Skip to main content

A Survey of Security Issues in Trust and Reputation Systems for E-Commerce

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 6906))

Abstract

Trust and reputation systems are always subject to attacks if an adversary can gain a benefit in doing so. The list of different attacks against them is extensive. Attacks like bad mouthing, newcomer, sybil, collusion and many more are subject to current research. Some of them present methods that allow to detect adversarial behaviour, hence providing protection against attacks. However, smart adversaries will adapt their behaviour strategies to the existing protection mechanisms and bypass some of the security methods.

In this paper, we discuss the options available to adversaries for achieving their goal: Gaining a benefit. For this, we analyse the well-known attacks and propose security methods which provide resistance or immunity against them at any time, hence independently from the cleverness or strategy of adversaries. Our second focus is to elaborate on the problem of reliably identifying an adversary amongst transacting participants and its influence on possible security methods.

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Anderson, S., Friedman, D., Milam, G., Singh, N.: Seller strategies on ebay. In: Industrial Organization 0412004, EconWPA (December 2004)

    Google Scholar 

  2. Brown, J., Morgan, J.: Reputation in online markets: Some negative feedback (February 2006)

    Google Scholar 

  3. Buchegger, S., Le Boudec, J-Y.: A robust reputation system for mobile ad-hoc networks. Technical report, Proceedings of P2PEcon (2003)

    Google Scholar 

  4. Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: EC 2000: Proceedings of the 2nd ACM Conference on Electronic Commerce, pp. 150–157. ACM, New York (2000)

    Google Scholar 

  5. Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251–260. Springer, Heidelberg (2002)

    Chapter  Google Scholar 

  6. Jøsang, A., Ismail, R.: The beta reputation system. In: Proceedings of the 15th Bled Electronic Commerce Conference (2002)

    Google Scholar 

  7. Kerr, R.C.: Toward Secure Trust and Reputation Systems for Electronic Marketplaces. PhD thesis, University of Waterloo, Diploma Thesis (2007)

    Google Scholar 

  8. Kotha, S., Rajgopal, S., Rindova, V.: Reputation building and performance: An empirical analysis of the top-50 pure internet firms. European Management Journal 19(6), 571–586 (2001)

    Article  Google Scholar 

  9. Melnik, M.I., Alm, J.: Does a seller’s ecommerce reputation matter? evidence from ebay auctions. Journal of Industrial Economics 50(3), 337–349 (2002)

    Article  Google Scholar 

  10. Ries, S.: Extending bayesian trust models regarding context-dependence and user friendly representation. In: SAC 2009: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 1294–1301. ACM, New York (2009)

    Chapter  Google Scholar 

  11. Spitz, S., Tüchelmann, Y.: A trust model considering the aspects of time. In: The 2nd International Conference on Computer and Electrical Engineering (2009); ISBN: 978-1-4244-5365-8

    Google Scholar 

  12. Sun, Y.L., Han, Z., Yu, W., Ray Liu, K.J.: A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In: IEEE INFOCOM, pp. 230–236 (2006)

    Google Scholar 

  13. Wang, Y., Vassileva, J.: Bayesian network-based trust model. In: WI 2003: Proceedings of the 2003 IEEE/WIC International Conference on Web Intelligence, p. 372. IEEE Computer Society, Washington, DC, USA (2003)

    Google Scholar 

  14. Whitby, A., Jøsang, A., Indulska, J.: Filtering out unfair ratings in bayesian reputation systems (2004)

    Google Scholar 

  15. Yang, Y., Sun, Y.L., Kay, S., Yang, Q.: Defending online reputation systems against collaborative unfair raters through signal modeling and trust. In: SAC 2009: Proceedings of the 2009 ACM Symposium on Applied Computing, pp. 1308–1315. ACM, New York (2009)

    Chapter  Google Scholar 

  16. Fees for selling on ebay. Ebay Homepage (2011)

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2011 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Spitz, S., Tüchelmann, Y. (2011). A Survey of Security Issues in Trust and Reputation Systems for E-Commerce. In: Calero, J.M.A., Yang, L.T., Mármol, F.G., García Villalba, L.J., Li, A.X., Wang, Y. (eds) Autonomic and Trusted Computing. ATC 2011. Lecture Notes in Computer Science, vol 6906. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-23496-5_15

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-23496-5_15

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-23495-8

  • Online ISBN: 978-3-642-23496-5

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics