13,675 Hits in 4.0 sec

Methods for Computing Trust and Reputation While Preserving Privacy [chapter]

Ehud Gudes, Nurit Gal-Oz, Alon Grubshtein
2009 Lecture Notes in Computer Science  
The present paper discusses the computation of reputation in such models, while preserving members' private information.  ...  Three different schemes for the private computation of reputation are presented, and the advantages and disadvantages in terms of privacy and communication overhead are analyzed.  ...  Three different methods for computing trust and reputation privately are presented, each offering a slightly different degree of privacy and communication overhead.  ... 
doi:10.1007/978-3-642-03007-9_20 fatcat:dcnjb6b4dbds3hv5l6qdhimbia

Blockchain Application on the Internet of Vehicles (IoV) [article]

Nyothiri Aung, Tahar Kechadi, Sahraoui Dhelim, Tao Zhu, Aymen Dia Eddine Berini, Tahar Guerbouz
2022 arXiv   pre-print
The Blockchain, as a distributed tamper-resistant ledge, has been proposed as an innovative solution that guarantees privacy-preserving yet secure schemes.  ...  However, the key characteristics of IoV, such as high-speed mobility and frequent disconnections make it difficult to manage its security and privacy.  ...  Feng et al [35] introduced a blockchain-based trusted cloaking area construction (TCAC) method based on trust management to preserve the location privacy of vehicular nodes.  ... 
arXiv:2205.03832v1 fatcat:73ocv5hdtzba7ifwozovnqwu2q

Privacy protection in mobile crowd sensing: a survey

Yongfeng Wang, Zheng Yan, Wei Feng, Shushu Liu
2019 World wide web (Bussum)  
Besides, we review the achievements on privacy-preserving incentives in MCS from four viewpoints of incentive measures: credit incentive, auction incentive, currency incentive, and reputation incentive  ...  In essence, we classify the privacy protection schemes into four categories with regard to identity privacy, data privacy, attribute privacy, and task privacy.  ...  While the study is important for MCS security and privacy preservation, the challenge is that accountability may conflict with identity privacy.  ... 
doi:10.1007/s11280-019-00745-2 fatcat:eu5uhqeae5fttgforze6w2ctzi

Improving the Enhanced Recommended System Using Bayesian Approximation Method and Normalized Discounted Cumulative Gain

R. Jayashree, A. Christy
2015 Procedia Computer Science  
This paper includes the online rating calculation method, Bayesian Approximation, for reputation management and Normalized Discounted Cumulative Gain as a metric for measuring ranking correctness.  ...  Reputation is an effective source for measuring trust. In e-learning environments, co-learners trust relationships play a vital role to establish collaborative activities.  ...  to facilitate reputation/ranking based trust while supporting privacy preserving identity management for elearning users.  ... 
doi:10.1016/j.procs.2015.04.057 fatcat:p5glbh4zgvfzxoffpi5yi6nsmu

Privacy Preservation Scheme for WSNs using Signature and Trust Value Computation

Pavithra M. N, Chinnaswamy C. N, Dr. T. H. Sreenivas
2016 International Journal of Engineering Research and  
In trust management, computing trust value is one of the crucial problems. In this scheme we compute trust value for each sensor node for preserving privacy of data.  ...  Trust management systems could play an important role to preserving privacy in WSN which also enhance the reliability and security of WSN.  ...  Xing Yuan et al [2] explain how to ensure the information privacy while computing trust values, and propose a privacy preserving trust value computation (PPTC) protocol to take care of this issue.  ... 
doi:10.17577/ijertv5is060098 fatcat:lk4wuyyseragna6usgthvvmr4m

Guest Editorial Introduction to the Special Section on Network Science for High-Confidence Cyber-Physical Systems

Xiuzhen Cheng, Sriram Chellappan, Wei Cheng, Gokhan Sahin
2020 IEEE Transactions on Network Science and Engineering  
To address the issue of privacy preservation for data auction in CPS, Gao et al. in "Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption" propose a generic and an enhanced privacy-preserving  ...  In "A Reputation-Based Model for Trust Evaluation in Social Cyber-Physical Systems," Xia et al. devote their efforts on building a social-CPS reputation-based trust mechanism that quantifies the direct  ...  To address the issue of privacy preservation for data auction in CPS, Gao et al. in "Privacy-Preserving Auction for Big Data Trading Using Homomorphic Encryption" propose a generic and an enhanced privacy-preserving  ... 
doi:10.1109/tnse.2019.2959569 fatcat:mrt6izmienb6la4avltnn25hru

Trust and Privacy Enabled Service Composition Using Social Experience [chapter]

Shahab Mokarizadeh, Nima Dokoohaki, Mihhail Matskin, Peep Küngas
2010 IFIP Advances in Information and Communication Technology  
Using our privacy inference model we, first, prune social network to hide privacy sensitive contents and, then, utilize a trust inference based algorithm to measure reputation score of each individual  ...  In this paper, we present a framework for automatic selection and composition of services which exploits trustworthiness of services as a metric for measuring the quality of service composition.  ...  While in the case of second scenario, we can recruit, for example, nuanced profile similarity approach [20] or T-Index method [13] to compute inferred trust.  ... 
doi:10.1007/978-3-642-16283-1_26 fatcat:yptbheta2bhohowgw7brvtckla

Schemes for Privately Computing Trust and Reputation [chapter]

Nurit Gal-Oz, Niv Gilboa, Ehud Gudes
2010 IFIP Advances in Information and Communication Technology  
Several models for Trust and Reputation have been suggested recently, among them the Knots model [8] .  ...  The Knots model provides a member of a community with a method to compute the reputation of other community members.  ...  Thus preserving privacy while computing reputation becomes an important issue.  ... 
doi:10.1007/978-3-642-13446-3_1 fatcat:3lzrhz652redxcgngib2vzcb6u

Achieving Trust-Based and Privacy-Preserving Customer Selection in Ubiquitous Computing [article]

Chuan Zhang, Liehuang Zhu, Chang Xu, Kashif Sharif, Ximeng Liu, Xiaojiang Du, Mohsen Guizani
2019 arXiv   pre-print
In this article, we present a trust-based and privacy-preserving customer selection scheme in ubiquitous computing, called TPCS, to enable potential processors select the customers with good reputation  ...  Thus, how to select an appropriate and reliable customer while not disclosing processors' privacy has become an interesting problem.  ...  Conclusion In this article we proposed a trust-based and privacy-preserving customer selection scheme for processors before they join a ubiquitous computing task.  ... 
arXiv:1902.04345v1 fatcat:no67tnztubbzpongrjmproooua

Blockchain for Trust and Reputation Management in Cyber-physical Systems [article]

Guntur Dharma Putra, Volkan Dedeoglu, Salil S Kanhere, Raja Jurdak
2021 arXiv   pre-print
The salient features of blockchain, such as decentralisation and transparency, have allowed the development of Decentralised Trust and Reputation Management Systems (DTRMS), which mainly aim to quantitatively  ...  In addition, we also outline challenges and future directions in developing DTRMS for CPS.  ...  The research community in the field of security and privacy still actively proposes new methods for privacy preservation, some of which can be implemented for DTRMS: Zero-Knowledge Proofs Using Zero-Knowledge  ... 
arXiv:2109.07721v1 fatcat:qw27quabmrebnint776yye2cwe

Facilitating Trust in Privacy-Preserving E-Learning Environments

M. Anwar, J. Greer
2012 IEEE Transactions on Learning Technologies  
Such a reputation transfer model must preserve privacy and at the same time prevent linkability of learners' identities and personas.  ...  In this paper, we present a privacy-preserving reputation management (RM) system which allows secure transfer of reputation.  ...  We face the challenge of supporting trust while preserving privacy, and devise a privacy-preserving reputation management solution to address this challenge. . Implementation.  ... 
doi:10.1109/tlt.2011.23 fatcat:j5azuhdn7be5jhwkgrgbir7z5y

Privacy Preserving Reputation Management in Social Networks [chapter]

Omar Hasan, Lionel Brunie
2013 Lecture Notes in Social Networks  
In this chapter, we describe privacy preserving reputation management in social networks and the associated challenges.  ...  In particular we will look at privacy preserving reputation management in decentralized social networks, where there is no central authority or trusted third parties, thus making the task of preserving  ...  A privacy preserving protocol for computing reputation scores does not reveal the individual feedback of any entity.  ... 
doi:10.1007/978-3-7091-0894-9_8 dblp:series/lnsn/HasanB13 fatcat:dyeswkwtmvfurgsefr7y64lgga

Security and Privacy Issues of Fog Computing: A Survey [chapter]

Shanhe Yi, Zhengrui Qin, Qun Li
2015 Lecture Notes in Computer Science  
Similar to cloud computing but with distinct characteristics, fog computing faces new security and privacy challenges besides those inherited from cloud computing.  ...  In this paper, we have surveyed these challenges and corresponding solutions in a brief manner.  ...  To preserve the location privacy in such scenario, one can utilize the method used in [12] .  ... 
doi:10.1007/978-3-319-21837-3_67 fatcat:7gccmwojq5b3jnsx5rivtk63iq

A Reputation System Preserving the Privacy of Feedback Providers and Resisting Sybil Attacks

Keli Zhang, Zhongxian Li, Yixian Yang
2014 International Journal of Multimedia and Ubiquitous Engineering  
First, it hides the reputation scores of the rater and computes reputation in a privacy preserving manner. Second, it cannot identify and resist Sybil attack. 3. Preliminaries 3.1.  ...  This paper proposes a privacy-preserving reputation system. The nodes use the real identities for transaction.  ... 
doi:10.14257/ijmue.2014.9.2.14 fatcat:2hhire4ezbaftirv4sabno4qwm

User privacy and data trustworthiness in mobile crowd sensing

Daojing He, Sammy Chan, Mohsen Guizani
2015 IEEE wireless communications  
Thus, a good privacy-preserving reputation system for MCS should consider the linkability exposed by reputation values.  ...  Some methods that do not rely on the existence of a trusted third party have been proposed. In [7] , an anonymity-preserving reputation solution called IncogniSense was proposed.  ...  If participants are malicious, they would provide falsified data and it is difficult to identify them especially when different task actions are not linked due to privacy protection.  ... 
doi:10.1109/mwc.2015.7054716 fatcat:lpfgc3pwc5fd5hsy4gxw5hjvl4
« Previous Showing results 1 — 15 out of 13,675 results