Publication:
Privacy-preserving reputation management in fully decentralized systems: challenges and opportunities

dc.contributor.coauthorTran, Ngoc Hong
dc.contributor.coauthorNguyen, Binh Quoc
dc.contributor.departmentGraduate School of Sciences and Engineering
dc.contributor.kuauthorBahri, Leila
dc.contributor.schoolcollegeinstituteGRADUATE SCHOOL OF SCIENCES AND ENGINEERING
dc.date.accessioned2024-11-10T00:08:14Z
dc.date.issued2019
dc.description.abstractReputation is one of crucial personal information strongly attached to each person, so it affects directly to its owner in whatever way it is used. Any form of reputation violation can carry a serious consequence to its owner. Therefore, reputation needs to be managed in a secure way. Moreover, reputation management is a substantial process as it plays a key role in building up a certain trust level, among just-met users. Thus just-met users can base on reputation scores to make a decision on starting up their communication. In addition, reputation management reduces risks of leaking user privacy and losing data security. So far, several works on managing reputation in online social network have been studied, mostly using the Internet for data transmission. In this work, reputation management is placed into the context of fully decentralized environment. Under the more harsh conditions which the decentralized mobile environment carries, such as no central node, frequently changed user location, and restrictions of energy, power, memory, etc., and the security requirement, methods of reputation management get more challenged. Various security problems of managing reputation are still open to be solved. In this work, we make a discussion about recent works on privacy-preserving reputation management in a decentralized environment. We then present challenges, and conclude the open problems as well as possible solutions in reputation management.
dc.description.indexedbyScopus
dc.description.openaccessYES
dc.description.publisherscopeInternational
dc.description.sponsoredbyTubitakEuN/A
dc.description.volume807
dc.identifier.doi10.1007/978-3-319-94703-7_19
dc.identifier.isbn9783-3199-4702-0
dc.identifier.issn2194-5357
dc.identifier.scopus2-s2.0-85059079785
dc.identifier.urihttps://doi.org/10.1007/978-3-319-94703-7_19
dc.identifier.urihttps://hdl.handle.net/20.500.14288/16921
dc.keywordsAnonymity
dc.keywordsDecentralized model
dc.keywordsEncryption
dc.keywordsIdentity validation
dc.keywordsMobile environment
dc.keywordsPeer-to-peer (P2P) network
dc.keywordsPrivacy preserving
dc.keywordsReputation management
dc.keywordsSecurity Artificial intelligence
dc.keywordsCryptography
dc.keywordsData privacy
dc.keywordsData reduction
dc.keywordsEnvironmental management
dc.keywordsNatural language processing systems
dc.keywordsPeer to peer networks
dc.keywordsSocial networking (online)
dc.keywordsAnonymity
dc.keywordsDecentralized models
dc.keywordsIdentity validation
dc.keywordsMobile environments
dc.keywordsPeer to Peer (P2P) network
dc.keywordsPrivacy preserving
dc.keywordsReputation management
dc.keywordsSecurity
dc.keywordsNetwork security
dc.language.isoeng
dc.publisherSpringer Nature
dc.relation.ispartofAdvances in Intelligent Systems and Computing
dc.subjectArtificial intelligence
dc.subjectCryptography
dc.subjectData privacy
dc.subjectPeer-to-peer architecture (Computer networks)
dc.titlePrivacy-preserving reputation management in fully decentralized systems: challenges and opportunities
dc.typeConference Proceeding
dspace.entity.typePublication
local.contributor.kuauthorBahri, Leila
local.publication.orgunit1GRADUATE SCHOOL OF SCIENCES AND ENGINEERING
local.publication.orgunit2Graduate School of Sciences and Engineering
relation.isOrgUnitOfPublication3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isOrgUnitOfPublication.latestForDiscovery3fc31c89-e803-4eb1-af6b-6258bc42c3d8
relation.isParentOrgUnitOfPublication434c9663-2b11-4e66-9399-c863e2ebae43
relation.isParentOrgUnitOfPublication.latestForDiscovery434c9663-2b11-4e66-9399-c863e2ebae43

Files