skip to main content
10.1145/2046556.2046561acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

On the limits of privacy in reputation systems

Published:17 October 2011Publication History

ABSTRACT

This paper describes a formal model for multiple privacy notions that apply to reputation systems and shows that, for certain classes of systems, very strong privacy notions are unachievable. In particular, it is shown that, systems where a user's reputation depends exclusively on the ratings he received, necessarily leak information about the relationship between ratings and reputations. In contrast, systems where a user's reputation depends both on the received ratings, and on the ratings received by others, potentially hide all information about this relationship. The paper concludes with guidelines for the construction of reputation systems that have the potential to retain high levels of privacy.

References

  1. Resnick, P., Kuwabara, K., Zeckhauser, R., Friedman, E.: Reputation systems. Communications of the ACM 43(12) (2000) 45--48 Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. Artz, D., Gil, Y.: A survey of trust in computer science and the semantic web. Web Semantics: Science, Services and Agents on the World Wide Web 5(2) (2007) 58 -- 71 Software Engineering and the Semantic Web. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. Dellarocas, C.: The digitization of word-of-mouth: Promise and challenges of online feedback mechanisms. Management Science (October 2003) 1407--1424 Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. Bygrave, L.: Data Protection Law, Approaching Its Rationale, Logic and Limits. Kluwer Law International, The Hague, London, New York (2002) Google ScholarGoogle ScholarDigital LibraryDigital Library
  5. Dellarocas, C.: Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: EC '00: Proceedings of the 2nd ACM conference on Electronic commerce, New York, NY, USA, ACM Press (2000) 150--157 Google ScholarGoogle ScholarDigital LibraryDigital Library
  6. Voss, M.: Privacy preserving online reputation systems. In: International Information Security Workshops, Kluwer (2004) 245--260Google ScholarGoogle Scholar
  7. Jøsang, A., Ismail, R., Boyd, C.: A survey of trust and reputation systems for online service provision. Decision Support Systems 43(2) (2007) 618 -- 644 Emerging Issues in Collaborative Commerce. Google ScholarGoogle ScholarDigital LibraryDigital Library
  8. Mui, L.: Computational Models of Trust and Reputation: Agents, Evolutionary Games, and Social Networks. PhD Thesis, Massachusetts Institute of Technology (2003)Google ScholarGoogle Scholar
  9. Androulaki, E., Choi, S.G., Bellovin, S.M., Malkin, T.: Reputation systems for anonymous networks. In: PETS '08: Proceedings of the 8th international symposium on Privacy Enhancing Technologies, Berlin, Heidelberg, Springer-Verlag (2008) 202--218 Google ScholarGoogle ScholarDigital LibraryDigital Library
  10. Voss, M., Heinemann, A., Mühlhauser, M.: A Privacy Preserving Reputation System for Mobile Information Dissemination Networks. In: First International Conference on Security and Privacy for Emerging Areas in Communications Networks (SECURECOMM'05), IEEE (2005) 171--181 Google ScholarGoogle ScholarDigital LibraryDigital Library
  11. Schiffner, S., Clauß, S., Steinbrecher, S.: Privacy and liveliness for reputation systems. In: Proceedings of 2009 European PKI Workshop (EuroPKI'09), Springer (2010) (to appear). Google ScholarGoogle ScholarDigital LibraryDigital Library
  12. ENISA: Position paper. reputation-based systems: a security analysis. available from http://www.enisa.europa.eu/doc/pdf/deliverables/enisa_pp_reputation_bas%ed_system.pdf (last visit 16/06/09) (2007)Google ScholarGoogle Scholar
  13. Steinbrecher, S.: Enhancing multilateral security in and by reputation systems. In: Proceedings of the IFIP/FIDIS Internet Security and Privacy Summer School, Masaryk University Brno, 1-7 September 2008. Volume 298 of IFIP AICT., Springer (2009) 135--150Google ScholarGoogle Scholar
  14. Pavlov, E., Rosenschein, J.S., Topol, Z.: Supporting privacy in decentralized additive reputation systems. In: The Second International Conference on Trust Management, Oxford, United Kingdom (March 2004) 108--119Google ScholarGoogle ScholarCross RefCross Ref
  15. Dellarocas, C.: Research note -- how often should reputation mechanisms update a trader's reputation profile? Information Systems Research 17(3) (2006) 271--285 Google ScholarGoogle ScholarDigital LibraryDigital Library
  16. Steinbrecher, S.: Design options for privacy-respecting reputation systems within centralised internet communities. In: Proceedings of IFIP Sec 2006, 21st IFIP International Information Security Conference: Security and Privacy in Dynamic Environments. Volume 201 of IFIP., Springer (May 2006) 123--134Google ScholarGoogle ScholarCross RefCross Ref
  17. Schiffner, S., Clauß, S., Steinbrecher, S.: Fairness and Information-theoretic Privacy for Reputation. In Hromkovic, J., Královic, R., eds.: SOFSEM 2011: 37th Conference on Current Trends in Theory and Practice of Informatics. Volume 6543 of Lecture Notes in Computer Science., Nový Smokovec,SK, Springer-Verlag (2011) 16Google ScholarGoogle Scholar
  18. Kerschbaum, F.: A verifiable, centralized, coercion-free reputation system. In: Proceedings of the 8th ACM workshop on Privacy in the electronic society. WPES '09, New York, NY, USA, ACM (2009) 61--70 Google ScholarGoogle ScholarDigital LibraryDigital Library
  19. Hevia, A., Micciancio, D.: An indistinguishability-based characterization of anonymous channels. In Borisov, N., Goldberg, I., eds.: Privacy Enhancing Technologies. Volume 5134 of Lecture Notes in Computer Science., Springer Berlin / Heidelberg (2008) 24--43 10.1007/978-3-540-70630-4 3. Google ScholarGoogle ScholarDigital LibraryDigital Library
  20. Bohli, J.M., Pashalidis, A. In: Relations Among Privacy Notions. Springer-Verlag, Berlin, Heidelberg (2009) 362--380 Google ScholarGoogle ScholarDigital LibraryDigital Library
  21. Cover, T.M., Thomas, J.A.: Elements of Information Theory. John Wiley & Sons Inc., Hoboken (2005)Google ScholarGoogle Scholar
  22. Dwork, C.: Differential privacy. In Bugliesi, M., Preneel, B., Sassone, V., Wegener, I., eds.: Automata, Languages and Programming. Volume 4052 of Lecture Notes in Computer Science., Springer Berlin / Heidelberg (2006) 1--12 Google ScholarGoogle ScholarDigital LibraryDigital Library
  23. Hermans, J., Pashalidis, A., Vercauteren, F., Preneel, B.: A New RFID Privacy Model. In: 2011st European Symposium on Research in Computer Security (ESORICS 2011). Lecture Notes in Computer Science, Leuven,BE, Springer-Verlag (2011) 20 Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. On the limits of privacy in reputation systems

    Recommendations

    Comments

    Login options

    Check if you have access through your login credentials or your institution to get full access on this article.

    Sign in
    • Published in

      cover image ACM Conferences
      WPES '11: Proceedings of the 10th annual ACM workshop on Privacy in the electronic society
      October 2011
      192 pages
      ISBN:9781450310024
      DOI:10.1145/2046556

      Copyright © 2011 ACM

      Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

      Publisher

      Association for Computing Machinery

      New York, NY, United States

      Publication History

      • Published: 17 October 2011

      Permissions

      Request permissions about this article.

      Request Permissions

      Check for updates

      Qualifiers

      • research-article

      Acceptance Rates

      Overall Acceptance Rate106of355submissions,30%

      Upcoming Conference

      CCS '24
      ACM SIGSAC Conference on Computer and Communications Security
      October 14 - 18, 2024
      Salt Lake City , UT , USA

    PDF Format

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader