• DocumentCode
    58994
  • Title

    Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks

  • Author

    Xiaohui Liang ; Xiaodong Lin ; Shen, Xuemin Sherman

  • Author_Institution
    Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
  • Volume
    25
  • Issue
    2
  • fYear
    2014
  • fDate
    Feb. 2014
  • Firstpage
    310
  • Lastpage
    320
  • Abstract
    In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores users´ reviews about its services without requiring any third trusted authority. The service reviews can then be made available to interested users in making wise service selection decisions. We identify three unique service review attacks, i.e., linkability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basic TSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, we extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Through security analysis and numerical results, we show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the sybil attacks in an efficient manner. Through performance evaluation, we show that the bTSE achieves better performance in terms of submission rate and delay than a service review system that does not adopt user cooperation.
  • Keywords
    digital signatures; mobile computing; service-oriented architecture; social networking (online); trusted computing; S-MSN; SrTSE; aggregate signature techniques; bTSE; basic TSE; hierarchical signature techniques; linkability attacks; modification attacks; pseudonyms; rejection attacks; security analysis; service review attacks; service selection decisions; service-oriented mobile social networks; sophisticated security mechanisms; sybil attacks; sybil-resisted TSE; trustworthy service evaluation; Aggregates; Delay; Mobile communication; Resists; Security; Social network services; Wireless communication; Aggregates; Delay; Mobile communication; Mobile social networks; Resists; Security; Social network services; Wireless communication; distributed system; sybil attack; trust evaluation;
  • fLanguage
    English
  • Journal_Title
    Parallel and Distributed Systems, IEEE Transactions on
  • Publisher
    ieee
  • ISSN
    1045-9219
  • Type

    jour

  • DOI
    10.1109/TPDS.2013.37
  • Filename
    6463403