DocumentCode :
652242
Title :
Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants
Author :
Englert, Burkhard ; Gheissari, Reza
Author_Institution :
Dept. of Comput. Sci., California State Univ. Long Beach, Long Beach, CA, USA
fYear :
2013
fDate :
16-18 July 2013
Firstpage :
895
Lastpage :
902
Abstract :
We study the polling problem in a social network and present a private and precise n-ary voting protocol. We assume that members are concerned about their reputation in the sense that they do not want their votes to be disclosed and their potentially malicious actions to become public. Our protocol neither requires a central authority, strong cryptography, nor a randomization mechanism, using a simple secret sharing scheme and verification procedures to accurately determine the result of each poll. Our scalable protocol expands on the binary polling protocol by Guerraoui, Huguenin, Kermarrec and Monod and enables deterministic n-ary voting without significantly increasing the complexity of the protocol while preserving optimal voter privacy, allowing nodes to abstain from a poll--assuming honest nodes--and tabulating exact poll results. Misbehaving nodes are exposed with a non-zero probability and the probability of dishonest members violating voter privacy is balanced by their impact on the accuracy of the result. Limiting the number of dishonest nodes (B) such that they do not constitute a majority in any two consecutive groups of nodes and using a privacy parameter k, the impact of colluding malicious nodes is bounded by (2nk-k+1)B for any one element of the global tally and significantly less for all successive elements. Further, our algorithm improves on prior algorithms and ensures that voter privacy is optimally protected and that in the worst case, a node´s vote is only compromised with probability (Bi/nk+1)k+1.
Keywords :
cryptographic protocols; data protection; distributed algorithms; probability; social networking (online); binary polling protocol; colluding malicious nodes; deterministic n-ary voting protocol; dishonest members; dishonest nodes; global tally element; honest nodes; malicious actions; misbehaving nodes; multivalued-deterministic peer-to-peer polling; nonzero probability; optimal voter privacy preservation; optimally protected voter privacy parameter; poll result tabulation; reputation conscious participants; secret sharing scheme; social networks; verification procedures; voter privacy violation probability; Arrays; Cryptography; Peer-to-peer computing; Privacy; Protocols; Radiation detectors; Social network services; Accuracy; Distributed Algorithm; Polling; Privacy; Social Networks;
fLanguage :
English
Publisher :
ieee
Conference_Titel :
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location :
Melbourne, VIC
Type :
conf
DOI :
10.1109/TrustCom.2013.109
Filename :
6680929
Link To Document :
بازگشت