The Optimization Model of Trust for White-Washing
With the increase of trust recommendation in the network services and applications, a large number of corresponding attacks including white-washing attacks have emerged. This paper proposes a trust optimization model in recommendation system to counter the white-washing attacks. The proposed model first separates the white-washing nodes from other nodes by dividing the nodes into different groups. The grouping will limit the dubious white-washing nodes in the proposed model so as to take these nodes much more cost to become a normal node. Meanwhile, the normal interactions are not affected. Our experimental results show that the proposed model can insulate suspicious white-washing nodes effectively, and ensures the normal interaction activities among normal nodes at the same time. Thus, the proposed model can resist the white-washing attacks effectively.
KeywordsTrustworthy recommendation White-washing prevention Nodes guarantee
This work is partly support by the Fundamental Research Funds for the Central Universities(No.NZ2015108), and the China Postdoctoral Science Foundation funded project(2015M571752), and the Jiangsu Planned Projects for Postdoctoral Research Funds (1402033C),and Open Project Foundation of Information Technology Research Base of Civil Aviation Administration of China(NO.CAAC-ITRB-201405).
- 1.Bilge, L., Strufe, T., Balzarotti, D., Kirda, E.: All your contacts are belong to us: automated identity theft attacks on social networks. In: Proceedings of the 18th international conference on World wide web, pp. 551–560. ACM (2009)Google Scholar
- 9.Huang, K., Liu, Y., Nepal, S., Fan, Y., Chen, S., Tan, W.: A novel equitable trustworthy mechanism for service recommendation in the evolving service ecosystem. In: Franch, X., Ghose, A.K., Lewis, G.A., Bhiri, S. (eds.) ICSOC 2014. LNCS, vol. 8831, pp. 510–517. Springer, Heidelberg (2014)CrossRefGoogle Scholar
- 10.Kudtarkar, A.M., Umamaheswari, S.: Avoiding white washing in P2P networks. In: First International Communication Systems and Networks and Workshops, 2009, COMSNETS 2009, pp. 1–4. IEEE (2009)Google Scholar
- 11.Chen, J., Lu, H., Bruda, S.D.: Analysis of feedbacks and ratings on trust merit for peer-to-peer systems. In: International Conference on E-Business and Information System Security, 2009, EBISS’09, pp. 1–5. IEEE (2009)Google Scholar
- 12.de Almeida, R.B., Natif, M., Augusto, J., da Silva, A.P.B., Vieira, A.B.: Pollution and whitewashing attacks in a P2P live streaming system: analysis and counter-attack. In: 2013 IEEE International Conference on Communications (ICC), pp. 2006–2010. IEEE (2013)Google Scholar