Skip to main content

Asymptotic Risk Analysis for Trust and Reputation Systems

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 7741))

Abstract

Trust and reputation systems are decision support tools used to drive parties’ interactions on the basis of parties’ reputation. In such systems, parties rate with each other after each interaction. Reputation scores for each ratee are computed via reputation functions on the basis of collected ratings. We propose a general framework based on Bayesian decision theory for the assessment of such systems, with respect to the number of available ratings. Given a reputation function g and n independent ratings, one is interested in the value of the loss a user may incur by relying on the ratee’s reputation as computed by the system. To this purpose, we study the behaviour of both Bayes and frequentist risk of reputation functions with respect to the number of available observations. We provide results that characterise the asymptotic behaviour of these two risks, describing their limits values and the exact exponential rate of convergence. One result of this analysis is that decision functions based on Maximum-Likelihood are asymptotically optimal. We also illustrate these results through a set of numerical simulations.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Barber, D.: Bayesian Reasoning and Machine Learning. Cambridge University Press (2012)

    Google Scholar 

  2. Boreale, M., Celestini, A.: Asymptotic risk analysis for trust and reputation systems, https://dl.dropbox.com/u/6235789/works/FullRisk.pdf

  3. Boreale, M., Pampaloni, F., Paolini, M.: Quantitative Information Flow, with a View. In: Atluri, V., Diaz, C. (eds.) ESORICS 2011. LNCS, vol. 6879, pp. 588–606. Springer, Heidelberg (2011)

    Chapter  Google Scholar 

  4. Boukerch, A., Xu, L., EL-Khatib, K.: Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30(11-12), 2413–2427 (2007)

    Article  Google Scholar 

  5. Despotovic, Z., Aberer, K.: A Probabilistic Approach to Predict Peers’ Performance in P2P Networks. In: Klusch, M., Ossowski, S., Kashyap, V., Unland, R. (eds.) CIA 2004. LNCS (LNAI), vol. 3191, pp. 62–76. Springer, Heidelberg (2004)

    Chapter  Google Scholar 

  6. Ellison, C., Frantz, B., Lampson, B., Rivest, R., Thomas, B., Ylonen, T.: Spki certificate theory. IETF RFC (1999)

    Google Scholar 

  7. ElSalamouny, E., Sassone, V., Nielsen, M.: HMM-Based Trust Model. In: Degano, P., Guttman, J.D. (eds.) FAST 2009. LNCS, vol. 5983, pp. 21–35. Springer, Heidelberg (2010)

    Chapter  Google Scholar 

  8. Heinrich, G.: Parameter estimation for text analysis. Technical report (2004)

    Google Scholar 

  9. Berger, J.O.: Statistical Decison Theory and Bayesian Analysis. Springer (1985)

    Google Scholar 

  10. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2), 618–644 (2007)

    Article  Google Scholar 

  11. Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of Bled eCommerce Conference (2002)

    Google Scholar 

  12. Kulhavý, R.: A kullback-leibler distance approach to system identification. Annual Reviews in Control 20, 119–130 (1996)

    Article  Google Scholar 

  13. Lacoste-Julien, S., Huszár, F., Ghahramani, Z.: Approximate inference for the loss-calibrated bayesian. In: Proceedings of AISTATS (2011)

    Google Scholar 

  14. Leang, C.C., Johnson, D.H.: On the asymptotics of m-hypothesis bayesian detection. IEEE Transactions on Information Theory 43(1), 280–282 (1997)

    Article  MathSciNet  MATH  Google Scholar 

  15. Palamidessi, C., Alvim, M., Chatzikokolakis, K., Smith, G.: Measuring information leakage using generalized gain functions. In: Proceedings of CSF 2012 (to appear, 2012)

    Google Scholar 

  16. Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: Proceedings of HICSS, pp. 2431–2439 (2002)

    Google Scholar 

  17. Neuman, B.C., Ts’o, T.: Kerberos: an authentication service for computer networks. IEEE Communications Magazine 32(9), 33–38 (1994)

    Article  Google Scholar 

  18. Nguyen, C.T., Camp, O., Loiseau, S.: A bayesian network based trust model for improving collaboration in mobile ad hoc networks. In: RIVF, pp. 144–151 (2007)

    Google Scholar 

  19. Robert, C.P.: The Bayesian Choice. Springer (2001)

    Google Scholar 

  20. Sassone, V., Nielsen, M., Krukow, K.: Towards a formal framework for computational trust. Formal Methods for Components and Objects 4, 175–184 (2007)

    Article  Google Scholar 

  21. Schlosser, A., Voss, M., Brückner, L.: Comparing and evaluating metrics for reputation systems by simulation. In: Paolucci, et al. [21] (2004)

    Google Scholar 

  22. Cover, T.M., Thomas, J.A.: Elements of Information Theory, 2/e. Addison-Wesley (2006)

    Google Scholar 

  23. Teacy, W.T.L., Patel, J., Jennings, N.R., Luck, M.: Coping with inaccurate reputation sources: Experimental analysis of a probabilistic trust model. In: AAMAS (2005)

    Google Scholar 

  24. Wang, Y., Vassileva, J.: Trust and reputation model in peer-to-peer networks. In: P2P, pp. 150–157 (2003)

    Google Scholar 

  25. Xiong, L., Liu, L.: Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE TKDE 16(7), 843–857 (2004)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Boreale, M., Celestini, A. (2013). Asymptotic Risk Analysis for Trust and Reputation Systems. In: van Emde Boas, P., Groen, F.C.A., Italiano, G.F., Nawrocki, J., Sack, H. (eds) SOFSEM 2013: Theory and Practice of Computer Science. SOFSEM 2013. Lecture Notes in Computer Science, vol 7741. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-35843-2_16

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-35843-2_16

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-35842-5

  • Online ISBN: 978-3-642-35843-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics