skip to main content
10.1145/1529282.1529575acmconferencesArticle/Chapter ViewAbstractPublication PagessacConference Proceedingsconference-collections
research-article

Defending online reputation systems against collaborative unfair raters through signal modeling and trust

Published: 08 March 2009 Publication History

Abstract

Online feedback-based rating systems are gaining popularity. Dealing with collaborative unfair ratings in such systems has been recognized as an important but difficult problem. This problem is challenging especially when the number of honest ratings is relatively small and unfair ratings can contribute to a significant portion of the overall ratings. In addition, the lack of unfair rating data from real human users is another obstacle toward realistic evaluation of defense mechanisms. In this paper, we propose a set of methods that jointly detect smart and collaborative unfair ratings based on signal modeling. Based on the detection, a framework of trust-assisted rating aggregation system is developed. Furthermore, we design and launch a Rating Challenge to collect unfair rating data from real human users. The proposed system is evaluated through simulations as well as experiments using real attack data. Compared with existing schemes, the proposed system can significantly reduce the impact from collaborative unfair ratings.

References

[1]
C. Dellarocas, "The digitization of word-of-mouth: Promise and challenges of online reputation systems," Management Science, vol. 49, no. 10, pp. 1407--1424, October 2003.
[2]
A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decis. Support Syst., vol. 43, no. 2, pp. 618--644, 2007.
[3]
J. Livingston, "How valuable is a good reputation? a sample selection model of internet auctions," The Review of Electronics and Statistics, vol. 87, no. 3, pp. 453--465, August 2005.
[4]
P. Resnick, R. Zeckhauser, J. Swanson, and K. Lockwood, "The value of reputation on ebay: A controlled experiment," Experimental Economics, vol. 9, no. 2, pp. 79--101, June 2006.
[5]
comScore.com, "Press release: Online consumer-generated reviews have significant impact on offline purchase behavior," http://www.comscore.com/press/release.asp?press=1928, November 2007.
[6]
J. Meattle, "Digg overtakes facebook; both cross 20 million u.s. unique visitors," compete.com, 2007.
[7]
C. Dellarocas, "Strategic manipulation of internet opinion forums: Implications for consumers and firms," Management Science, October 2006.
[8]
A. Harmon, "Amazon glitch unmasks war of reviewers," The New York Times, February 14 2004.
[9]
M. Hines, "Scammers gaming youtube ratings for profit," InfoWorld, http://www.infoworld.com/article/07/05/16/cybercrooks_gaming google_1.html, May 2007.
[10]
J. Brown and J. Morgan, "Reputation in online auctions: The market for trust," California Management Review, vol. 49, no. 1, pp. 61--81, 2006.
[11]
University of Rhode Island, "Etan rating challenge," www.etanlab.com/rating.
[12]
C. Dellarocas, "Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior," in Proceedings of the 2nd ACM conference on Electronic commerce, 2000.
[13]
M. Chen and J. Singh, "Computing and using reputations for internet ratings," in Proceedings of the 3rd ACM conference on Electronic Commerce, 2001.
[14]
A. Whitby, A. Jøang, and J. Indulska, "Filtering out unfair ratings in Bayesian reputation systems," in Proc. 7th Int. Workshop on Trust in Agent Societies, 2004.
[15]
J. Weng, C. Miao, and A. Goh, "An entropy-based approach to protecting rating systems from unfair testimonies," IEICE TRANSACTIONS on Information and Systems, vol. E89-D, no. 9, pp. 2502--2511, September 2006.
[16]
A. Jøsang, R. Ismail, and C. Boyd, "A survey of trust and reputation systems for online service provision," Decision Support Systems, vol. 43, no. 2, pp. 618--644, 2005.
[17]
R. Zhou and K. Hwang, "Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing," IEEE Transactions on Parallel and Distributed Systems, vol. 18, no. 5, May 2007.
[18]
S. Ganeriwal and M. Srivastava, "Reputation-based framework for high integrity sensor networks," in Proceedings of ACM Security for Ad-hoc and Sensor Networks (SASN), Washington, D.C., USA, Oct. 2004.
[19]
L. Xiong and L. Liu, "Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities," IEEE Transactions on Knowledge and Data Engineering, vol. 16, no. 7, pp. 843--857, July 2004.
[20]
K. Fujimura and T. Nishihara, "Reputation rating system based on past behavior of evaluators," in Proceedings of the 4th ACM conference on Electronic commerce, 2003.
[21]
A. Jsang and R. Ismail, "The beta reputation system," in Proceedings of the 15th Bled Electronic Commerce Conference, June 2002.
[22]
Y. Sun, Z. Han, W. Yu, and K. J. Ray Liu, "A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks," in Proceeding of the 27th Conference on Computer Communications (INFOCOM'06), Barcelona, Spain, April 2006.
[23]
S. Buchegger and J-Y Le Boudec, "The effect of rumor spreading in reputation systems in mobile ad-hoc networks," in Proceedings of Wiopt'03, 2003.
[24]
S. Kay, Fundamentals of Statistical Signal Processing, Volume 2: Detection Theory, Prentice Hall, 1998.
[25]
M. Hayes, Statistical Digital Signal Processing and Modeling, John Wiley and Sons, 1996.
[26]
Y. Yang, Y. Sun, J. Ren, and Q. Yang, "Building trust in online rating systems through signal modeling," in Proceedings of IEEE ICDCS Workshop on Trust and Reputation Management, 2007.

Cited By

View all
  • (2024)A reputation-based trust evaluation model in group decision-making frameworkInformation Fusion10.1016/j.inffus.2023.102082103(102082)Online publication date: Mar-2024
  • (2023)USDSE: A Novel Method to Improve Service Reputation Based on Double-Side EvaluationMachine Learning for Cyber Security10.1007/978-3-031-20102-8_37(484-498)Online publication date: 13-Jan-2023
  • (2020)Provably Robust Decisions based on Potentially Malicious Sources of Information2020 IEEE 33rd Computer Security Foundations Symposium (CSF)10.1109/CSF49147.2020.00036(411-424)Online publication date: Jun-2020
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
SAC '09: Proceedings of the 2009 ACM symposium on Applied Computing
March 2009
2347 pages
ISBN:9781605581668
DOI:10.1145/1529282
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 08 March 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. detection
  2. rating
  3. reputation systems
  4. trust

Qualifiers

  • Research-article

Conference

SAC09
Sponsor:
SAC09: The 2009 ACM Symposium on Applied Computing
March 8, 2009 - March 12, 2008
Hawaii, Honolulu

Acceptance Rates

Overall Acceptance Rate 1,650 of 6,669 submissions, 25%

Upcoming Conference

SAC '25
The 40th ACM/SIGAPP Symposium on Applied Computing
March 31 - April 4, 2025
Catania , Italy

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)0
Reflects downloads up to 05 Mar 2025

Other Metrics

Citations

Cited By

View all
  • (2024)A reputation-based trust evaluation model in group decision-making frameworkInformation Fusion10.1016/j.inffus.2023.102082103(102082)Online publication date: Mar-2024
  • (2023)USDSE: A Novel Method to Improve Service Reputation Based on Double-Side EvaluationMachine Learning for Cyber Security10.1007/978-3-031-20102-8_37(484-498)Online publication date: 13-Jan-2023
  • (2020)Provably Robust Decisions based on Potentially Malicious Sources of Information2020 IEEE 33rd Computer Security Foundations Symposium (CSF)10.1109/CSF49147.2020.00036(411-424)Online publication date: Jun-2020
  • (2020)Security Attacks and Defenses in Distributed Sensor NetworksInformation Fusion in Distributed Sensor Networks with Byzantines10.1007/978-981-32-9001-3_3(29-43)Online publication date: 15-Jul-2020
  • (2017)Social Norm Incentives for Network Coding in ManetsIEEE/ACM Transactions on Networking10.1109/TNET.2017.265605925:3(1761-1774)Online publication date: 1-Jun-2017
  • (2017)Approach to detect non-adversarial overlapping collusion in crowdsourcing2017 IEEE 36th International Performance Computing and Communications Conference (IPCCC)10.1109/PCCC.2017.8280462(1-8)Online publication date: Dec-2017
  • (2016)Detecting Malicious Behavior and Collusion for Online Rating System2016 IEEE Trustcom/BigDataSE/ISPA10.1109/TrustCom.2016.0174(1046-1053)Online publication date: Aug-2016
  • (2016)Enhancing Collusion Resilience in Reputation SystemsIEEE Transactions on Parallel and Distributed Systems10.1109/TPDS.2015.248919827:8(2274-2287)Online publication date: 1-Aug-2016
  • (2016)A Numerical Approach for Assigning a Reputation to Users of an IoT FrameworkProcedia Computer Science10.1016/j.procs.2016.09.07398:C(455-460)Online publication date: 1-Oct-2016
  • (2016)The institution as a blunt instrument: Cooperation through imperfect observabilityJournal of Theoretical Biology10.1016/j.jtbi.2016.02.013396(182-190)Online publication date: May-2016
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media