Skip to main content

Transactional Security for a Distributed Reputation Management System

  • Conference paper
  • First Online:
E-Commerce and Web Technologies (EC-Web 2002)

Part of the book series: Lecture Notes in Computer Science ((LNCS,volume 2455))

Included in the following conference series:

Abstract

Today, reputation systems such as ebay’s prominent “Feedback Forum” are becoming more widespread. In such a system, reputations are formed by aggregating ratings participants give and receive. These reputations, however, are bound to a specific platform preventing participants from taking and showing their hard-earned reputations elsewhere. That makes the reputations less valuable and leaves them vulnerable to manipulation and total loss. In this paper, we propose a viable solution to these issues in which current P2P and PKI technologies are employed to shift ownership and responsibility back to the participants. Our envisioned Reputation Management System, therefore, uses contextdependent feedback gathered in questionnaires and provides security for peer transactions to ensure integrity, confidentiality and privacy.

This research was made possible, in part, by the kind support of the project unit eSolutions, T-Systems GEI GmbH, Germany. We are especially grateful to Everett Wilson for his support and constructive comments on this paper.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Abdul-Rahman, A., Hailes, S.: Supporting Trust in Virtual Communities. In: Proceedings of the Hawai’i Int’l. Conf. on System Sciences, Hawaii (2000)

    Google Scholar 

  2. Aura, T.: Strategies against Replay Attacks. In: Proceedings of the 10th IEEE Computer Security Foundations Workshop, Rockport, Massachusetts (1997)

    Google Scholar 

  3. Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proc. of the IEEE Symp. on Security and Privacy, IEEE Society Press (1996) 164–173

    Google Scholar 

  4. Casassa Mont, M., Tomasi, L., Montanari, R.: An Adaptive System Responsive to Trust Assessment Based on Peer-to-Peer Evidence Replication and Storage. Technical report HPL-2001-133, Hewlett Packard Laboratories (2001)

    Google Scholar 

  5. Chaum, D.: Security without Identification: Transaction Systems to Make Big Brother Obsolete. Communications of the ACM 28 (1985) 1030–1040

    Article  Google Scholar 

  6. Chen, R., Yeager, W.: Poblano— A Distributed Trust Model for Peer-to-Peer Networks (2001). http://www.jxta.org/project/www/docs/trust.pdf, 02/21/2002.

  7. Dellarocas, C.: Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior. In: Proceedings of the 2nd ACM Conference on Electronic Commerce, Minneapolis, MN (2000)

    Google Scholar 

  8. Dierks, T., Allen, C.: The TLS Protocol Version 1.0 (1999). http://www.rfceditor.org/rfc/rfc2246.txt, 02/28/2002.

  9. Dingledine, R., Freedman, M. J., Molnar, D.: Accountability. In Oram, A. (ed.): Peer-to-Peer. Harnessing the Power of Disruptive Technologies. O’Reilly and Associates, Sebastopol, CA (2001)

    Google Scholar 

  10. ITU-T: Public-key and Attribute Certificate Frameworks. Recommendation X.509. (03/2000). http://www.itu.int, 05/17/2002.

  11. Josang, A.: The Right Type of Trust for Distributed Systems. In Meadows, C., (ed.): Proc. of New Security Paradigms Workshop, ACM Press (1996) 119–131

    Google Scholar 

  12. Labalme, F., Burton, K.: Enhancing the Internet with Reputations (2001). http://www.openprivacy.org/papers/200103-white.html, 02/21/2002.

  13. Levien, R.: Advogato’s Trust Metric (2000). http://www.advogato.org/trustmetric.html, 02/21/2002.

  14. Lethin, R.: Reputation. In Oram A., (ed.): Peer-to-Peer. Harnessing the Power of Disruptive Technologies, O’Reilly and Associates, 2001

    Google Scholar 

  15. Maximilien, E. M., Singh, M. P.: Reputation and Endorsement for Web Services. Proceedings of the ACM SIGecom conference 3 (2002) 24–31

    Google Scholar 

  16. Oram, A.: Peer-to-Peer. Harnessing the Power of Disruptive Technologies. O’Reilly and Associates, Sebastopol, CA, USA (2001)

    Google Scholar 

  17. Padovan, B., Sackmann, S., et al.: A Prototype for an Agent-based Secure Electronic Marketplace Including Reputation Tracking Mechanisms. In: Proc. of the 34th Hawai’i Int’l. Conf. on System Sciences, IEEE Computer Society (2001)

    Google Scholar 

  18. Raub, W., Weesie, J.: Reputation and Efficiency in Social Interactions: An Example of Network Effects. American Journal of Sociology 96 (1990) 626–654

    Article  Google Scholar 

  19. Resnick, P., Zeckhauser, R., et al.: Reputation Systems. Communications of the ACM 43 (2000) 45–48

    Article  Google Scholar 

  20. Rivest, R. L., Shamir, A.: How to Expose an Eavesdropper. Communications of the ACM 27 (1984) 393–395

    Article  Google Scholar 

  21. RSA Data Security, Inc.: Pkcs#12— pers. information exchange syntax std. (1999)

    Google Scholar 

  22. Sabater, J., Sierra, C.: Social Regret, a Reputation Model Based on Social Relations. Proceedings of the ACM SIGecom conference 3 (2001) 44–56

    Google Scholar 

  23. Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C. 2nd edn. John Wiley and Sons, Inc., New York, NY, USA (1996)

    MATH  Google Scholar 

  24. Winsborough, W., Seamons, K. E., Jones, V. E.: Automated Trust Negotiation. In: DARPA Information Survivability Conference and Exposition, USA (2000)

    Google Scholar 

  25. Yu, B., Singh, M. P.: A Social Mechanism of Reputation Management in Electronic Communities. In: Cooperative Information Agents, Boston, MA, USA (2000)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2002 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Fahrenholtz, D., Lamersdorf, W. (2002). Transactional Security for a Distributed Reputation Management System. In: Bauknecht, K., Tjoa, A.M., Quirchmayr, G. (eds) E-Commerce and Web Technologies. EC-Web 2002. Lecture Notes in Computer Science, vol 2455. Springer, Berlin, Heidelberg. https://doi.org/10.1007/3-540-45705-4_23

Download citation

  • DOI: https://doi.org/10.1007/3-540-45705-4_23

  • Published:

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-44137-3

  • Online ISBN: 978-3-540-45705-3

  • eBook Packages: Springer Book Archive

Publish with us

Policies and ethics