Abstract
Next generation Web 2.0 communities and distributed P2P systems rely on the cooperation of diverse user populations spread across numerous administrative and security domains. Zero accountability via anonymous online identities and divergent interests result in selfish behavior that can disrupt or manipulate networks for personal gain. While “reputation systems” are recognized as a promising means to establish social control for such communities, developing reliable reputation systems remains a challenge. Several unaddressed threats still limit the effectiveness of reputation systems. Furthermore, most existing work on reputations has focused on accurate reputations for stable systems, but not examined the implications of integrating user reputations into scalable distributed infrastructures. The primary goal of this paper is to investigate and address the critical open challenges that limit the effectiveness of reputations. First, we identify a thorough taxonomy on reputation management, and use it as our framework to classify adversarial threats that compromise reliable operation of reputation systems. Second, we survey existing research to address these threats. Finally, we present our solutions to address the two leading reasons for erroneous and misleading values produced by reputation systems today, i.e., user collusion and short-lived online identities. We believe that this paper not only serves as an introduction to reputation systems design, but will also help researchers deploy reliable reputation solutions that contribute towards improving the performance of large distributed applications.
Article PDF
Similar content being viewed by others
Explore related subjects
Discover the latest articles, news and stories from top researchers in related subjects.Avoid common mistakes on your manuscript.
References
Aberer, K., & Despotovic, Z. (2001). Managing trust in a peer-2-peer information system. In Proceedings of CIKM.
Ahn, Y. Y., Han, S., Kwak, H., Moon, S., & Jeong, H. (2007). Analysis of topological characteristics of huge online social networking services. In Proceedings of world wide web (WWW) conference.
Artz, D., & Gil, Y. (2007). A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web, 5(2).
Bhattacharjee, R., & Goel, A. (2005). Avoiding ballot stuffing in eBay-like reputation systems. In Proceedings of workshop on economics of peer-to-peer systems (P2PEcon).
Buchegger, S., & Boudec, J. L. (2001). Nodes bearing grudges: towards routing security, fairness, and robustness in mobile ad hoc networks. In Proceedings of Euromicro international conference on parallel, distributed and network-based computing (Euromicro-PDP).
Buchegger, S., & Boudec, J. L. (2004). A robust reputation system for P2P and mobile ad-hoc networks. In Proceedings of workshop on economics of peer-to-peer systems (P2PEcon).
Burton, K. (2002). Design of the openprivacy distributed reputation system. http://www.peerfear.org/papers/openprivacy-reputation.pdf.
Buttyan, L., & Hubaux, J. P. (2003). Stimulating cooperation in self-organizing mobile ad hoc networks. Mobile Networks and Applications, 8(5).
Cheng, A., & Friedman, E. (2005). Sybilproof reputation mechanisms. In Proceedings of workshop on economics of peer-to-peer systems (P2PEcon).
Dagum, C. (1980). The generation and distribution of income, the Lorenz curve and the Gini ratio. Economie Appliquée, 33.
Damiani, E., Di Vimercati, D. C., Paraboschi, S., Samarati, P., & Violante, F. (2002). A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proceedings of ACM conference on computer and communications security (CCCS).
Dellarocas, C. (2000). Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In Proceedings of ACM conference on electronic commerce (EC).
Dewan, P., & Dasgupta, P. (2004). Pride: peer-to-peer reputation infrastructure for decentralized environments. In Proceedings of world wide web (WWW) conference on alternate track papers and posters.
Dimitriou, T., Karame, G., & Christou, I. (2007). Supertrust: a secure and efficient framework for handling trust in super-peer networks. In Proceedings of ACM symposium on principles of distributed computing (PODC).
Domingos, P. (2005). Mining social networks for viral marketing. IEEE Intelligent Systems, 20(1).
Douceur, J. (2002). The Sybil attack. In Proceedings of international workshop on peer-to-peer systems (IPTPS).
Feldman, M., Lai, K., Stoica, I., & Chuang, J. (2004). Robust incentive techniques for peer-to-peer networks. In Proceedings of ACM conference on electronic commerce (EC).
Fernandes, A., Kotsovinos, E., Ostring, S., & Dragovic, B. (2004). Pinocchio: incentives for honest participation in distributed trust management. In Proceedings of international conference on trust management (iTrust).
Friedman, E., & Resnick, P. (2001). The social cost of cheap pseudonyms. Journal of Economics and Management Strategy, 10(2).
Gilbert, A., Abraham, A., & Paprzycki, M. (2004). A system for ensuring data integrity in grid environments. In Proceedings of IEEE international conference on information technology: computers and communications (ITCC).
Gnutella (2001). The Gnutella protocol specification v0.4.
Grandison, T., & Sloman, M. (2000). A survey of trust in internet application. IEEE Communications Surveys and Tutorials, 4(4).
Hasan, O., Brunie, L., Pierson, J. M., & Bertino, E. (2009). Elimination of subjectivity from trust recommendation. In Proceedings of the IFIP international conference on trust management.
Hogg, T., & Adamic, L. (2004). Enhancing reputation mechanisms via online social networks. In Proceedings of ACM conference on electronic commerce (EC).
Jensen, C., Davis, J., & Farnham, S. (2002). Finding others online: reputation systems for social online spaces. In Proceedings of ACM SIGCHI.
Josang, A., & Pope, S. (2005). Semantic constraints for trust transitivity. In Proceedings of the Asia-Pacific conferences on conceptual modelling (APCCM).
Josang, A., Ismail, R., & Boyd, C. (2007). A survey of trust and reputation systems for online service provision. Decision Support Systems, 43(2).
Kamvar, S. D., Schlosser, M. T., & Garcia-Molina, H. (2003). The eigentrust algorithm for reputation management in P2P networks. In Proceedings of world wide web (WWW) conference.
Kerr, R., & Cohen, R. (2009). An experimental testbed for evaluation of trust and reputation systems. In Proceedings of the IFIP international conference on trust management.
Kher, V. & Kim, Y. (2005). Securing distributed storage: challenges, techniques, and systems. In Proceedings of ACM international workshop on storage security and survivability (StorageSS).
Kollock, P. (1999). The production of trust in online markets. Advances in Group Processes, 16.
Kumar, R., Novak, J., & Tomkins, A. (2006). Structure and evolution of online social networks. In Proceedings of ACM internation conference on knowledge discovery and data mining.
Levien, R. (2000) Advogato’s trust metric. http://www.advogato.org/trust-metric.html.
Lian, Q., et al. (2007). An empirical study of collusion behavior in the maze p2p file-sharing system. In Proceedings of ICDCS.
Lorenz, M. (1905). Methods for measuring the concentration of wealth. American Statistical Association, 9.
Marti, S., & Garcia-Molina, H. (2003). Identity crisis: anonymity vs. reputation in P2P systems. In Proceedings of P2P.
Marti, S., & Garcia-Molina, H. (2006). Taxonomy of trust: categorizing P2P reputation systems. Computer Networks: The International Journal of Computer and Telecommunications Networking, 50(4).
Marti, S., Giuli, T. J., Lai, K., & Baker, M. (2000). Mitigating routing misbehavior in mobile ad hoc networks. In Proceedings of ACM MobiCom.
Mislove, A., Gummadi, K., & Druschel, P. (2006). Exploiting social networks for Internet search. In Proceedings of ACM HotNets.
Ooi, B. C., Liau, CY, & Tan, K. L. (2003). Managing trust in peer-to-peer systems using reputation-based techniques. In Proceedings of the advances in web-age information management (AWAIM).
Page, L., Brin, S., Motwani, R., & Winograd, T. (1998). The pagerank citation ranking: bringing order to the web (Tech. rep.). Stanford Digital Library Technologies Project.
Ratnasamy, S., Francis, P., Handley, M., Karp, R., & Schenker, S. (2001). A scalable content-addressable network. In Proceedings of ACM SIGCOMM.
Resnick, P., & Zeckhauser, R. (2001). Trust among strangers in internet transactions: empirical analysis of eBay’s reputation system. Advances in Applied Microeconomics, 11.
Resnick, P., Kuwabara, K., Zeckhauser, R., & Friedman, E. (2000). Reputation systems. Communications of the ACM, 43(12).
Resnick, P., Zeckhauser, R., Swanson, J., & Lockwood, K. (2006). The value of reputation on eBay: a controlled experiment. Experimental Economics, 9(2).
Richardson, M., & Domingos, P. (2002). Mining knowledge-sharing sites for viral marketing. In Proceedings of ACM internation conference on knowledge discovery and data mining.
Ruohomaa, S., Kutvonen, L., & Koutrouli, E. (2007). Reputation management survey. In Proceedings of IEEE international conference on availability, reliability and security (ARES).
Srinivasan, V., Nuggehalli, P., Chiasserini, C., & Rao, R. (2003). Cooperation in wireless ad hoc networks. In Proceedings of IEEE INFOCOM.
Srivatsa, M., Xiong, L., & Liu, L. (2005). Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In Proceedings of world wide web (WWW) conference.
Stoica, I., Morris, R., Karger, D., Kaashoek, M. F., & Balakrishnan, H. (2001). Chord: a scalable peer-to-peer lookup service for internet applications. In Proceedings of ACM SIGCOMM.
Swamynathan, G., Zhao, B., & Almeroth, K. (2006). Exploring the feasibility of proactive reputations. In Proceedings of international workshop on peer-to-peer systems (IPTPS).
Swamynathan, G., Zhao, B., & Almeroth, K. (2007). Exploring the feasibility of proactive reputations. Concurrency and Computation: Practice and Experience, Special Issue on Recent Advances in P2P Systems and Security, 20(2).
Swamynathan, G., Zhao, B., Almeroth, K., & Zheng, H. (2007). Globally decoupled reputations for large distributed networks. Advances in Multimedia, 2007(1).
Swamynathan, G., Zhao, B., Almeroth, K., & Jammalamadaka, S. R. (2008). Towards reliable reputations for dynamic networked systems. In Proceedings of IEEE international symposium on reliable distributed systems (SRDS).
Symantec (2000). Vbs.Gnutella worm. http://securityresponse.symantec.com/avcenter/venc/data/vbs.gnutella.html.
Walsh, K., & Sirer, E. G. (2006). Experience with an object reputation system for peer-to-peer filesharing. In Proceedings of Usenix networked systems design and implementation (NSDI).
Xiong, L., & Liu, L. (2004). Peertrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering (TKDE), 16(7).
Yang, M., Chen, H., Zhao, B. Y., Dai, Y., & Zhang, Z. (2004). Deployment of a large-scale peer-to-peer social network. In Proceedings of Usenix workshop on real, large distributed systems (WORLDS).
Yu, H., Kaminsky, M., Gibbons, P. B., & Flaxman, A. (2006). Sybilguard: defending against Sybil attacks via social networks. In Proceedings of ACM SIGCOMM.
Yu, H., Gibbons, P. B., Kaminsky, M., & Xiao, F. (2008). Sybillimit: a near-optimal social network defense against Sybil attacks. In IEEE symposium on security and privacy.
Zacharia, G., Moukas, A., & Maes, P. (2000). Collaborative reputation mechanisms for electronic marketplaces. Decision Support Systems, 29(4).
Zhang, H., Goel, A., Govindan, R., Mason, K., & Roy, B. V. (2004). Making eigenvector-based reputation systems robust to collusion. In Proceedings of the international workshop on algorithms and models for the web-grap (WAW).
Zhao, B. Y., Huang, L., Rhea, S. C., Stribling, J., Joseph, A. D., & Kubiatowicz, J. D. (2004). Tapestry: a global-scale overlay for rapid service deployment. IEEE Journal on Selected Areas in Communications, 22(1).
Zhong, S., Chen, J., & Yang, Y. R. (2003). Sprite: a simple, cheat-proof, credit-based system for mobile ad-hoc networks. In Proceedings of IEEE INFOCOM.
Zhou, R., & Hwang, K. (2007). Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems (TPDS), 18(4).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
Open Access This is an open access article distributed under the terms of the Creative Commons Attribution Noncommercial License (https://creativecommons.org/licenses/by-nc/2.0), which permits any noncommercial use, distribution, and reproduction in any medium, provided the original author(s) and source are credited.
About this article
Cite this article
Swamynathan, G., Almeroth, K.C. & Zhao, B.Y. The design of a reliable reputation system. Electron Commer Res 10, 239–270 (2010). https://doi.org/10.1007/s10660-010-9064-y
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10660-010-9064-y