skip to main content
10.1145/1654988.1654998acmconferencesArticle/Chapter ViewAbstractPublication PagesccsConference Proceedingsconference-collections
research-article

Security challenges for reputation mechanisms using online social networks

Published: 09 November 2009 Publication History

Abstract

Reputation mechanisms are a key component of e-commerce, particularly for peer-to-peer transactions. The ratings provided by previous users can help people identify others who are likely to be reliable and encourage honest behavior among participants. However, the anonymity and ease of creating new online identities can potentially allow users to subvert the mechanism. Online social networks offer one way to address this concern by embedding participants in a network of links, allowing users to personalize recommendations via people they trust. However, using these networks raises additional concerns for network integrity and users' privacy.

References

[1]
L. A. Adamic and E. Adar. Friends and neighbors on the web. Social Networks, 25(3), 2003.
[2]
G. E. Bolton, E. Katok, and A. Ockenfels. How effective are online reputation mechanisms? Management Science, 50:1587--1602, 2002.
[3]
M. J. Brzozowski, T. Hogg, and G. Szabo. Friends and foes: Ideological social networking. In Proc. of the SIGCHI Conference on Human Factors in Computing (CHI2008), pages 817--820, NY, 2008. ACM Press.
[4]
K. Chatterjee, L. de Alfraro, and I. Pye. Robust content-driven reputation. In D. Balfanz and J. Staddon, editors, Proc. of the First ACM Workshop on Security and Artificial Intelligence (AISec08), pages 33--42, NY, 2008. ACM.
[5]
K.-Y. Chen, S. Golder, T. Hogg, and C. Zenteno. How do people respond to reputation: Ostracize, price discriminate or punish? In V. Padmanabhan and F. E. Bustamante, editors, Proc. of the 2nd Intl. Workshop on Hot Topics in Web Systems and Technologies, pages 31--36. IEEE, 2008.
[6]
K.-Y. Chen and T. Hogg. Experimental evaluation of an eBay-style self-reporting reputation mechanism. In X. Deng and Y. Ye, editors, Proc. of the Workshop on Internet and Network Economics (WINE2005), pages 434--443. Springer, 2005.
[7]
D. V. Dejong, R. Forsythe, and R. J. Lundholm. Ripoffs, lemons and reputation formation in agency relationships: A laboratory market study. J. of Finance, XL:809--820, 1985.
[8]
C. Dellarocas. The digitization of word-of-mouth: Promise and challenges of online reputation systems. Management Science, 49(10):1407--1424, 2003.
[9]
J. Duarte, S. Siegel, and L. A. Young. Trust and credit. Working Paper ssrn.com/abstract=1343275, SSRN, Feb. 2009.
[10]
F. Fukuyama. Trust: The Social Virtues and the Creation of Prosperity. Free Press, 1996.
[11]
A. Ghose, P. G. Ipeirotis, and A. Sundararajan. Reputation premiums in electronic peer-to-peer markets: analyzing textual feedback and network structure. In Proceedings of the 2005 ACM SIGCOMM workshop on Economics of peer-to-peer systems, pages 150--154, NY, 2005. ACM.
[12]
O. Goldreich. Secure multi-party computation. working draft version 1.1, 1998. Available at philby.ucsd.edu/cryptolib/books.html.
[13]
X. Guardiola et al. Macro- and micro-structure of trust networks. arxiv.org preprint cond-mat/0206240, June 2002.
[14]
R. Guha, R. Kumar, P. Raghavan, and A. Tomkins. Propagation of trust and distrust. In Proc. of the 13th Intl. World Wide Web Conf. (WWW2004), pages 403--412, New York, 2004. ACM.
[15]
M. R. Henzinger, R. Motwani, and C. Silverstein. Challenges in web search engines. ACM SIGIR Forum, 36:11--22, 2002.
[16]
T. Hogg and L. Adamic. Enhancing reputation mechanisms via online social networks. In Proc. of the 5th ACM Conference on Electronic Commerce (EC'04), pages 236--237. ACM Press, 2004.
[17]
T. Hogg and B. A. Huberman. Using sensor networks to uncover social network structure. In G. Sukhatme et al., editors, Proc. of AAAI-04 Sensor Networks Workshop, pages 63--64, 2004.
[18]
B. A. Huberman, M. Franklin, and T. Hogg. Enhancing privacy and trust in electronic communities. In Proc. of the ACM Conference on Electronic Commerce (EC99), pages 78--86, NY, 1999. ACM Press.
[19]
C. Keser. Experimental games for the design of reputation management systems. IBM Systems Journal, 42(3):498--506, 2003.
[20]
D. B. Klein, editor. Reputation: Studies in the Voluntary Elicitation of Good Conduct. Univ. of Michigan Press, Ann Arbor, 1997.
[21]
R. Milo, S. Shen-Orr, S. Itzkovitz, N. Kashtan, D. Chklovskii, andU. Alon. Network Motifs: Simple Building Blocks of Complex Networks. Science, 298(5594):824--827, 2002.
[22]
M. Naor, B. Pinkas, and R. Sumner. Privacy perserving auctions and mechanism design. In Proc. of the ACM Conference on Electronic Commerce (EC99), pages 129--139, NY, 1999. ACM Press.
[23]
A. Narayanan and V. Shmatikov. De-anonymizing social networks. In Proc. of the 30th IEEE Symposium on Security and Privacy, 2009.
[24]
M. E. J. Newman. The structure and function of complex networks. SIAM Review, 45(2):167--256, 2003.
[25]
L. Page, S. Brin, R. Motwani, and T. Winograd. The pagerank citation ranking: Bringing order to the web. Technical report, Stanford Digital Library Technologies Project, 1998.
[26]
A. S. Pentland. Automatic mapping and modeling of human networks. Physica A, 378:59--67, 2007.
[27]
A. S. Pentland. Honest Signals: How They Shape Our World. Bradford Books, 2008.
[28]
J. M. Pujol, R. Sanguesa, and J. Delgado. Extracting reputation in multiagent systems by means of social network topology. In AAMAS, 2002.
[29]
P. Resnick, K. Kuwabara, R. Zeckhauser, and E. Friedman. Reputation systems. Communications of the ACM, 43:45--48, 2000.
[30]
P. Resnick, R. Zechhauser, J. Swanson, and K. Lockwood. The value of reputation on eBay: A controlled experiment. Experimental Economics, 9:79--101, 2006.
[31]
J. Sabater and C. Sierra. Social regret, a reputation model based on social relations. SIGecom Exch., 3(1):44--56, 2002.
[32]
G. Swamynathan et al. Do social networks improve e--commerce?: A study on social marketplaces. In Proceedings of the First Workshop on Online Social Networks, pages 1--6, New York, 2008. ACM.
[33]
S. Tadelis. The market for reputations as an incentive mechanism. SIEPR Policy Paper 01-001, Stanford, 2001.
[34]
J.-C. Wang and C.-C. Chiu. Recommending trusted online auction sellers using social network analysis. Expert Systems with Applications, 34:1666--1679, 2008.
[35]
S. Wasserman and K. Faust. Social network analysis. Cambridge University Press, Cambridge, 1994.
[36]
B. Yu and M. P. Singh. A social mechanism of reputation management in electronic communities. In Cooperative Information Agents, pages 154--165, 2000.
[37]
H. Yu et al. SybilGuard: defending against sybil attacks via social networks. IEEE/ACM Transactions on Networking, 16:576--589, 2008.
[38]
G. Zacharia, A. Moukas, and P. Maes. Collaborative reputation mechanisms in electronic marketplaces. In Proc. of the 32nd Hawaii Intl. Conf. on System Sciences (HICSS), 1999.

Cited By

View all
  • (2020)Establishing Trustworthy Relationships in Multiparty Industrial Internet of Things ApplicationsDigital Forensic Investigation of Internet of Things (IoT) Devices10.1007/978-3-030-60425-7_9(205-221)Online publication date: 10-Dec-2020
  • (2012)Optimal State Management of Data Sharing in Online Social Network (OSN) ServicesProceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2012.216(648-655)Online publication date: 25-Jun-2012
  • (2012)Trust management framework for social networks2012 IEEE International Conference on Communications (ICC)10.1109/ICC.2012.6364031(1042-1047)Online publication date: Jun-2012
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
AISec '09: Proceedings of the 2nd ACM workshop on Security and artificial intelligence
November 2009
72 pages
ISBN:9781605587813
DOI:10.1145/1654988
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 09 November 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. reputation
  2. social networks
  3. user-generated content

Qualifiers

  • Research-article

Conference

CCS '09
Sponsor:

Acceptance Rates

Overall Acceptance Rate 94 of 231 submissions, 41%

Upcoming Conference

CCS '25

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 14 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2020)Establishing Trustworthy Relationships in Multiparty Industrial Internet of Things ApplicationsDigital Forensic Investigation of Internet of Things (IoT) Devices10.1007/978-3-030-60425-7_9(205-221)Online publication date: 10-Dec-2020
  • (2012)Optimal State Management of Data Sharing in Online Social Network (OSN) ServicesProceedings of the 2012 IEEE 11th International Conference on Trust, Security and Privacy in Computing and Communications10.1109/TrustCom.2012.216(648-655)Online publication date: 25-Jun-2012
  • (2012)Trust management framework for social networks2012 IEEE International Conference on Communications (ICC)10.1109/ICC.2012.6364031(1042-1047)Online publication date: Jun-2012
  • (2011)Social networking for anonymous communication systems: A survey2011 International Conference on Computational Aspects of Social Networks (CASoN)10.1109/CASON.2011.6085953(249-254)Online publication date: Oct-2011

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media