Research Article
Sybil Proof Anonymous Reputation Management
@INPROCEEDINGS{10.1145/1460877.1460887, author={Wolf M\'{y}ller and Henryk Pl\o{}tz and Jens-Peter Redlich and Takashi Shiraki}, title={Sybil Proof Anonymous Reputation Management}, proceedings={4th International ICST Conference on Security and Privacy in Communication Networks}, publisher={ACM}, proceedings_a={SECURECOMM}, year={2008}, month={9}, keywords={Privacy Anonymity Reputation Management}, doi={10.1145/1460877.1460887} }
- Wolf Müller
Henryk Plötz
Jens-Peter Redlich
Takashi Shiraki
Year: 2008
Sybil Proof Anonymous Reputation Management
SECURECOMM
ACM
DOI: 10.1145/1460877.1460887
Abstract
Many new Internet applications base on openness to externally contributed content. The numerous user contributions offer both opportunities and threats. A priori, the quality of those user-generated contributions is unknown. The customers have to decide which offer they want to make use of. Reputation systems can help to optimize the user’s return-of-investment. Privacy with respect to user provided reputation information is important for the acceptance. This work presents an architecture for Anonymous Reputation Management (ARM), which is explained for the example of File Sharing (ARM4FS). We propose an anonymization layer separating private data needed for the reputation system from the publicly accessible reputation information, which is a very general concept. Anonymous reputation management (ARM) can be plugged on top of many reputation systems in order to preserve the users’ privacy for many scenarios. Our implementation of ARM4FS uses the EigenTrust algorithm [17]. Furthermore, we present a technique for Anonymous Attestation of Unique Service Subscription (AAUSS) in order to prevent Sybil attacks by enforcing that each user has at most only one account without compromising the users’ anonymity.