Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
Skip to main content

Advertisement

PerContRep: a practical reputation system for pervasive content services

  • Published:
The Journal of Supercomputing Aims and scope Submit manuscript

    We’re sorry, something doesn't seem to be working properly.

    Please try refreshing the page. If that doesn't work, please contact support so we can address the problem.

Abstract

Social network has extended its popularity from the Internet to mobile domain. Personal mobile devices can be self-organized and communicate with each other for instant social activities at any time and in any places to achieve pervasive social networking (PSN). In such a network, various content information flows. To which extent should mobile users trust it, whilst user privacy can also be preserved? Existing work has not yet seriously considered trust and reputation management, although trust plays an important role in PSN. In this paper, we propose PerContRep, a practical reputation system for pervasive content services that can assist trustworthy content selection and consumption in a pervasive manner. We develop a hybrid trust and reputation management model to evaluate node recommendation trust and content reputation in the context of frequent change of node pseudonyms. Simulations show the advantages of PerContRep in assisting user decisions and its effectiveness with regard to unfair rating attack, collaborative unfair rating attack, on-off attack and conflict behavior attack. A prototype system achieves positive user feedback on its usability and social acceptance.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1
Fig. 2
Fig. 3
Fig. 4
Fig. 5
Fig. 6
Fig. 7

Similar content being viewed by others

References

  1. Junction, Stanford MobiSocial Group. http://openjunction.org/. Accessed 20 March 2013

  2. MicroBlog. http://synrg.ee.duke.edu/microblog.html. Accessed 20 March 2013

  3. Sarigöl E, Riva O, Stuedi P, Alonso G (2009) Enabling social networking in ad hoc networks of mobile phones. Proc VLDB Endow 9(2):1634–1637

    Article  Google Scholar 

  4. Hyytia E, Virtamo J, Lassila P, Kangasharju J, Ott J (2011) When does content float? characterizing availability of anchored information in opportunistic content sharing. In: Proceedings of IEEE INFOCOM, pp 3137–3145

  5. Ott J, Hyytiä E, Lassila PE, Kangasharju J, Santra S (2011) Floating content for probabilistic information sharing. Pervasive Mob Comput 7(6):671–689

    Article  Google Scholar 

  6. EZSetup. http://research.microsoft.com/en-us/groups/wn/mssn.aspx. Accessed 20 March 2013

  7. Nokia Instant Community. http://conversations.nokia.com/2010/05/25/nokia-instant-community-gets-you-social/. Accessed 20 March 2013

  8. Ahtiainen A, Kalliojarvi K, Kasslin M, Leppanen K, Richter A, Ruuska P, Wijting C (2009) Awareness networking in wireless environments: means of exchanging information. IEEE Vehicular Technol Mag 4(3):48–54

    Article  Google Scholar 

  9. Familiar Stranger. http://www.paulos.net/research/intel/familiarstranger/index.htm. Accessed 20 March 2013

  10. Yan Z, Holtmanns S (2008) Trust modeling and management: from social trust to digital trust. In: Subramanian R (ed) Computer security, privacy and politics: current issues challenges and solutions. Idea Group Inc., Hershey, USA, pp 290–323

  11. Yang Y, Sun Y, Kay S, Yang Q (2009) Defending online reputation systems against collaborative unfair raters through signal modeling and trust. Proc ACM SAC 2009:1308–1315

    Google Scholar 

  12. Douceur JR (2002) The sybil attack. In: Proceedings of IPTPS, LNCS, vol 2429, pp 251–260

  13. Sun Y, Han Z, Liu KJR (2008) Defense of trust management vulnerabilities in distributed networks. IEEE Commun Mag 46(2):112–119

    Article  Google Scholar 

  14. Jøsang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decision support systems. Elsevier, Netherlands, pp 618–644

  15. Sun Y, Yu W, Han Z, Liu KJR (2006) Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEE J Sel Area Commun 24(2):305–317

    Article  MATH  Google Scholar 

  16. Theodorakopoulos G, Baras JS (2006) On trust models and trust evaluation metrics for ad hoc networks. IEEE J Sel Areas Commun 24(2):318–328

    Article  Google Scholar 

  17. Raya M, Papadimitratos P, Gligory VD, Hubaux JP (2008) On data-centric trust establishment in ephemeral ad hoc networks. IEEE INFOCOM, pp 1912–1920

  18. Michiardi P, Molva R (2002) Core: a collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. Adv Commun Multimed Secur LNCS 2828:107–121

    Article  Google Scholar 

  19. Xiong L, Liu L (2003) A reputation-based trust model for peer-to-peer ecommerce communities. In: Proceedings of the IEEE conference on E-Commerce, pp 228–229

  20. Buchegger S, Boudec JL (2002) Performance analysis of the CONFIDANT protocol. In: Proeedings of the ACM international symposium on mobile ad hoc networking and computing (MobiHoc), pp 226–236

  21. Buchegger S, Boudec JYL (2003) The effect of rumor spreading in reputation systems for mobile ad-hoc networks. In: Proceedings of WiOpt modeling and optimization in mobile, ad hoc and wireless networks, Sophia-Antipolis

  22. Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. In: Baye M (ed) Advances in applied microeconomics: the economics of the internet and e-commerce. Elsevier, Netherlands

  23. Resnick P, Kuwabara K, Zeckhauser R, Friedman E (2000) Reputation systems. Commun ACM 43(12):45–48

    Article  Google Scholar 

  24. Yan Z, Zhang P, Deng RH (2012) TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications. J Pers Ubiquitous Comput 16(5):485–506

    Article  Google Scholar 

  25. Lin C, Varadharajan V, Wang Y, Pruthi V (2004) Enhancing grid security with trust management. In: Proceedings of IEEE international conference on services, computing, pp 303–310

  26. Li J, Li R, Kato J (2008) Future trust management framework for mobile ad hoc networks. IEEE Commun Mag 46(4):108–115

    Article  Google Scholar 

  27. Song S, Hwang K, Zhou R, Kwok YK (2005) Trusted P2P transactions with fuzzy reputation aggregation. IEEE Internet Comput 9(6):24–34

    Article  Google Scholar 

  28. Walsh K, Sirer EG (2005) Fighting peer-to-peer spam and decoys with object reputation. In: Proceedings of P2PECON, pp 138–143

  29. Trifunovic S, Legendre F, Anastasiades C (2010) Social trust in opportunistic networks. In: Proceedings of IEEE INFOCOM Workshops, pp 1–6

  30. Adler BT, Alfaro L (2007) A content driven reputation system for the Wikipedia. WWW07, pp 261–270

  31. Kujimura K, Nishihara T (2003) Reputation rating system based on past behavior of evaluators. In: Proceedings of the 4th ACM conference on electronic commerce, pp 246–247

  32. Bansal S, Baker M (2003) Observation-based cooperation enforcement in ad hoc networks. Technical Report, Stanford University, NI/0307012

  33. Hu J, Burmester M (2006) LARS: a locally aware reputation system for mobile ad hoc networks. In: Proceedings of the 44th ACM annual Southeast Regional Conference, pp 119–123

  34. Corritore CL, Kracher B, Wiedenbeck S (2003) On-line trust: concepts, evolving themes: a model. Int J Hum Comput Stud 58(6):737–758

    Article  Google Scholar 

  35. Yan Z, Chen Y (2010) AdContRep: a privacy enhanced reputation system for MANET content services. LNCS 6407:414–429

    Google Scholar 

  36. Liu Z, Yau SS, Peng D, Yin Y (2008) A flexible trust model for distributed service infrastructures. In: Proceedings of 11th IEEE symposium on object oriented real-time, distributed computing, pp 108–115

  37. Sun Y, Han Z, Yu W, Liu KJR (2006) A trust evaluation framework in distributed networks: vulnerability analysis and defense against attacks. INFOCOM, pp 1–13

  38. Yan Z, Chen Y, Shen Y (2012) A practical reputation system for pervasive social chatting. J Comput Syst Sci. doi:10.1016/j.jcss.2012.11.003

  39. Yu S, Wang C, Ren K, Lou W (2010) Achieving secure, scalable, and fine-grained data access control in cloud computing. In: Proceedings of IEEE INFOCOM, pp 534–542

  40. Wan Z, Liu J, Deng RH (2012) HASBE: a hierarchical attribute-based solution for flexible and scalable access control in cloud computing. IEEE Trans Info Forensics Secur 7(2):743–754

    Article  Google Scholar 

  41. Yan Z, Liu C, Niemi V, Yu G (2013) Exploring the impact of trust information visualization on mobile application usage. J Pers Ubiquitous Comput. doi:10.1007/s00779-013-0636-4

  42. Davis FD (1989) Perceived usefulness, perceived ease of use, and user acceptance of information technology. MIS Q 13(3):319–340

    Article  Google Scholar 

  43. Venkatesh V, Bala H (2008) Technology acceptance model 3 and a research agenda on interventions. Decis Sci 39(2):273–315

    Article  Google Scholar 

  44. Yan Z (2010) Trust modeling and management in digital environments: from social concept to system development, IGI Global

  45. He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) ReTrust: attack-resistant and lightweight trust management for medical sensor networks. IEEE Trans Info Technol Biomed 16(4):623–632

    Article  Google Scholar 

  46. He D, Chen C, Chan S, Bu J, Vasilakos AV (2012) A distributed trust evaluation model and its application scenarios for medical sensor networks. IEEE Trans Info Technol Biomed 16(6):1164–1175

    Article  Google Scholar 

  47. Wang Y, Nakao A, Vasilakos AV, Ma J (2011) P2P soft security: on evolutionary dynamics of P2P incentive mechanism. Comput Commun 34(3):241–249

    Article  Google Scholar 

  48. Jin L, Chen Y, Wang T, Hui P, Vasilakos, AV (2013) Understanding user behavior in online social networks: a survey. IEEE Commun Mag

  49. Yan Z, Niemi V, Chen Y, Zhang P, Kantola R (2013) Mobile social networking: an innovative approach. In: Chin A, Zhang D (eds) Towards trustworthy mobile social networking. Springer, Germany, pp 195–235

Download references

Acknowledgments

This work is sponsored by the following grants: the PhD grant (JY0300130104) of Chinese Educational Ministry, the initial grant of Chinese Educational Ministry for researchers from abroad (JY0600132901), and the grant of Shaanxi Province for excellent researchers from abroad (680F1303). A preliminary version of this paper appeared in the Proceedings of the 7th International Conference Ubiquitous Intelligence and Computing 2010 (UIC ’10) [35].

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zheng Yan.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Yan, Z., Chen, Y. & Shen, Y. PerContRep: a practical reputation system for pervasive content services. J Supercomput 70, 1051–1074 (2014). https://doi.org/10.1007/s11227-014-1116-y

Download citation

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11227-014-1116-y

Keywords