Reputation-Based Collusion Detection with Majority of Colluders

被引:0
|
作者
Hur, Junbeom [1 ]
Guo, Mengxue [2 ]
Park, Younsoo [2 ]
Lee, Chan-Gun [2 ]
Park, Ho-Hyun [2 ]
机构
[1] Korea Univ, Seoul 02841, South Korea
[2] Chung Ang Univ, Seoul 06974, South Korea
来源
基金
新加坡国家研究基金会;
关键词
cloud computing; collusion detection; majority voting; reputation; SABOTAGE-TOLERANCE; SYSTEM;
D O I
10.1587/transinf.2015EDP7318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The reputation-based majority-voting approach is a promising solution for detecting malicious workers in a cloud system. However, this approach has a drawback in that it can detect malicious workers only when the number of colluders make up no more than half of all workers. In this paper, we simulate the behavior of a reputation-based method and mathematically analyze its accuracy. Through the analysis, we observe that, regardless of the number of colluders and their collusion probability, if the reputation value of a group is significantly different from those of other groups, it is a completely honest group. Based on the analysis result, we propose a new method for distinguishing honest workers from colluders even when the colluders make up the majority group. The proposed method constructs groups based on their reputations. A group with the significantly highest or lowest reputation value is considered a completely honest group. Otherwise, honest workers are mixed together with colluders in a group. The proposed method accurately identifies honest workers even in a mixed group by comparing each voting result one by one. The results of a security analysis and an experiment show that our method can identify honest workers much more accurately than a traditional reputation-based approach with little additional computational overhead.
引用
收藏
页码:1822 / 1835
页数:14
相关论文
共 50 条
  • [1] Collusion-resistant reputation-based intrusion detection system for MANETs
    Rossi, Angelo
    Pierre, Samuel
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2009, 9 (11): : 8 - 14
  • [2] Reputation-based majority voting for malicious grid resources tolerance
    Bendahmane, Ahmed
    Essaaidi, Mohammad
    El Moussaoui, Ahmed
    Younes, Ali
    Scalable Computing, 2010, 11 (04): : 385 - 392
  • [3] The Effectiveness of Reputation-Based Voting for Collusion Tolerance in Large-Scale Grids
    Bendahmane, Ahmed
    Essaaidi, Mohamed
    El Moussaoui, Ahmed
    Younes, Ali
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2015, 12 (06) : 665 - 674
  • [4] REPUTATION-BASED GOVERNANCE
    Fitzgerald, Louise
    PUBLIC ADMINISTRATION, 2013, 91 (01) : 241 - 242
  • [5] Reputation-based Governance
    Gano, Gretchen
    JOURNAL OF PUBLIC ADMINISTRATION RESEARCH AND THEORY, 2013, 23 (03) : 755 - 758
  • [6] Detection mechanism for reputation-based selfishness prevention in MANETs
    Rodriguez-Mayol, Alberto
    Gozalvez, Javier
    TRANSACTIONS ON EMERGING TELECOMMUNICATIONS TECHNOLOGIES, 2013, 24 (06): : 582 - 588
  • [7] Secure Reputation-Based Authentication With Malicious Detection in VANETs
    Yang, Xu
    Zhu, Fei
    Yang, Xuechao
    Luo, Junwei
    Yi, Xun
    Ning, Jianting
    Huang, Xinyi
    IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, 2025, 22 (01) : 359 - 372
  • [8] Sinkhole Attack Detection by Enhanced Reputation-Based Intrusion Detection System
    Mohammed, Fadwa Abdul-Bari Ahmed
    Mekky, Nagham E.
    Soliman, Hassan
    Hikal, Noha A.
    IEEE ACCESS, 2024, 12 : 86985 - 86996
  • [9] Game Theoretic Framework for Reputation-based Distributed Intrusion Detection
    Bradai, Amira
    Afifi, Hossam
    2013 ASE/IEEE INTERNATIONAL CONFERENCE ON SOCIAL COMPUTING (SOCIALCOM), 2013, : 558 - 563
  • [10] Reputation-based trust management
    Shmatikov, Vitaly
    Talcott, Carolyn
    JOURNAL OF COMPUTER SECURITY, 2005, 13 (01) : 167 - 190