Skip to main content

An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System

  • Conference paper
Autonomic and Trusted Computing (ATC 2007)

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 4610))

Included in the following conference series:

Abstract

It is argued that group-based trust metric is effective in resisting attacks, which evaluates groups of assertions “in tandem”, and generally computes trust ranks for sets of individuals according to peers’ social position in trust network. Thus, the group-based trust value should be called “reputation rank”. But, unfortunately, most group-based trust metrics are vulnerable to the attack of front peers, which represent these malicious colluding peers always cooperate with others in order to increase their reputation, and then provide misinformation to promote actively malicious peers. In this paper, we proposed adaptive spreading activation approach to mitigating the effect of front peer attack, in which adaptive spreading factor is used to reflect the peer’s recommendation ability according to behaviors of the peer’s direct/indirect children in trust network; Simulation results show that the adaptive spreading activation approach can identify and mitigate the attack of front peer.

Research supported by the NSFC Grants 60472067, JiangSu education bureau (5KJB510091) and State Key Laboratory of Networking and Switching Technology, Beijing University of Posts and Telecommunications (BUPT).

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Golbeck, J., Parsia, B., Hendler, J.: Trust networks on the semantic web. In: Proceedings of the 7th International Workshop on Cooperative Intelligent Agents (2003)

    Google Scholar 

  2. Guha, R., Kumar, R., Raghavan, P., Tomkins, A.: Propagation of trust and distrust. In: Proceedings of the 13th International World Wide Web Conference (2004)

    Google Scholar 

  3. Ziegler, C.N., Lausen, G.: Spreading activation models for trust propagation. In: Proceedings of the IEEE International Conference on e-Technology, e-Commerce, and e-Service (2004)

    Google Scholar 

  4. Douceur, J.R.: The sybil attack. In: Proceedings of 1st International Workshop on Peer-to-Peer Systems (2002)

    Google Scholar 

  5. Wang, Y.F., Hori, Y., Sakurai, K.: On securing open networks through trust and reputation? architecture, challenges and solutions. In: Proceeding of The 1st Joint Workshop on Information Security (2006)

    Google Scholar 

  6. Hogg, T., Adamic, L.: Enhancing reputation mechanisms via online social networks. In: Proceedings of ACM Conference on Electronic Commerce (2004)

    Google Scholar 

  7. Levien, R.: Attack resistant trust metrics. PhD thesis, UC Berkeley, Berkeley, CA, USA (2003)

    Google Scholar 

  8. Cheng, A., Friedman, E.: Sybilproof reputation mechanisms. In: Proceeding of the ACM SIGCOMM workshop on Economics of peer-to-peer systems (2005)

    Google Scholar 

  9. Feldman, M., Lai, K., Stoica, I., Chuang, J.: Robust incentive techniques for peer-to-peer networks. In: Proceedings of the 5th ACM conference on Electronic commerce (2004)

    Google Scholar 

  10. Kamvar, S.D., Schlosser, M.T., Garcia-Molina, H.: The eigentrust algorithm for reputation management in P2P networks. In: Proceedings of the 12th International World Wide Web Conference (2003)

    Google Scholar 

  11. Aberer, K., Despotovic, Z.: Possibilities for managing trust in P2P networks. EPFL Technical Report, IC/2004/84, Lausanne (2004)

    Google Scholar 

  12. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems (2006)

    Google Scholar 

  13. Zhou, R., Hwang, K.: PowerTrust: A robust and scalable reputation system for trusted P2P computing. IEEE Transactions on Parallel and Distributed Systems, 18 (2007)

    Google Scholar 

  14. Ziegler, C.N., Lausen, G.: Propagation models for trust and distrust in social networks. Information Systems Frontiers 7 (2005)

    Google Scholar 

  15. Newman, M.E.J.: The structure and function of complex networks. SIAM Review 45, 167–256 (2003)

    Article  MATH  MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Bin Xiao Laurence T. Yang Jianhua Ma Christian Muller-Schloer Yu Hua

Rights and permissions

Reprints and permissions

Copyright information

© 2007 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Wang, Y., Hori, Y., Sakurai, K. (2007). An Adaptive Spreading Activation Approach to Combating the Front-Peer Attack in Trust and Reputation System. In: Xiao, B., Yang, L.T., Ma, J., Muller-Schloer, C., Hua, Y. (eds) Autonomic and Trusted Computing. ATC 2007. Lecture Notes in Computer Science, vol 4610. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-73547-2_26

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-73547-2_26

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-73546-5

  • Online ISBN: 978-3-540-73547-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics