Journal of Shanghai Jiaotong University ›› 2014, Vol. 48 ›› Issue (07): 899-906.

• Automation Technique, Computer Technology • Previous Articles     Next Articles

A Trust Model for Identifying and Tracing Malicious Anonymous Feedback Providers

ZHANG Keli1,LI Zhongxian1,2,YANG Yixian1
  

  1. (1.Information Security Center, Beijing University of Posts and Telecommunications, Beijing 1000876, China; 2. National Cybernet Security Co. Ltd., Beijing 100088, China)
  • Received:2013-10-09 Online:2014-07-28 Published:2014-07-28

Abstract:

In reputation systems, the anonymous evaluation mechanisms introduced for preserving privacy of honest feedback providers brings about the difficulty in identifying slandering, ballot stuffing and Sybil attacks. A trust model which protects honest feedback providers and identifies and traces the malicious peer was proposed in this paper to deal with this problem. Peers in this trust model use a verifiable random function to generate tags, so as to anonymously evaluate the transaction objects and hide the true identity of the transaction process. In this model, the Bayesian filtering algorithm was introduced to identify malicious tags; when the tags exceed the threshold malicious number, the trust model can automatically expose true identities and track all of the providing feedbacks based on the verifiable secret sharing mechanism. The simulation results show that the proposed trust model can efficiently resist attacks of anonymous malicious peers and evidently improve the accuracy of trust accumulated value compared with two existing trust models.
 

Key words: reputation system, network security, privacy; , trust model, anonymity; , Sybil attack

CLC Number: