Reputation-Based Collusion Detection with Majority of Colluders

被引:0
|
作者
Hur, Junbeom [1 ]
Guo, Mengxue [2 ]
Park, Younsoo [2 ]
Lee, Chan-Gun [2 ]
Park, Ho-Hyun [2 ]
机构
[1] Korea Univ, Seoul 02841, South Korea
[2] Chung Ang Univ, Seoul 06974, South Korea
来源
基金
新加坡国家研究基金会;
关键词
cloud computing; collusion detection; majority voting; reputation; SABOTAGE-TOLERANCE; SYSTEM;
D O I
10.1587/transinf.2015EDP7318
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The reputation-based majority-voting approach is a promising solution for detecting malicious workers in a cloud system. However, this approach has a drawback in that it can detect malicious workers only when the number of colluders make up no more than half of all workers. In this paper, we simulate the behavior of a reputation-based method and mathematically analyze its accuracy. Through the analysis, we observe that, regardless of the number of colluders and their collusion probability, if the reputation value of a group is significantly different from those of other groups, it is a completely honest group. Based on the analysis result, we propose a new method for distinguishing honest workers from colluders even when the colluders make up the majority group. The proposed method constructs groups based on their reputations. A group with the significantly highest or lowest reputation value is considered a completely honest group. Otherwise, honest workers are mixed together with colluders in a group. The proposed method accurately identifies honest workers even in a mixed group by comparing each voting result one by one. The results of a security analysis and an experiment show that our method can identify honest workers much more accurately than a traditional reputation-based approach with little additional computational overhead.
引用
收藏
页码:1822 / 1835
页数:14
相关论文
共 50 条
  • [21] REPUTATION-BASED COLLABORATIVE NETWORK BIOLOGY
    Binder, Jean
    Boue, Stephanie
    Di Fabio, Anselmo
    Fields, R. Brett
    Hayes, William
    Hoeng, Julia
    Park, Jennifer S.
    Peitsch, Manuel C.
    PACIFIC SYMPOSIUM ON BIOCOMPUTING 2015 (PSB), 2015, : 270 - 281
  • [22] Reputation-based semantic service discovery
    Majithia, S
    Ali, AS
    Rana, OF
    Walker, DW
    THIRTEENTH IEEE INTERNATIONAL WORKSHOPS ON ENABLING TECHNOLOGIES: INFRASTRUCTURE FOR COLLABORATIVE ENTERPRISES, PROCEEDINGS, 2004, : 297 - 302
  • [23] Reputation-based pricing and price improvements
    Desgranges, Gabriel
    Foucault, Thierry
    JOURNAL OF ECONOMICS AND BUSINESS, 2005, 57 (06) : 493 - 527
  • [24] Study of Reputation-based Trust Management
    Cao Yonghui
    EBM 2010: INTERNATIONAL CONFERENCE ON ENGINEERING AND BUSINESS MANAGEMENT, VOLS 1-8, 2010, : 1132 - 1135
  • [25] A Reputation-based Service Selection Scheme
    Wang, Ping
    Cha, Kuo-Ming
    Lo, Chi-Chun
    Farmer, Ray
    Kuo, Pu-Tsun
    ICEBE 2009: IEEE INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING, PROCEEDINGS, 2009, : 501 - 506
  • [26] Detection of Collusion Behaviors in Online Reputation Systems
    Liu, Yuhong
    Yang, Yafei
    Sun, Yan Lindsay
    2008 42ND ASILOMAR CONFERENCE ON SIGNALS, SYSTEMS AND COMPUTERS, VOLS 1-4, 2008, : 1368 - 1372
  • [27] A Reputation-Based Method for Detection of Attacks in Virtual Coordinate Based Wireless Sensor Networks
    Bose, Divyanka
    Jayasumana, Anura P.
    40TH ANNUAL IEEE CONFERENCE ON LOCAL COMPUTER NETWORKS (LCN 2015), 2015, : 486 - 489
  • [28] Reputation-based network bandwidth allocation mechanism
    Liao, Xinkao
    Wang, Lisheng
    Journal of Information and Computational Science, 2015, 12 (01): : 247 - 254
  • [29] Reputation-based trust in wireless sensor networks
    Chen, Haiguang
    Wu, Huafeng
    Zhou, Xi
    Gao, Chuanshan
    MUE: 2007 INTERNATIONAL CONFERENCE ON MULTIMEDIA AND UBIQUITOUS ENGINEERING, PROCEEDINGS, 2007, : 603 - +
  • [30] Shades of Grey: On the effectiveness of reputation-based "blacklists"
    Sinha, Sushant
    Bailey, Michael
    Jahanian, Farnam
    MALWARE 2008: Proceedings of the 2008 3rd International Conference on Malicious and Unwanted Software, 2008, : 65 - 72