24,226 research outputs found

    A Privacy Preserving Distributed Reputation Mechanism

    Get PDF
    International audienceReputation systems allow to estimate the trustworthiness of entities based on their past behavior. Electronic commerce, peer-to-peer routing and collaborative environments, just to cite a few, highly benefit from using reputation systems. To guarantee an accurate estimation, reputation systems typically rely on a central authority, on the identification and authentication of all the participants, or both. In this paper, we go a step further by presenting a distributed reputation mechanism which is robust against malicious behaviors and that preserves the privacy of its clients. Guaranteed error bounds on the estimation are provided

    A Privacy Preserving Distributed Reputation Mechanism

    Get PDF
    International audienceReputation systems allow to estimate the trustworthiness of entities based on their past behavior. Electronic commerce, peer-to-peer routing and collaborative environments, just to cite a few, highly benefit from using reputation systems. To guarantee an accurate estimation, reputation systems typically rely on a central authority, on the identification and authentication of all the participants, or both. In this paper, we go a step further by presenting a distributed reputation mechanism which is robust against malicious behaviors and that preserves the privacy of its clients. Guaranteed error bounds on the estimation are provided

    Fuzzy Privacy Preserving Peer-to-Peer Reputation Management

    Get PDF
    The P2PRep algorithm is a reputation-management mechanism in which a peer uses fuzzy techniques to compute local reputations and aggregates these results to compute a global reputation for another peer which has made an offer of service. While this mechanism is known to be extremely effective in the presence of malicious peers, it has one drawback: it does not preserve the anonymity of peers in the network during the voting phase of protocol. This makes it unsuitable for use in networks which associate peers with a routing identifier such as an IP address. We propose in this paper, a solution to this problem - the 3PRep (Privacy Preserving P2PRep) algorithm which implements two protocols to maintain vote privacy in P2PRep without significant additional computation and communications overhead. In doing so, we also provide a method to compute the Ordered Weighted Average (OWA) over distributed datasets while maintaining privacy of these data

    Réputation et respect de la vie privée dans les réseaux dynamiques auto-organisés

    Get PDF
    Reputation mechanisms are very powerful mechanisms to foster trust between unknown users, by rewarding good behaviors and punishing bad ones. Reputation mechanisms must guarantee that the computed reputation scores are precise and robust against attacks; to guarantee such properties, existing mechanisms require information that jeopardize users' privacy: for instance, clients' interactions might be tracked. Privacy-preserving reputation mechanisms have thus been proposed, protecting both clients' privacy and the providers' one. However, to guarantee strong privacy properties, these mechanisms provide imprecise reputation scores, particularly by preventing clients to testify about their negative interactions. In this thesis, we propose a new distributed privacy-preserving reputation mechanism allowing clients to issue positive as well as negative feedback. Such a construction is made possible thanks to tools from the distributed systems community -- distributed third parties that allow for a distribution of trust and that tolerate malicious behaviors -- as well as from the cryptographic one -- for instance zero-knowledge proofs of knowledge or anonymous proxy signatures. Furthermore, we prove that our mechanism guarantees the required privacy and security properties, and we show with theoretical and practical analysis that this mechanism is usable.Les mĂ©canismes de rĂ©putation sont des outils trĂšs utiles pour inciter des utilisateurs ne se connaissant pas Ă  se faire confiance, en rĂ©compensant les bons comportements et, inversement, en pĂ©nalisant les mauvais. Cependant, pour que la rĂ©putation des fournisseurs de service soit prĂ©cise et robuste aux attaques, les mĂ©canismes de rĂ©putation existants requiĂšrent de nombreuses informations qui menacent la vie privĂ©e des utilisateurs; par exemple, il est parfois possible de traquer les interactions effectuĂ©es par les clients. Des mĂ©canismes de rĂ©putation prĂ©servant aussi bien la vie privĂ©e des clients que celle des fournisseurs sont donc apparus pour empĂȘcher de telles attaques. NĂ©anmoins, pour garantir des propriĂ©tĂ©s fortes de vie privĂ©e, ces mĂ©canismes ont dĂ» proposer des scores de rĂ©putation imprĂ©cis, notamment en ne permettant pas aux clients de tĂ©moigner de leurs interactions nĂ©gatives.Dans cette thĂšse, nous proposons un nouveau mĂ©canisme de rĂ©putation distribuĂ© prĂ©servant la vie privĂ©e, tout en permettant aux clients d'Ă©mettre des tĂ©moignages nĂ©gatifs. Une telle construction est possible grĂące Ă  des outils issus des systĂšmes distribuĂ©s -- des tierces parties distribuĂ©es qui permettent de distribuer la confiance et de tolĂ©rer des comportements malveillants -- et de la cryptographie -- par exemple des preuves de connaissance Ă  divulgation nulle de connaissance ou des signatures proxy anonymes. Nous prouvons de plus que ce mĂ©canisme garantit les propriĂ©tĂ©s de vie privĂ©e et de sĂ©curitĂ© nĂ©cessaires, et montrons par des analyses thĂ©oriques et pratiques que ce mĂ©canisme est utilisable

    Systematizing Decentralization and Privacy: Lessons from 15 Years of Research and Deployments

    Get PDF
    Decentralized systems are a subset of distributed systems where multiple authorities control different components and no authority is fully trusted by all. This implies that any component in a decentralized system is potentially adversarial. We revise fifteen years of research on decentralization and privacy, and provide an overview of key systems, as well as key insights for designers of future systems. We show that decentralized designs can enhance privacy, integrity, and availability but also require careful trade-offs in terms of system complexity, properties provided, and degree of decentralization. These trade-offs need to be understood and navigated by designers. We argue that a combination of insights from cryptography, distributed systems, and mechanism design, aligned with the development of adequate incentives, are necessary to build scalable and successful privacy-preserving decentralized systems

    Security and Privacy for Green IoT-based Agriculture: Review, Blockchain solutions, and Challenges

    Get PDF
    open access articleThis paper presents research challenges on security and privacy issues in the field of green IoT-based agriculture. We start by describing a four-tier green IoT-based agriculture architecture and summarizing the existing surveys that deal with smart agriculture. Then, we provide a classification of threat models against green IoT-based agriculture into five categories, including, attacks against privacy, authentication, confidentiality, availability, and integrity properties. Moreover, we provide a taxonomy and a side-by-side comparison of the state-of-the-art methods toward secure and privacy-preserving technologies for IoT applications and how they will be adapted for green IoT-based agriculture. In addition, we analyze the privacy-oriented blockchain-based solutions as well as consensus algorithms for IoT applications and how they will be adapted for green IoT-based agriculture. Based on the current survey, we highlight open research challenges and discuss possible future research directions in the security and privacy of green IoT-based agriculture
    • 

    corecore