4th International ICST Conference on Security and Privacy in Communication Networks

Research Article

Sybil Proof Anonymous Reputation Management

  • @INPROCEEDINGS{10.1145/1460877.1460887,
        author={Wolf M\'{y}ller and Henryk Pl\o{}tz and Jens-Peter Redlich and Takashi Shiraki},
        title={Sybil Proof Anonymous Reputation Management},
        proceedings={4th International ICST Conference on Security and Privacy in Communication Networks},
        publisher={ACM},
        proceedings_a={SECURECOMM},
        year={2008},
        month={9},
        keywords={Privacy Anonymity Reputation Management},
        doi={10.1145/1460877.1460887}
    }
    
  • Wolf Müller
    Henryk Plötz
    Jens-Peter Redlich
    Takashi Shiraki
    Year: 2008
    Sybil Proof Anonymous Reputation Management
    SECURECOMM
    ACM
    DOI: 10.1145/1460877.1460887
Wolf Müller1,*, Henryk Plötz2,*, Jens-Peter Redlich2,*, Takashi Shiraki3,*
  • 1: Humboldt Universität zu Berlin 10099 Berlin, Germany
  • 2: Humboldt-Universität zu Berlin 10099 Berlin, Germany
  • 3: NEC Corporation Tokyo 108-8557, Japan
*Contact email: Wolf.Mueller@informatik.hu-berlin.de, ploetz@informatik.huberlin._de, jpr@informatik.huberlin._de, t-shiraki@bu.jp.nec.com

Abstract

Many new Internet applications base on openness to externally contributed content. The numerous user contributions offer both opportunities and threats. A priori, the quality of those user-generated contributions is unknown. The customers have to decide which offer they want to make use of. Reputation systems can help to optimize the user’s return-of-investment. Privacy with respect to user provided reputation information is important for the acceptance. This work presents an architecture for Anonymous Reputation Management (ARM), which is explained for the example of File Sharing (ARM4FS). We propose an anonymization layer separating private data needed for the reputation system from the publicly accessible reputation information, which is a very general concept. Anonymous reputation management (ARM) can be plugged on top of many reputation systems in order to preserve the users’ privacy for many scenarios. Our implementation of ARM4FS uses the EigenTrust algorithm [17]. Furthermore, we present a technique for Anonymous Attestation of Unique Service Subscription (AAUSS) in order to prevent Sybil attacks by enforcing that each user has at most only one account without compromising the users’ anonymity.