Abstract
Trust systems assist in dealing with users who may betray one another. Cunning users (attackers) may attempt to hide the fact that they betray others, deceiving the system. Trust systems that are difficult to deceive are considered more robust. To formally reason about robustness, we formally model the abilities of an attacker. We prove that the attacker model is maximal, i.e. 1) the attacker can perform any feasible attack and 2) if a single attacker cannot perform an attack, then a group of attackers cannot perform that attack. Therefore, we can formulate robustness analogous to security.
Chapter PDF
Similar content being viewed by others
Keywords
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.
References
Baeten, J.C.M., Basten, T., Reniers, M.A.: Process algebra: equational theories of communicating processes, vol. 50. Cambridge University Press (2010)
Billingsley, P.: Probability and measure, 3rd edn. Wiley (1995)
Blanchet, B.: Security protocol verification: Symbolic and computational models. In: Degano, P., Guttman, J.D. (eds.) Principles of Security and Trust. LNCS, vol. 7215, pp. 3–29. Springer, Heidelberg (2012)
Blanchet, B., Abadi, M., Fournet, C.: Automated verification of selected equivalences for security protocols. In: Logic in Computer Science, pp. 331–340. IEEE (2005)
Dolev, D., Yao, A.C.: On the security of public key protocols. IEEE Transactions on Information Theory 29(2), 198–208 (1983)
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)
Henzinger, T.A.: The theory of hybrid automata. Springer (2000)
Hoffman, K., Zage, D., Nita-Rotaru, C.: A survey of attack and defense techniques for reputation systems. ACM Comput. Surv. 42(1), 1–31 (2009)
Jiang, S., Zhang, J., Ong, Y.-S.: An evolutionary model for constructing robust trust networks. In: Autonomous Agents and Multi-Agent Systems, pp. 813–820. IFAAMAS (2013)
Jøsang, A., Golbeck, J.: Challenges for robust trust and reputation systems. In: Security and Trust Management, Saint Malo, France (2009)
Jøsang, A., Ismail, R.: The beta reputation system. In: Bled Electronic Commerce Conference, pp. 41–55 (2002)
Kerr, R., Cohen, R.: Towards provably secure trust and reputation systems in e-marketplaces. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, p. 172. ACM (2007)
Kerr, R., Cohen, R.: Smart cheaters do prosper: defeating trust and reputation systems. In: Autonomous Agents and Multiagent Systems, vol. 2, pp. 993–1000. International Foundation for Autonomous Agents and Multiagent Systems (2009)
Klin, B., Sassone, V.: Structural operational semantics for stochastic process calculi. In: Amadio, R.M. (ed.) FOSSACS 2008. LNCS, vol. 4962, pp. 428–442. Springer, Heidelberg (2008)
Koblitz, N., Menezes, A.: Another look at “provable security”. Cryptology ePrint Archive, Report 2004/152 (2004)
Kwiatkowska, M., Norman, G., Sproston, J., Wang, F.: Symbolic model checking for probabilistic timed automata. In: Lakhnech, Y., Yovine, S. (eds.) FORMATS 2004 and FTRTFT 2004. LNCS, vol. 3253, pp. 293–308. Springer, Heidelberg (2004)
Lam, S.K., Riedl, J.: Shilling recommender systems for fun and profit. In: International Conference on World Wide Web, pp. 393–402. ACM (2004)
Mui, L., Mohtashemi, M., Halberstadt, A.: A computational model of trust and reputation. In: System Sciences, HICSS, pp. 2431–2439. IEEE (2002)
Muller, T., Liu, Y., Mauw, S., Zhang, J.: On robustness of trust systems. Technical report, Nanyang Technological University (2014), http://pat.sce.ntu.edu.sg/tim/papers/robustnesstechreport.pdf
Muller, T., Schweitzer, P.: A formal derivation of composite trust. In: Garcia-Alfaro, J., Cuppens, F., Cuppens-Boulahia, N., Miri, A., Tawbi, N. (eds.) FPS 2012. LNCS, vol. 7743, pp. 132–148. Springer, Heidelberg (2013)
Muller, T., Schweitzer, P.: On beta models with trust chains. In: Fernández-Gago, C., Martinelli, F., Pearson, S., Agudo, I. (eds.) IFIPTM 2013. IFIP, vol. 401, pp. 49–65. Springer, Heidelberg (2013)
Stewart, W.J.: Introduction to the numerical solution of Markov chains, vol. 41. Princeton University Press, Princeton (1994)
Sun, Y.L., Han, Z., Yu, W., Liu, K.J.R.: Attacks on trust evaluation in distributed networks. In: Information Sciences and Systems, pp. 1461–1466. IEEE (2006)
Zhang, J., Cohen, R.: Evaluating the trustworthiness of advice about seller agents in e-marketplaces: A personalized approach. Electronic Commerce Research and Applications 7(3), 330–340 (2008)
Zhang, L., Jiang, S., Zhang, J., Ng, W.K.: Robustness of trust models and combinations for handling unfair ratings. In: Dimitrakos, T., Moona, R., Patel, D., McKnight, D.H. (eds.) IFIPTM 2012. IFIP AICT, vol. 374, pp. 36–51. Springer, Heidelberg (2012)
Author information
Authors and Affiliations
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 IFIP International Federation for Information Processing
About this paper
Cite this paper
Muller, T., Liu, Y., Mauw, S., Zhang, J. (2014). On Robustness of Trust Systems. In: Zhou, J., Gal-Oz, N., Zhang, J., Gudes, E. (eds) Trust Management VIII. IFIPTM 2014. IFIP Advances in Information and Communication Technology, vol 430. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-662-43813-8_4
Download citation
DOI: https://doi.org/10.1007/978-3-662-43813-8_4
Publisher Name: Springer, Berlin, Heidelberg
Print ISBN: 978-3-662-43812-1
Online ISBN: 978-3-662-43813-8
eBook Packages: Computer ScienceComputer Science (R0)