DocumentCode
58994
Title
Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks
Author
Xiaohui Liang ; Xiaodong Lin ; Shen, Xuemin Sherman
Author_Institution
Dept. of Electr. & Comput. Eng., Univ. of Waterloo, Waterloo, ON, Canada
Volume
25
Issue
2
fYear
2014
fDate
Feb. 2014
Firstpage
310
Lastpage
320
Abstract
In this paper, we propose a Trustworthy Service Evaluation (TSE) system to enable users to share service reviews in service-oriented mobile social networks (S-MSNs). Each service provider independently maintains a TSE for itself, which collects and stores users´ reviews about its services without requiring any third trusted authority. The service reviews can then be made available to interested users in making wise service selection decisions. We identify three unique service review attacks, i.e., linkability, rejection, and modification attacks, and develop sophisticated security mechanisms for the TSE to deal with these attacks. Specifically, the basic TSE (bTSE) enables users to distributedly and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It restricts the service providers to reject, modify, or delete the reviews. Thus, the integrity and authenticity of reviews are improved. Further, we extend the bTSE to a Sybil-resisted TSE (SrTSE) to enable the detection of two typical sybil attacks. In the SrTSE, if a user generates multiple reviews toward a vendor in a predefined time slot with different pseudonyms, the real identity of that user will be revealed. Through security analysis and numerical results, we show that the bTSE and the SrTSE effectively resist the service review attacks and the SrTSE additionally detects the sybil attacks in an efficient manner. Through performance evaluation, we show that the bTSE achieves better performance in terms of submission rate and delay than a service review system that does not adopt user cooperation.
Keywords
digital signatures; mobile computing; service-oriented architecture; social networking (online); trusted computing; S-MSN; SrTSE; aggregate signature techniques; bTSE; basic TSE; hierarchical signature techniques; linkability attacks; modification attacks; pseudonyms; rejection attacks; security analysis; service review attacks; service selection decisions; service-oriented mobile social networks; sophisticated security mechanisms; sybil attacks; sybil-resisted TSE; trustworthy service evaluation; Aggregates; Delay; Mobile communication; Resists; Security; Social network services; Wireless communication; Aggregates; Delay; Mobile communication; Mobile social networks; Resists; Security; Social network services; Wireless communication; distributed system; sybil attack; trust evaluation;
fLanguage
English
Journal_Title
Parallel and Distributed Systems, IEEE Transactions on
Publisher
ieee
ISSN
1045-9219
Type
jour
DOI
10.1109/TPDS.2013.37
Filename
6463403
Link To Document