ISSN 1000-1239 CN 11-1777/TP

Journal of Computer Research and Development ›› 2018, Vol. 55 ›› Issue (12): 2685-2702.doi: 10.7544/issn1000-1239.2018.20170587

Previous Articles     Next Articles

A Trust-Distrust Based Reputation Attacks Defending Strategy and Its Stability Analysis

Ma Haiyan1, Liang Yongquan2, Ji Shujuan2, Li Da1   

  1. 1(College of Computer Science and Engineering, Shandong University of Science and Technology, Qingdao, Shandong 266590); 2(Shandong Provincial Key Laboratory of Wisdom Mine Information Technology (Shandong University of Science and Technology), Qingdao, Shandong 266590)
  • Online:2018-12-01

Abstract: Though electronic commerce companies adopt multifarious reputation evaluation mechanisms to guarantee trust between customers and sellers (or customers and platforms), these reputation evaluation systems are still frequently attacked. These attacks have led the reputation ranking and recommendation rankings of sellers to be manipulated. Therefore, large numbers of honest consumers are misled to purchase low quality products. It has been mentioned that overall consideration of trust and distrust information can improve customers’ ability in defensing against reputation attacks. However, existing works have limitations such as “the trust information and distrust information are less fused”, “one advisor list is used in evaluating all sellers”, which leads to the lack of pertinence and inaccuracy of sellers’ reputation evaluation. We propose a new defensing strategy called T&D. This strategy considers the trustworthy facet as well as the untrustworthy facet of customers. In addition, this strategy offers a whitelist (which stores several most trustworthy reviewers) and a blacklist (which stores several most untrustworthy reviewers) for customers. Based on the whitelist that is purified using the blacklist, honest customers can find the most trustworthy buyers and evaluate the candidate sellers according to its own experience and ratings of these trustworthy reviewers. Simulated experimental results show that our proposed strategy significantly outperforms state-of-the-art baselines in evaluation accuracy and stability.

Key words: reputation system, attack, defense strategy, trust, blacklist, whitelist

CLC Number: