Publication:
Privacy-preserving reputation management in fully decentralized systems: challenges and opportunities

dc.contributor.coauthorTran, Ngoc Hong
dc.contributor.coauthorNguyen, Binh Quoc
dc.contributor.departmentN/A
dc.contributor.kuauthorBahri, Leila
dc.contributor.kuprofileResearcher
dc.contributor.schoolcollegeinstituteGraduate School of Sciences and Engineering
dc.contributor.yokidN/A
dc.date.accessioned2024-11-10T00:08:14Z
dc.date.issued2019
dc.description.abstractReputation is one of crucial personal information strongly attached to each person, so it affects directly to its owner in whatever way it is used. Any form of reputation violation can carry a serious consequence to its owner. Therefore, reputation needs to be managed in a secure way. Moreover, reputation management is a substantial process as it plays a key role in building up a certain trust level, among just-met users. Thus just-met users can base on reputation scores to make a decision on starting up their communication. In addition, reputation management reduces risks of leaking user privacy and losing data security. So far, several works on managing reputation in online social network have been studied, mostly using the Internet for data transmission. In this work, reputation management is placed into the context of fully decentralized environment. Under the more harsh conditions which the decentralized mobile environment carries, such as no central node, frequently changed user location, and restrictions of energy, power, memory, etc., and the security requirement, methods of reputation management get more challenged. Various security problems of managing reputation are still open to be solved. In this work, we make a discussion about recent works on privacy-preserving reputation management in a decentralized environment. We then present challenges, and conclude the open problems as well as possible solutions in reputation management.
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.volume807
dc.identifier.doi10.1007/978-3-319-94703-7_19
dc.identifier.isbn9783-3199-4702-0
dc.identifier.issn2194-5357
dc.identifier.linkhttps://www.scopus.com/inward/record.uri?eid=2-s2.0-85059079785&doi=10.1007%2f978-3-319-94703-7_19&partnerID=40&md5=5eb7d6f4251fb50e3788042106d4e1aa
dc.identifier.scopus2-s2.0-85059079785
dc.identifier.urihttps://dx.doi.org/10.1007/978-3-319-94703-7_19
dc.identifier.urihttps://hdl.handle.net/20.500.14288/16921
dc.keywordsAnonymity
dc.keywordsDecentralized model
dc.keywordsEncryption
dc.keywordsIdentity validation
dc.keywordsMobile environment
dc.keywordsPeer-to-peer (P2P) network
dc.keywordsPrivacy preserving
dc.keywordsReputation management
dc.keywordsSecurity Artificial intelligence
dc.keywordsCryptography
dc.keywordsData privacy
dc.keywordsData reduction
dc.keywordsEnvironmental management
dc.keywordsNatural language processing systems
dc.keywordsPeer to peer networks
dc.keywordsSocial networking (online)
dc.keywordsAnonymity
dc.keywordsDecentralized models
dc.keywordsIdentity validation
dc.keywordsMobile environments
dc.keywordsPeer to Peer (P2P) network
dc.keywordsPrivacy preserving
dc.keywordsReputation management
dc.keywordsSecurity
dc.keywordsNetwork security
dc.languageEnglish
dc.publisherSpringer Nature
dc.sourceAdvances in Intelligent Systems and Computing
dc.subjectArtificial intelligence
dc.subjectCryptography
dc.subjectData privacy
dc.subjectPeer-to-peer architecture (Computer networks)
dc.titlePrivacy-preserving reputation management in fully decentralized systems: challenges and opportunities
dc.typeConference proceeding
dspace.entity.typePublication
local.contributor.authoridN/A
local.contributor.kuauthorBahri, Leila

Files