skip to main content
research-article

Reliable and Resilient Trust Management in Distributed Service Provision Networks

Authors Info & Claims
Published:16 June 2015Publication History
Skip Abstract Section

Abstract

Distributed service networks are popular platforms for service providers to offer services to consumers and for service consumers to acquire services from unknown parties. eBay and Amazon are two well-known examples of enabling and hosting such service networks to connect service providers to service consumers. Trust management is a critical component for scaling such distributed service networks to a large and growing number of participants. In this article, we present ServiceTrust++, a feedback quality--sensitive and attack resilient trust management scheme for empowering distributed service networks with effective trust management capability. Compared with existing trust models, ServiceTrust++ has several novel features. First, we present six attack models to capture both independent and colluding attacks with malicious cliques, malicious spies, and malicious camouflages. Second, we aggregate the feedback ratings based on the variances of participants’ feedback behaviors and incorporate feedback similarity as weight into the local trust algorithm. Third, we compute the global trust of a participant by employing conditional trust propagation based on the feedback similarity threshold. This allows ServiceTrust++ to control and prevent malicious spies and malicious camouflage peers from boosting their global trust scores by manipulating the feedback ratings of good peers and by taking advantage of the uniform trust propagation. Finally, we systematically combine a trust-decaying strategy with a threshold value--based conditional trust propagation to further strengthen the robustness of our global trust computation against sophisticated malicious feedback. Experimental evaluation with both simulation-based networks and real network dataset Epinion show that ServiceTrust++ is highly resilient against all six attack models and highly effective compared to EigenTrust, the most popular and representative trust propagation model to date.

References

  1. M. Albanese, A. d’Acierno, V. Moscato, F. Persia, and A. Picariello. 2013. A multimedia recommender system. ACM Transactions on Internet Technology (TOIT) 13, 1, Article 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. T. Beth, M. Borcherding, and B. Klein. 1994. Valuation of trust in open networks. 1994. In Proceedings of 3rd European Symposium on Research in Computer Security (ESORICS’94). Springer, Berlin, 1--18. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. A. B. Can and B. Bhargava. 2013. SORT: A self-organizing trust model for peer-to-peer systems. IEEE Transactions on Dependable and Secure Computing 10, 1, 14--27. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. J. Caverlee, L. Liu, and S. Webb. 2010. The SocialTrust framework for trusted social information management: Architecture and algorithms. Information Science 180, 1, 95--112. Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. C. Dwyer, S. R. Hiltz, and K. Passerini. 2007. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the 13th Americas Conference on Information Systems. 339--351.Google ScholarGoogle Scholar
  6. Q.-Y. Feng, L. Liu, and Y. F. Dai. 2012. Vulnerabilities and countermeasures in context-aware social rating service. Special Issue on Context-Aware Web Services for the Future Internet, ACM Transactions on Internet Technology (TOIT) 11, 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  7. K. K. Fullam, T. B. Klos, G. Muller, J. Sabater, A. Schlosser, Z. Topol, K. S. Barber, J. S. Rosenschein, L. Vercouter, and M. Voss. 2005. A speciation of the agent reputation and trust (ART) testbed: Experimentation and competition for trust in agent societies. In Proceedings of 4th International Joint Conference on Autonomous Agents and Multiagent Systems. 512--518. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. J. Golbeck. 2009. Trust and nuanced profile similarity in online social networks. ACM Transactions on the Web (TWEB) 3, 4, 1--33. Google ScholarGoogle ScholarDigital LibraryDigital Library
  9. J. Golbeck and J. Hendler. 2006. Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology (TOIT) ACM, 6, 4, 497--529. Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. 2004. Propagation of trust and distrust. In Proceedings of the 13th International Conference on World Wide Web. 403--412. Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. C. J. Hazard and M. P. Singh. 2013. Macau: A basis for evaluating reputation systems. In Proceedings of the 23th International Joint Conference on Artificial Intelligence (IJCAI). 1--7. Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. K. Hoffman, D. Zage, and C. Nita-Rotaru. 2007. A survey of attack and defense techniques for reputation systems. ACM Computing Surveys (CSUR) ACM, 42, 1, 1. Google ScholarGoogle ScholarDigital LibraryDigital Library
  13. S. W. Jiang, J. Zhang, and Y. S. Ong. 2012. A multiagent evolutionary framework based on trust for multiobjective optimization. In Proceeding of 11th International Conference on Autonomous Agents Multiagent Systems. 299--306. Google ScholarGoogle ScholarDigital LibraryDigital Library
  14. C. Jin-Hee, S. Ananthram Swami, and I. Chen. 2009. Towards trust-based cognitive networks: A survey of trust management for mobile ad hoc networks. In Proceedings of the 14th International Command and Control Research and Technology Symposium. Washington, DC.Google ScholarGoogle Scholar
  15. A. Jøsang, G.-B. Guo, M. S. Pini, F. Santini, and Y. Xu. 2013. Combining recommender and reputation systems to produce better online advice. In Proceedings of the 10th International Conference on Modeling Decisions for Artificial Intelligence (MDAI’13). 126--138.Google ScholarGoogle Scholar
  16. A. Jøsang, R. Ismail, and C. Boyd. 2007. A survey of trust and reputation systems for online service provision. Decision Support Systems 43, 2, 618--644. Google ScholarGoogle ScholarDigital LibraryDigital Library
  17. S. D. Kamvar, M. T. Schlosser, and H. Garcia-Molina. 2003. The eigentrust algorithm for reputation management in p2p networks. In Proceedings of the 12th International Conference on World Wide Web. ACM. 640--651. Google ScholarGoogle ScholarDigital LibraryDigital Library
  18. U. Kuter and J. Golbeck. 2010. Using probabilistic confidence models for trust reference in Web-based social networks. ACM Transactions on Internet Technology (TOIT) ACM, 10, 2, Article 8. Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. N. Lathia, S. Hailes, and L. Capra. 2008. Trust-based collaborative filtering. In Proceedings of IFIPTM 2008—Joint Trust and PST Conferences on Privacy, Trust Management and Security. Springer, 119--134.Google ScholarGoogle Scholar
  20. S.-Y. Liu, J. Zhang, C.-Y. Miao, Y. L. Theng, and A. C. Kot. 2011. iCLUB: An integrated clustering-based approach to improve the robustness of reputation systems. In Proceedings of 10th International Conference on Autonomous Agents Multiagent Systems. 1151--1152. Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. X.-Y. Li, F. Zhou, and X.-D. Yang. 2012. Scalable feedback aggregating (SFA) overlay for large-scale p2p trust management. IEEE Trsansactions on Parallel and Distributed Systems 23, 10, 1944--1957. Google ScholarGoogle ScholarDigital LibraryDigital Library
  22. B. Mobasher, R. Burke, R. Bhaumik, and C. Williams. 2007. Toward trustworthy recommender systems: An analysis of attack models and algorithm robustness. ACM Transactions on Internet Technology (TOIT) 7, 4, 23. Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. S. Nepal, W. Sherchan, and A. Bouguettaya. 2014. Service trust management for E-Government applications. Advanced Web Services 339--362.Google ScholarGoogle Scholar
  24. A. Y. Ng, A. X. Zheng, and M. I. Jordan. 2001. Link analysis, eigenvectors and stability. In Proceedings of 17th International Joint Conference on Artificial Intelligence. 903--910. Google ScholarGoogle ScholarDigital LibraryDigital Library
  25. F. J. Ortega, J. A. Troyano, F. L. Cruz, C. G. Vallejo, and F. Enríquez. 2012. Propagation of trust and distrust for the detection of trolls in a social network. Elsevier Computer Networks 56, 12, 2884--2895. Google ScholarGoogle ScholarDigital LibraryDigital Library
  26. L. Page, S. Brin, R. Motwani, and T. Winograd. 1998. The PageRank citation ranking: Bringing order to the web. Technical Report, Stanford Digital Library Technologies Project, Stanford InfoLab, Stanford, CA.Google ScholarGoogle Scholar
  27. P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. 2000. Reputation systems. Communications of the ACM 43, 12, 45--48. Google ScholarGoogle ScholarDigital LibraryDigital Library
  28. S. B. Roy, S. Amer-Yahia, A. Chawla, G. Das, and C. Yu. 2010. Space efficiency in group recommendation. The VLDB Journal 19, 6, 877--900. Google ScholarGoogle ScholarDigital LibraryDigital Library
  29. A. Seyedi, R. Saadi, and V. Issarny. 2011. Proximity-based trust inference for mobile social networking. In Proceedings of 5th IFIP WG 11.11 International Conference on Trust Management. 253--264.Google ScholarGoogle Scholar
  30. W. Sherchan, S. Nepal, and C. Paris. 2013. A survey of trust in social networks. ACM Computing Surveys 45, 4, Article 47, 33 pages. Google ScholarGoogle ScholarDigital LibraryDigital Library
  31. Z.-Y. Su, L. Liu, M. C. Li, X. X. Fan, and Y. Zhou. 2013. ServiceTrust: Trust management in service provision networks. In Proceedings of the IEEE 10th International Conference on Services Computing (SCC’13). Google ScholarGoogle ScholarDigital LibraryDigital Library
  32. X. F. Wang, L. Liu, and J. S. Su. 2012. RLM: A general model for trust representation and aggregation. IEEE Transactions on Service Computing 5, 1, 131--143. Google ScholarGoogle ScholarDigital LibraryDigital Library
  33. Y. H. Wang, Y and M. P. Singh. 2010. Evidence-based trust: A mathematical model geared for multiagent systems. ACM Transactions on Autonomous and Adaptive Systems (TAAS) 5, 4, 14. Google ScholarGoogle ScholarDigital LibraryDigital Library
  34. Y. H. Wang and M. P. Singh. 2007. Formal trust model for multiagent systems. In Proceedings of 20th International Joint Conference on Artificial Intelligence (IJCAI’07).1551--1556. Google ScholarGoogle ScholarDigital LibraryDigital Library
  35. J. Witkowski. 2011. Trust mechanisms for online systems. In Proceedings of 22th International Joint Conference on Artificial Intelligence (AAAI’11). 2866--2867. Google ScholarGoogle ScholarDigital LibraryDigital Library
  36. J. Witkowski, S. Seuken, and D. C. Parkes. 2011. Incentive-compatible escrow mechanisms. In Proceedings of the 25th AAAI Conference on Artificial Intelligence (AAAI ’11).Google ScholarGoogle Scholar
  37. L. Xiong and L. Liu. 2004. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering 16, 7, 843--857, 2004. Google ScholarGoogle ScholarDigital LibraryDigital Library
  38. H. Yu, Z. Q. Shen, C. Leung, C. Miao, and V. R. Lesser. 2013. A survey of multi-agent trust management systems. Access IEEE 35--50.Google ScholarGoogle Scholar
  39. R. F. Zhou and K. Hwang. 2007. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transations on Parallel and Distributed Systems 18, 4, 460--473. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Reliable and Resilient Trust Management in Distributed Service Provision Networks

        Recommendations

        Comments

        Login options

        Check if you have access through your login credentials or your institution to get full access on this article.

        Sign in

        Full Access

        PDF Format

        View or Download as a PDF file.

        PDF

        eReader

        View online with eReader.

        eReader
        About Cookies On This Site

        We use cookies to ensure that we give you the best experience on our website.

        Learn more

        Got it!