today a medium of sharing large amount of data among different nodes situated anywhere in the world. Due to its fairly open nature Peer to Peer applications gain-ing popularity in sharing of large data rather then conventional client-server systems. Many P2P applications has been designed for the purpose of content distribution over Internet and most of them are based on decentr...

full text

A Point-Based Incentive Scheme for P2P Reputation Management Systems

This paper proposes an incentive scheme for P2P resource management systems which encourages the users to evaluate the “trustworthiness of evaluations” given by the other users. More concretely, in the proposed scheme, each user earns a reward from other users by evaluating their evaluations, and a user which acquires a large number of evaluations will be granted a right to access high quality ...

full text

A Robust Reputation Scheme for Decentralized Group Management Systems

In the literature, reputation systems are used to evaluate other entities behavior and have many applications such as, for instance, the detection of malicious entities. The associated models are based on mathematic formulae, in order to formaly de ne elements such as the reputation evaluation and evolution and the reputation propagation between peers. Current proposals describe the behaviors o...

full text

My Resources

Save resource for easier access later

Save to my library Already added to my library

{@ msg_add @}


Journal title

volume 7  issue 2

pages  151- 166

publication date 2015-12-07

By following a journal you will be notified via email when a new issue of this journal is published.

Hosted on Doprax cloud platform doprax.com

copyright © 2015-2023