trust and reputation
Post on 07-Apr-2018
225 Views
Preview:
TRANSCRIPT
-
8/6/2019 Trust and Reputation
1/21
Trust & Reputation Models
Carles Figuerola, Raul Daz & Vctor Arino
May 2011
1
-
8/6/2019 Trust and Reputation
2/21
Contents
1 The importance of trust 3
1.1 Formal trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
1.2 Informal trust . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 4
2 Reputation 4
2.1 Online Reputation . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 5
3 Trust by reputation 5
4 Trust & Reputation Tools 6
4.1 Ratings . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 6
4.2 Feedback . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 74.3 Institutional . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7
4.4 Security . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5 Models 8
5.1 Number of hits . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8
5.2 PageRank . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 9
5.3 eBay . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 11
5.4 Amazon.com . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12
5.5 Paypal . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.6 Facebook, a reality approach . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 13
5.7 OpenPGP . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 14
5.8 Trust Net . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 16
5.9 Slashdot . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
6 Security, consistency and attacks 17
6.1 Sybil Attack . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 17
6.2 Bootstrap . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 18
6.3 Whirlwind effect . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
6.4 The downfall of digg . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 19
2
-
8/6/2019 Trust and Reputation
3/21
Abstract
This essay tries to explain what is trust and reputation in a computational context, particularly in social
networks scenarios. Additionally several trust and reputation models will be discussed and analyzed.
1 The importance of trust
Before starting our discourse we should ask ourselves: is there something more important than trust? Is
the interaction among humans beings remotely possible without it? We arent just talking about social life,
business or love. As Rosseau thought it, the modern society establishes a social contract by which their
members accept tacitly rules for the coexistence and try to find the compromise between the self and common
benefit. How could we live peacefully without knowing if others will respect or not this contract as much as
we will? Every indication says that we couldnt. Human being is, to a greater or lesser extent, a gregarious
mammal. Practically all his activities are developed in conjunction with the other fellows of his social group,
turning trust, then, into the only bridge to lead a normal life.
Hence we are able to say that life in society entails an inherent state of trust. More or less, we all assume
that we can trust our parents, that nobody is going to hurt us when we walk to our job or that the violation
of our rights will be punished by the law. Without this initial trust situation only the hysterical suspicion
remains, the impossibility of human relation, in short, the most absolutely ostracism.
In a hypothetical situation where we know everything about the world and people, we wouldnt need trust.
Trust begins from the necessity of dealing with uncertainty, the future complex circumstances, to fulfill our
interests. In the middle of this non guarantee position, achieving our satisfaction depends on the evaluation of
the environment. No matter if we are talking about the mutual trust between a couple of lovers to obtain an
emotional stability, or the trust we pin on a leather company when we buy a new shoes.
Anyway, trust is about bringing different interests together. This can bring a lot of problems, if we think
about social or friendship issues, for example. In economics, on the other hand, this point is easier to describe.
If a businessman wants to earn money selling a product, it needs to have a bidirectional relation of trust with
its clients. Here, the terms of trust are quite clear, because they consist mainly on the combination of material
interests: businessmen earn money and clients get a product. The first one will care about the clients ability
to pay. Clients will do the same about the quality of the product and the good correspondence between the
quality and the price, which can be contrasted with similar products from other producers, but only to a certain
extend. And again, the idea that relates the unknown and trust, position where clients need some references to
make the right choice. This references, called reputation, is defined by several factors, like historical prestige of
the brand or the opinion of other clients (friends, specialized websites,etc).
Before dealing with reputation, its necessary to distinguish two kinds of trust: formal trust and informal
trust.
3
-
8/6/2019 Trust and Reputation
4/21
1.1 Formal trust
Institutionalized mechanisms destined to guarantee mutual cooperation in trust process. There are a lot of
these mechanisms, like legislations, civil and penal law, in the way to formalize the mentioned social contract.
Another can example can be credit card systems, which protect shoppers against fraud. Contracts are a good
example as well. Parties establish conditions, rules by which the trust relation is going to be carried out.
Another case of formal trust could be marriage, document that formalizes the couple status and the promise of
financial and emotional stability (at least, that is what it is expected to be).
This trust systems have some problems. As we said, trust consist in bringing interests together and the
institutionalization sometimes makes a good compromise difficult. For instance, government legislations usually
find the solution relevant to the majority of people, but often they are unfavorable for a certain group of citizens.
Unfavorable and, above all, inflexible. And thats the point. Once the conditions are in a signed document, is
difficult to change it, whether interest and needs are going to change or not in the near future.
1.2 Informal trust
Obviously, most of the social activities cant have its own explicit contract. For this reason, there are
subjective factors almost always that configure the level of trust. Firmness of a handshake or body language
can be important signs to trust somebody or not. A presidential candidate can lose the support of voters
because a tremulous voice or an excessive perspiration, like, for example, in 1960 with the well-known television
debates between EEUU presidential candidates, Richard Nixon and John F. Kennedy.
Therefore informal trust is more variable than formal trust. It involves more risk and, obviously, lots ofdisappointments. Not in vain, as in hope, we live in trust. And the society, that precisely stigmatized distrust,
always knows to recognize trust as the engine of civilization.
2 Reputation
Reputation is a social evaluation of a group of entities toward another entity based on certain criteria. It is
an important factor in many fields, such as education, business, online communities or social status. Reputation
can be considered as a component of the identity as defined by others, i.e. reputation is then a meta-belief (a
belief about another persons belief)
A very important role of reputation is its transmission in the form of advice. This can be an educated
advice, based on facts and both historical and current events, or just gossip, which doesnt mean it isnt useful.
Gossip, although vague, may contain precious hints both to actual facts (Ive been told this physician has
shown questionable behavior) and to conflicts taking place at the information level (if a candidate for a role
spreads defamatory about another candidate, who should you trust?).
Moreover, the expression it is said that... is a reputation spreading act because it refers to a (possibly
fake) common opinion and, on the other hand, the part of it is said is self-assessing because it is at least true
just because the person saying it has just said it.
4
-
8/6/2019 Trust and Reputation
5/21
Reputation-based decisions
There are three kinds of ways reputation can affect the opinion we have about something:
Epistemic acknowledge a given reputation. This implies a believed evaluation prevails to ones direct evalu-ation. Lets imagine the friend I mostly admire has a good opinion of Mr. Berlusconi. However puzzled
I may be by this dissonance-inducing news, I may be convinced due to my friendship to accept this
evaluation and share it.
Pragmatic-Strategic use reputation to decide whether and how to interact with the target. Once I have my
own opinion (perhaps resulting from acceptance of others evaluations) about a target, I will use it to make
decisions about my future actions concerning that target. Perhaps, I may abstain from participating in
political activity against Mr. Berlusconi.
Memetic transmit my (or others) evaluative beliefs about a given target to others. Whether or not I act in
conformity with a propagating evaluation, I may decide to spread the news to others.
2.1 Online Reputation
Online reputation is a factor in any online community where trust is important. It affects a pseudonym
rather than a person. Online reputation is the perception that one has on the Internet based on their digital
footprint.
Digital footprints accumulate through all of the content shared, feedback provided and information that
created online. People aspire to have a positive online reputation. If someone has a bad online reputation, he
can easily change his pseudonym. This is why new accounts on e-commerce reputation-based webs are usually
untrusted. If a person or a company want to manage his web reputation, he will have many more difficulties.
This is why a merchant on the web having a physical shop (with real name, real address) is usually more
trusted. Building and maintaining a good reputation can be a significant motivation for contributing to online
communities.
3 Trust by reputation
During the last years, Computer Science has moved from centralised computer systems to distributed com-
puting. This evolution has several implications on the security models, the policies and the mechanisms needed
to protect users information and resources in an increasingly interconnected computing infrastructure
The multi-agent system paradigm and the huge evolution of e-commerce are factors that contributed to the
increase of interest on trust and reputation, even recognising them as key factors for a successful e-commerce
adoption.
Within these scenarios, Trust and Reputation Models are used as an incentive in decision-making, when
deciding whether or not to honor contracts (buy products, ask for advice, accept and agreement, etc.), and as
5
-
8/6/2019 Trust and Reputation
6/21
a mechanism to search trustworthy exchange partners. In particular, reputation is used in electronic markets
as a trust-enforcing mechanism or as a method to avoid cheaters and frauds.
Trust and Reputation both have a social value. When someone is trustworthy, that person may be expected
to perform in a beneficial or at least not in a suspicious way that assure others, with high probability, goodcollaborations with him. On the contrary, when someone appears not to be trustworthy, others refrain from
collaborating since there is a lower level of probability that these collaborations will be successful. However,
trust is strongly connected to confidence and it implies some degrees of uncertainty.
Therefore, there is a relation between both the concepts that should be considered in depth: reputation is
a concept that helps to build trust on others, in order to decrease the uncertainty level.
A reputation system computes and publishes reputation scores for a set of objects (e.g. services or entities)
within a certain community, based on a collection of opinions that other entities hold about the objects. The
opinions are typically passed as ratings to a reputation center which uses a specific reputation algorithm to
dynamically compute the reputation scores based on the received ratings.
Entities in a community use reputation scores for decision making, e.g. whether or not to buy a specific
service or good. An object with a high reputation score will normally attract more business that an object with
a low reputation score. It is therefore in the interest of objects to have a high reputation score.
Nowadays, game theory is the predominant paradigm considered to design computational trust and reputa-
tion models. In all likelihood, this theory is taken into account because a significant number of economists and
computer scientists, with a strong background in game theory and artificial intelligence techniques, are working
in multi-agent and e-commerce contexts.
An individuals success in making choices depends on the choices of others. [1]
4 Trust & Reputation Tools
There are four main methods or tendencies in order to mathematically evaluate Trust and Reputation.
Actual Trust and Reputation models combine two or more of these tools in order to enforce the security and
reliability of a T&R system.
4.1 Ratings
One of the main and most seen tools used in reputation based trust models are the ratings. This enables
a user (that has had a formal or informal interaction with another user) to give a rating in form of a numeric
rating (or its counterpart, the typical 5-star system) or just a negative or positive point.
Numeric rating system
The numeric ratings describe the opinion of the user or one of its submissions or both. It is then averaged
among all its ratings and the result is shown to all the subsequent users that want to interact with him/her.
When the user base is large and the majority of the users the numeric rating works well because the opinion of
6
-
8/6/2019 Trust and Reputation
7/21
any particular user is averaged out. This means that if a rogue user starts giving out bad ratings to every user
it doesnt show much on their ratings. On the other hand, when the user base is small, a mischievous user with
a lot of real life friends can change its numeric rating easily.
Often, the algorithms to average these ratings become more complex and give greater ponderation to trustedmembers or members with a good standing on the web to avoid having new users (usually created just for this
purpose) overthrow a trusted old member.
One of the main problems of the numeric rating system is when there are similar items on comparison but
some of them have a rating based on very few users. If these users voted high, this rating is then averaged and
it reflects highly on the item, even though these users may be mischievous or friends of the submitter. This has
been easily solved on some pages by showing the number of reviews the rating is averaged on. This combination
of numeric rating and the users its based on is one of the most widely used and trusted rating system.
This rating system is one of the oldest ones, based on numeric reviews like the movie reviewers before the
Internet.
Positive/Negative rating system
The other main rating used in web pages is the +1, -1. When a user is thinks a user or one of its
submissions to the community is relevant, it approves it. On the other hand, when it thinks it isnt appropiate,
it disapproves and the submission may be held back for revision by a higher level user. These these ratings
arent averaged but added up, the higher the result the better. This way, bad submissions are given a negative
rating and are often discarded or kept in a separate section of the page.
Theres benefits for the user with this system because its very obvious when a user is not to be trusted.
Some pages even give the percentage of positive/negative ratings which form to a kind of numeric rating out of
100.
This rating system is the most adopted by web pages because its easy to understand for the end user and
easy to manage by administrators.
4.2 Feedback
The other major tool there is to create reputation is feedback. Feedback is a written opinion from peer to
peer. Unlike the ratings, a feedback can be more elaborate and tell detailed opinions and not just an impersonal
number. It gives security and credibility to other users who can form an opinion of the opinion giver.
The downside of this system is that users seek to get the most positive feedbacks from their peers so they are
very positive on their own feedbacks. This creates a feedback loop and means that the majority of the reviews
arent 100% true.
4.3 Institutional
Trust and Reputation can also be Institutional, this is, to base the trust to entity on the name of the
entity or a third party which verifies the quality of a certain product or service.
7
-
8/6/2019 Trust and Reputation
8/21
There are institutions which seal/verify some services and products and whose seal makes the user (e.g.
an interested buyer) feel trustful. A clear example on this is Paypal which online payment service ensures
confidentiality and correct money exchange between parties (Paypal will be further described b elow). A user
who is interested in buying something in an not trusted online shop may be more trustful whenever it knowsthat a secure payment by a third party like paypal can be done. There exist other Paypal-like services, the
trust or not on them depends on the reputation that the companies hold during their lifetime, so a user may
accept one but may be doubtful of another which services had been once security compromised.
Another example of Institutional Trust is a Certificate Authority. Whenever a user visits a website or uses
a data-sensitive online service, it must be sure that the communication cannot be seen by anybody else. This
can be ensured by (e.g.) an SSL certificate, however some certificates are also signed (even double-signed) by
a third party authority which ensures that the certificate belongs to the named company. This provides the
consumer a higher degree of trust than using a self-signed certificate which also depends on the reputation of
the third party shareholder.
4.4 Security
The trust through Security is sometimes close to Institutional Trust. This mechanism bases the trust that
an entity has to another on the fact that the first really knows that the second is who says it is and the messages
and data-exchange cannot be altered while the communication process. Thus, can be summarized as:
Agent Validation
Integrity and authenticity of messages
Trust to Security approach ensures a certain information is valid and can be trusted if both of the upper
premises are successful.
5 Models
5.1 Number of hits
Description This is the most simple model of the ones we are commenting, it only computes the number
hits an entity receives. Examples are:
Number of views of a website.
Number of reads of a Blog post.
Number of given opinions of a certain forum member.
Number of users of a certain service.
8
-
8/6/2019 Trust and Reputation
9/21
The higher these numbers are, the most relevant (or even trustful) their services are considered by this
model.
There is also an algorithm named HITS (Hyperlink-Induced Topic Search) precursor to PageRank, but it
has no relation with this one. We explain this Number of hits as an introduction to Trust And Reputationmodels. PageRank will be described in section 5.2 as well as more advanced algorithms.
Reputation The Reputation is proportional to the number of hits an entity receives.
R = k Nhits
Trust Trust is usually proportional to the reputation of a certain entity. Thus, in the case of a search engine
the most visited entities will appear first in the search results (which is a common practice in many search
engines), this is because the S.E. trusts more the results that have higher reputation, which means a larger
number of hits.
T = c R = mNhits
Troubles In most cases the user tends to visit the first results of a search query however they might not be
the right ones. Despite that, these receive the most number of hits, so the wrong results might keep appearing
at the top of the charts for some time.
5.2 PageRank
Description PageRank is a link analysis algorithm, named after Larry Page, used by the Google Internet
search engine that assigns a numerical weighting to each element of a hyperlinked set of documents with the
purpose of measuring its relative importance within the set. The algorithm may be applied to any collection
of entities with reciprocal quotations and references. The numerical weight that it assigns to any given element
E is also called the PageRank of the page i and denoted by P R(pi).
The name PageRank is a Google trademark, and the PageRank process has been patented (U.S. Patent
6,285,999). However,even though the patent is assigned to Stanford University and not to Google, Google has
exclusive license rights on the patent.
Nowadays this is not the only algorithm Google is using to rate the websites or documents, though. They
combine more than 200 algorithms (including PageRank) which they update on a weekly basis in order to reach
the most accurate page rating, and consequently the best and most relevant search results.
9
-
8/6/2019 Trust and Reputation
10/21
Figure 1: PageRank example
Google describes PageRank as:
PageRank relies on the uniquely democratic nature of the web by using its vast link structure
as an indicator of an individual pages value. In essence, Google interprets a link from page A to
page B as a vote, by page A, for page B. But, Google looks at more than the sheer volume of votes,
or links a page receives; it also analyzes the page that cast the vote. Votes cast by pages that are
themselves important weigh more heavily and help to make other pages important. [8]
In other words, a PageRank results from a ballot among all the other pages on the World Wide Web about
how important a page is.
Relevance (Reputation) The relevance or reputation is the PageRank itself, defined recursively and depends
on the number and PageRank metric of all pages that link to it (incoming links). A page that is linked to
by many pages with high PageRank receives a high rank itself. If there are no links to a web page there is no
support for that page.
Originally the PageRank was defined as:
P R(pi) =1 d
N+ d
pjM(pi)
P R(pj)
C(pj)
where:
P R(pi) is the PageRank of the page i.
d is the damping factor, usually set to 0.85.
C(pj) is the number of links going out of the page j.
M(pi) is the set of pages linking to page i.
N is the total number of pages linking to page i.
10
-
8/6/2019 Trust and Reputation
11/21
Trust The trust is usually proportional to the reputation of a certain entity. Thus, the most rated pages will
appear first in the search results. And users will trust the search engine as it shows on top of the search results
the more likely results for a certain query.
Troubles Numerous academic papers concerning PageRank have been published since Page and Brins original
paper. In practice, the PageRank concept has proven to be vulnerable to manipulation, and extensive research
has been devoted to identifying falsely inflated PageRank and ways to ignore links from documents with falsely
inflated PageRank. This is one of the reasons Google combines the use of PageRank with about 200 other
algorithms.
Spoofing A previous flaw was that any low PageRank page that was redirected, via a HTTP 302 response
or a Refresh meta tag, to a high PageRank page caused the lower PageRank page to acquire the PageRank
of the destination page. In theory a new, PR 0 page with no incoming links could have been redirected to the
Google home pagewhich is a PR 10and then the PR of the new page would be upgraded to a PR10. This
spoofing technique, also known as 302 Google Jacking, was a known failing or bug in the system. Any pages
PageRank could have been spoofed to a higher or lower number of the webmasters choice and only Google has
access to the real PageRank of the page.
Manipulation For search engine optimization purposes, some companies offer to sell high PageRank links to
webmasters. As links from higher-PR pages are believed to be more valuable, they tend to be more expensive.
It can be an effective and viable marketing strategy to buy link advertisements on content pages of quality and
relevant sites to drive traffic and increase a webmasters link popularity.
5.3 eBay
Description eBay is an American internet company devoted to e-commerce. All kinds of users buy and sell
a great variety of products using its online auction system.
Theres three different kinds of auction in eBay:
1. Typical auction: sellers offer one or more items for sale. It sets the initial price and the length of the
offer. Then registered users can bid for the product. At the end of the previously established period bythe seller, the highest bidder gets the product, paying not his last bid, but the second-highest bid.
2. Buy it now: sellers offer the product at a fixed prize. If theres a buyer who agrees to pay this prize, it
obtains the product immediately.
3. Best offer: the possible buyer submits a best offer. If the best offer is not satisfactory, the seller presents
a counter offer to the buyer. It ends when seller and buyer agree to a final price.
Its important to have in mind that the buyer has no physical access to the product and usually only has a
picture and a brief description of the product written by the seller. To mend this, eBay proposes several trust
and reputation solutions.
11
-
8/6/2019 Trust and Reputation
12/21
Trust eBay gives several guarantees of trust to the buyer and seller. Firstly, sellers can choose the type of
payment (credit card, bank transfer, PayPal, etc), which helps prevent a possible fraud. Besides, eBay offers
buyer protection, a service that covers a certain amount of the buying price in case of fraud. Each claim
addressed to eBay for this reason costs 30 euros.Also seller and buyer may decide not to commit the transaction, if one of them is not satisfied with the
conditions. To facilitate all this mechanisms, all the information remains on eBay servers.
Reputation eBay provides an easy system of reputation. Although its not mandatory, buyers and sellers
evaluate each other after transactions. This evaluation consists in a short comment and a rating. There are three
kind of ratings: positive (+1), neutral (0) and negative (-1). This tool gives each eBay member a reputation,
that is the sum of all the numerical evaluations. In the next sales and from the reputation of the seller, buyers
will be able to know if the offer is to be trusted or not.
Advantages and Troubles Some positive points of eBay are the simplicity of the whole process and the
great capacity to receive millions of users. In addition, the more users, the more robustness the system will
have.
Even so, reputation and its rating procedures are quite manipulable. Weakness lies also in the interpretation
of the reputation. It is difficult to define exactly what is a high or low reputation and the textual comments
become, most of the times, indispensable to know if the seller is trustful or not.
5.4 Amazon.com
Description Amazon.com is an online store and reseller of both new and used items. It uses its institutional
reputation to sell items from less trusted or known online shops at a premium. Its trust model is based on the
reputation its products gather on the form of ratings and feedback from its buyers.
Reputation Theres two kinds of reputation on Amazon.com the first is the reputation of the item to be
bought itself and then theres the reputation of the online shop (if the item cannot be sold directly by amazon
or if the user chooses not to) from which the user may purchase the item.
On every item page, theres a summary in the form of a numeric rating and the number of reviews its based
on. Then, at the bottom, all the reviews can be found and read. It goes even deeper than that because each
review can be marked as useful or not by potential customers. That last part is shown above every review in
the form of 8 out of 10 people found the following review helpful. This doesnt change the numeric rating of
the whole item, but helps the users know the reputation of each single review.
When a user has chosen whichever item he or she wants to buy, it can go to a page showing all the potential
sellers of this item, including amazon itself. This page has a list with the different prices and a percentage of
users that have had previous positive transactions with the seller. Then if a user clicks on a particular rating
is then brought to a detailed page showing the average based on the last 30, 60, 90 or 365 days and written
feedback from its customers.
12
-
8/6/2019 Trust and Reputation
13/21
Trust The trust the user has of the whole page is based on the reputation of its items. Each item is trusted
individually by its numeric rating, but its trust can be lost by a single bad review, as most of the time there
are very similar products available and the user can choose freely one or another.
Most of the seller ratings are pretty high so users usually choose depending on other aspects (such as shippingprice, availability, processing time, etc) provided the rating surpasses a minimum threshold.
Troubles Amazon.com assures its neutrality saying that bad reviews arent and its mostly true but there
have been cases in books about Scientology. This means that all opinions on the page could be superseded by
Amazon.com if they dont follow its guidelines.
There was a case in 2004 when a glitch in Amazon.cas review system temporarily revealed that some well-
established authors were anonymously giving themselves glowing reviews and rival authors terrible reviews.
5.5 Paypal
PayPal is an e-commerce business, property of eBay, and constitutes a trust system by itself. Every day
more people decide to do their shopping through the internet, which creates several doubts, not only about the
state of products or services that they want to obtain, but also on the security of the payments. Many people
still refuse internet shopping because of this reason. They fear fraud when the website asks for the credit card
number or the account.
This is why PayPal performs payment processing for online transactions, like auction sites, and charge a
fee. In fact, the most part of its users come from eBay, its owner and one of the biggest e-commerce platforms.
PayPal is used like an intermediary, an account where the user can deposit its money and from which it is able to
do the transactions. For security, PayPal blocks the access to the incoming money during 21 days. However, it
doesnt have any mechanism to control the success and legality of the transaction which represents a problem to
security.It differs from credit cards -which charging similar fees-, who control and deal with transaction problems.
Nevertheless recently this was in question, when Wikileaks revealed U.S. State department diplomatic cables
and PayPal decided not to accept transactions to Assanges organization. It seems that in case of supposedly
illegal procedures the company is perfectly capable to take part on it.
This system could seem like a bank, but it really works quite differently. For example, the owner of the
account doesnt receive any interest for the deposit and all the cash movements, like transactions to physical
bank accounts or payments, are charged by the company. Actually, PayPal doesnt use its own money and
doesnt back up the transactions either.
5.6 Facebook, a reality approach
Description Facebook model for Trust and Reputation is the most similar to reality, the user is able to see
how many users are friends with other users, so the measure of reputation is how popular are they.
13
-
8/6/2019 Trust and Reputation
14/21
Reputation The Reputation is, in this approach, the number of friends a user has. So the higher the
number of friends, the higher the weight of its reputation. However, it is not directly linked to Trust, as we
will see in the next paragraph. This is the only mathematically computed value we can have figured out of a
certain entity.
Trust The trust in facebook, relies in many variables. The reputation (number of friends) is one of them and
maybe the most important for many users (people tend to trust the ones that look cool or trendy), however the
grade of mutual friendship or particular opinions might also compute in the equation.
Troubles Social troubles such as hypotheses like the ones who have more friends are the ones who deserve
to be trusted, and prejudices.
5.7 OpenPGP
Description OpenPGP is an encryption standard defined on RFC 4880, an open implementation of Phil Zim-
mermanns original PGP. It is then a non-proprietary protocol for encrypting email using public key cryptogra-
phy, actually based on PGP, and defines standard formats for encrypted messages, signatures, and certificates
for exchanging public keys.
Like PGP, it uses a serial combination of hashing, data compression, symmetric-key cryptography, and
public-key cryptography, where each key is bound to a user name and/or an e-mail address.
The procedure is the following: The message is encrypted using a symmetric encryption algorithm, which
requires a symmetric key (session key) which will be used only once. The session key is encrypted with the
receivers public key thus ensuring that only the receiver can decrypt the session key. The encrypted message
along with the encrypted session key is sent to the receiver.
PGP also supports message authentication and integrity checking. The sender uses PGP to create a digital
signature for the message with either the RSA or DSA signature algorithms. To do so, PGP computes a hash
(message digest) from the plaintext, and then creates the digital signature from that hash using the senders
private key.
Reputation The Reputation of the Protocol is pretty wide. Its well known for being a secure encryption
method though. On the other hand, it has some weaknesses on the public key exchange methods (like the
most of public-key encryption methods). This can be solved through what is called Web of Trust and Trust
Signatures.
Web of Trust Users must ensure by some means that the public key in a certificate actually does belong to
the person/entity claiming it. PGP products have an internal certificate vetting scheme a trust model which
named Web of Trust.
Mr. Zimmermann was aware of this issue:
14
-
8/6/2019 Trust and Reputation
15/21
As time goes on, you will accumulate keys from other people that you may want to designate as
trusted introducers. Everyone else will each choose their own trusted introducers. And everyone will
gradually accumulate and distribute with their key a collection of certifying signatures from other
people, with the expectation that anyone receiving it will trust at least one or two of the signatures.This will cause the emergence of a decentralized fault-tolerant web of confidence for all public keys.
[9]
Web of Trust is a decentralized trust model of a public key infrastructure (PKI), which relies exclusively on
a certificate authority (or a hierarchy of such). As with computer networks, there are many independent webs
of trust, and any user (through their identity certificate) can be a part of, and a link between, multiple webs.
In the web of trust you have a key ring with a group of peoples public keys.
The web of trust mechanism has advantages over a centrally managed public key infrastructure scheme but
has not been universally used. Users have been willing to accept certificates and check their validity manually
or to simply accept them. No satisfactory solution has been found for the underlying problem.
In contrast, a typical PKI permits each certificate to be signed only by a single party: a certificate authority
(CA). The CAs certificate may itself be signed by a different CA, all the way up to a self-signed root certificate.
Trust signatures In the (more recent) OpenPGP specification, trust signatures can be used to support
creation of certificate authorities. A trust signature indicates both that the key belongs to its claimed owner
and that the owner of the key is trustworthy to sign other keys at one level below their own.
A level 0 signature is comparable to a web of trust signature since only the validity of the key is certified.
A level 1 signature is similar to the trust one has in a certificate authority. It is able to issue an unlimited
number of level 0 signatures.
A level 2 signature is highly analogous to the trust assumption users must rely on whenever they use the
default certificate authority list (like those included in web browsers); it allows the owner of the key to
make other keys certificate authorities.
Revokation What if a user loses its private key or its access is compromised? PGP versions have always
included a way to cancel (revoke) identity certificates. A lost or compromised private key will require this
if communication security is to be retained by that user. This is, more or less, equivalent to the certificate
revocation lists of centralized PKI schemes. Recent PGP versions have also supported certificate expiration
dates, which ensure that a fake identify will not use the certificate for a very long time. (See Troubles).
A key owner may designate a third party that has permission to revoke the key owners key (in case the key
owner loses his own private key and thus loses the ability to revoke his own public key).
Mean Shortest Distance In statistical analysis of the PGP Web Of Trust the mean shortest distance (MSD)
is one measurement of how trusted a given PGP key is within the strongly connected set of PGP keys that
make up the Web of trust.
15
-
8/6/2019 Trust and Reputation
16/21
MSD has become a common metric for analysis of sets of PGP keys. Very often you will see the MSD being
calculated for a given subset of keys and compared with the global MSD which generally refers to the keys
ranking within one of the larger key analyses of the global Web of trust.
Final Trust According to the previous description of OpenPGP systems, the trust level a user experiences
mostly depends on:
How sure is the user that the certificate used to encrypt the message belongs to other end. This is
how trustworthy is the certificate itself, and the Web of Trust ring it is part of.
Troubles The OpenPGP web of trust is essentially unaffected by company failures, and has continued to
function with little change. However, a related problem does occur. Users, whether individuals or organizations,
who lose track of a private key can no longer decrypt messages sent to them produced using the matching public
key found in an OpenPGP certificate.
Early PGP certificates did not include expiry dates, and those certificates had unlimited lives. Users had to
prepare a signed cancellation certificate against the time when the matching private key was lost or compromised.
Later PGP, and all OpenPGP compliant certificates included expiry dates which automatically preclude such
troubles when used sensibly.
5.8 Trust Net
Description A Trust Net is a decentralized and iterative trust model that relies on the relation of what a
user says and does.
Reputation Reputation can be gained by fulfilling promises made. When a users is promised something but
it isnt then carried out, the reputation on the eyes of the receiving end is decreased. This reputation can be
then passed on to other users which can make the process quicker.
A practical example of this model can be in game theory. In a semi-competitive game, its players can share
their planned strategies with its rivals but if they arent carried out, their rivals (who may have planned their
strategies accordingly) might not trust the next announced strategy.
Trust The trust value of a user A towards B is:
T(A, B) =number of honest rounds
number of total rounds
But the aggregated trust based on both the direct experience and the reputation shared by fellow users
depends on probabilistic functions based on the lying factor.
Troubles As it has been just said, the system depends on a certain degree on the lying factor. If a large
enough user base lies about a certain user, he or she can deceive others because the trust model isnt working.
16
-
8/6/2019 Trust and Reputation
17/21
After a decent amount of time, the direct experience should even out this particular problem and the users
reputation should fall accordingly, but a proactive protection system can be difficult to maintain.
5.9 Slashdot
Description Slashdot is a news web page that relies heavily on the reputation of its users and to sort and
make visible relevant comments about news.
Reputation Slashdots reputation system is based on a threaded comments section tied to each news item
that the site editors have posted. These comments have a reputation system based on the +1, -1 ratings
but are comprehended from -1 to +5. These votes can only be cast by moderators and each vote can have a
short comment attached to it such as normal, offtopic, flamebait, troll, redundant, interesting, informative or
funny.
These comment votes are then aggregated to a personal reputation, resulting in a user level of high, normal
or low karma. Higher karma means that the users comments start off with a higher default score.
When a user has had high reputation for a period of time, it can randomly gain access to a limited number of
moderation points. These are then used to vote on other users comments. Users cannot comment and moderate
in the same discussion so as to maintain objectivity on the matter.
Trust Trust is based on the moderators rating of a given comment and its written feedback. Default options
on the page automatically hide comments below a configurable threshold meaning that in the moderators point
of view, that comment isnt relevant to the discussion but it isnt deleted to allow users to see and judge by
itself.
Troubles Paid staff editors on the page have an infinite amount of moderation points which means that the
reputation is basically based on the opinion of a handful of people and can be biased.
6 Security, consistency and attacks
6.1 Sybil Attack
A Sybil attack consists in an attacker who subverts the reputation system of a trust network by creating a
large number of online entities, using them to gain a disproportionately large influence. A reputation systems
vulnerability to a Sybil attack depends on how cheaply identities can be generated, the degree to which the
reputation system accepts inputs from entities that do not have a chain of trust linking them to a trusted entity,
and whether the reputation system treats all entities identically.
The Sybil attack takes its name after a book written about the subject of the book Sybil, a case study
of a woman with dissociative personality disorder. This case is notorious because it involved 16 personalities
(counting the main one) ranging from auto-critical to very emotional personalities and even including two male
17
-
8/6/2019 Trust and Reputation
18/21
personalities. Sybils selves gradually became co-conscious of their counterparts and were able to communicate
between each other and even published material under their own names.
In the context of human online communities, such multiple identities are known as sockpuppets. One of
the most recent sockpuppets of an online celebrity is plannedchaos. plannedchaos is a sockpuppet of ScottAdams, writer of one of the oldest webcomics (its been running daily since 1990) called Dilbert. He used the
sockpuppet to talk high about himself and was his so called biggest fan on pages like metafilter, tumblr or
reddit.
Protection against Sybil attacks
Validation techniques can be used to prevent Sybil attacks and dismiss masquerading hostile identities. Two
types of validation can be used, direct and indirect validation. The first one relies on a central authority, which
takes queries and ensures a one-to-one correspondence between an identity and its counterpart. It may even
provide reverse lookup, which consists on querying for the counterpart and looking if it matches the identity to
be validated. Indirect validation relies on already accepted identities which then vouch for the validity of the
new identity in question.
Identity-based validation techniques generally provide accountability at the expense of anonymity, which can
be an undesirable tradeoff especially in online forums that wish to permit censorship-free information exchange
and open discussion of sensitive topics. One of such examples might be the Blizzard Real Name Forum Policy
initiative that wanted to tie every World of Warcraft account holder to a real life person. This caused a huge
uproar on the forums and on the whole video games blogosphere. Blizzard backed off on its proposition and
the policy was never mandatory.
A validation authority can also attempt to preserve users anonymity by refusing to perform reverse lookups,
but this approach makes the validation authority a prime target for attack. Alternatively, the authority can
use some mechanism other than knowledge of a users real identity - such as verification of an unidentified
persons physical presence at a particular place and time - to enforce a one-to-one correspondence between
online identities and real-world users.
6.2 Bootstrap
One characteristic of the rating systems is the importance of participation. The example to explain how this
can be a problem has been taken from filmaffinity.com. There, registered users are able to evaluate all kind of
movies, premieres, classical films, etc. The rating system is based on a ten level scale, each one tied to a textual
expression:
10 Excellent
9 Great
8 Very Good
7 Good
18
-
8/6/2019 Trust and Reputation
19/21
6 Interesting
5 Decent
4 Regular
3 Poor
2 Bad
1 Awful
Automatically, the system calculates the average with all rating, which is the main indicator to know what
is the opinion of the other users. Lets imagine a particular case: website administrators add a new film by
John Smith. There is a low participation, because people havent seen it yet. Besides, practically all the initial
rates are from loyal fans to John Smith and his amazing thrillers. The average rating is, in this case, 8,7.Are these results trustful? The answer is clearly not. The problem of this rating system is that when there
is low participation (a new film or one that appeals only to a minority group) the results presented are false,
thats to say, theres a considerable bias of the information. This means that the more participation, the more
reliability the reputation value will have. Filmaffinity has a reviews section, where users can write at length
their considerations about the movies, which is, at the end, the best tool to find the nuances of the opinions
and their references.
6.3 Whirlwind effect
The Whirlwind Effect is a common issue in rating systems, where users vote each others behaviour or
actions.
In these scenarios user reputation is usually linear with the number of votes it receives for certain actions.
Thus, usually the rest of users trust the ones with higher reputation as it seems that more people voted for
them and trusted them. So if a group of malicious users manage to be able to vote one another in a circular
order, their reputation will increase easily and in a genuine manner.
Albeit this attack is more difficult to detect when the group of implied users is bigger, a way to try to stop
it may be to limit the number of user ballots an user can cast in order to judge a peer. However it is really
difficult to detect without an specific algorithm.
6.4 The downfall of digg
Digg is a news aggregation website that is based on a community model to vote and comment on news to
show the most relevant articles to its users. It is based on Slashdots model although more elaborated and less
based on appointed moderators. Digg was launched by Kevin Rose on 2004, when the Web 2.0 was getting
popular and the site grew in users, which submitted new content and made the website very popular.
The number of users involved on the sites was so large that when a little but interesting website, which
usually ran on underpowered servers as bigger ones were unneeded for its everyday traffic, was linked and dugg
19
-
8/6/2019 Trust and Reputation
20/21
to the front page, its servers were knocked over by the influx of traffic. This was quite common because its
large user base searched for unknown content to gain reputation on the site and it was commonly called the
Digg Effect.
As the site grew, online companies saw the potential of Digg as a way to have a large number of visitors.Several social media professionals sold its services that included having a customer section of a website dugg to
the frontpage of Digg. This was done by a large-scale Sybil attack often in the range of thousands of different
identities controlled by algorithms to vote and comment to make a submission grow in reputation to the eyes of
its users. This game was outed by its users on the website but the administrators wouldnt (or couldnt) stop
entirely this attacks.
In this state, users couldnt trust entirely new submissions as the reputation it had reaped might be false,
and the only way to sort real submissions was to look the comment history of the commenters and decide if the
comments were by a real and honest person or were semi-automated and only directed to certain domains or
certain kind of content.
This scenario trailed on until it became clear of the owners preferences when on August 2010 a new design
restyle of the site, Digg v4, was launched. This redesign treated company sponsored submissions differently to
user submissions and most of the front page content was from popular websites, differing from the core Digg idea
which was based on its distinctiveness from the popular. This led people to not trust anymore the reputation
system instated and fled the website to similar social news aggregators.
Figure 2: Visitor decline on the launch of Digg v4
The CEO Kevin Rose was replaced within a week of the Digg v4 update and resigned from its position
entirely a year later.
This example shows that users have to trust the reputation method that has been established. Reputation
was being forged a lot of time before the release of Digg v4, but it then surpassed thresholds that its users
would not tolerate.
20
-
8/6/2019 Trust and Reputation
21/21
References
[1] Myerson, 1991.
[2] Cryptography and Network Security, Principles and Practices, William Stallings, International Edition (0-13-111502-2).
[3] Wikipedia.org, http://en.wikipedia.org/wiki/Reputation
[4] Wikipedia.org, http://en.wikipedia.org/wiki/Reputation_system
[5] Wikipedia.org, http://en.wikipedia.org/wiki/Computational_trust
[6] Wikipedia.org, http://en.wikipedia.org/wiki/Trust_law
[7] Wikipedia.org, http://en.wikipedia.org/wiki/Game_theory
[8] Google Inc., http://www.google.com/corporate/tech.html
[9] Wikipedia.org, http://en.wikipedia.org/wiki/Web_of_trust
[10] Wikipedia.org, http://en.wikipedia.org/wiki/Pretty_Good_Privacy
[11] Wikipedia.org, http://en.wikipedia.org/wiki/EBay
[12] Wikipedia.org, http://en.wikipedia.org/wiki/PayPal
[13] Thenextweb.com, http://thenextweb.com/socialmedia/2010/09/23/diggs-traffic-is-collapsing-at-home-an
[14] Metafilter.com, http://www.metafilter.com/102472/How-to-Get-a-Real-Education-by-Scott-Adams#
3639512
21
http://en.wikipedia.org/wiki/Reputationhttp://en.wikipedia.org/wiki/Reputation_systemhttp://en.wikipedia.org/wiki/Computational_trusthttp://en.wikipedia.org/wiki/Trust_lawhttp://en.wikipedia.org/wiki/Game_theoryhttp://www.google.com/corporate/tech.htmlhttp://en.wikipedia.org/wiki/Web_of_trusthttp://en.wikipedia.org/wiki/Pretty_Good_Privacyhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/PayPalhttp://thenextweb.com/socialmedia/2010/09/23/diggs-traffic-is-collapsing-at-home-and-abroad/http://www.metafilter.com/102472/How-to-Get-a-Real-Education-by-Scott-Adams#3639512http://www.metafilter.com/102472/How-to-Get-a-Real-Education-by-Scott-Adams#3639512http://www.metafilter.com/102472/How-to-Get-a-Real-Education-by-Scott-Adams#3639512http://www.metafilter.com/102472/How-to-Get-a-Real-Education-by-Scott-Adams#3639512http://thenextweb.com/socialmedia/2010/09/23/diggs-traffic-is-collapsing-at-home-and-abroad/http://en.wikipedia.org/wiki/PayPalhttp://en.wikipedia.org/wiki/EBayhttp://en.wikipedia.org/wiki/Pretty_Good_Privacyhttp://en.wikipedia.org/wiki/Web_of_trusthttp://www.google.com/corporate/tech.htmlhttp://en.wikipedia.org/wiki/Game_theoryhttp://en.wikipedia.org/wiki/Trust_lawhttp://en.wikipedia.org/wiki/Computational_trusthttp://en.wikipedia.org/wiki/Reputation_systemhttp://en.wikipedia.org/wiki/Reputation
top related