Two Schemes of Privacy-Preserving Trust Evaluation
Trust evaluation computes trust values by collecting and processing trust evidence. It plays an important role in trust management that automatically ensures trust relationships among system entities and enhances system security. But trust evidence collection and process may cause privacy leakage, w...
Saved in:
Published in | Future generation computer systems Vol. 62; pp. 175 - 189 |
---|---|
Main Authors | , , , |
Format | Journal Article |
Language | English |
Published |
Elsevier B.V
01.09.2016
|
Subjects | |
Online Access | Get full text |
Cover
Loading…
Summary: | Trust evaluation computes trust values by collecting and processing trust evidence. It plays an important role in trust management that automatically ensures trust relationships among system entities and enhances system security. But trust evidence collection and process may cause privacy leakage, which makes involved entities reluctant to provide personal evidence that is essential for trust evaluation. Current literature pays little attention to Privacy-Preserving Trust Evaluation (PPTE). Existing work still has many limitations, especially on generality, efficiency and reliability. In this paper, we propose two practical schemes to guard privacy of trust evidence providers based on additive homomorphic encryption in order to support a traditional class of trust evaluation that contains evidence summation. The first scheme achieves better computational efficiency, while the second one provides greater security at the expense of a higher computational cost. Accordingly, two trust evaluation algorithms are further proposed to flexibly support different application cases. Specifically, these algorithms can overcome attacks raised by internal malicious evidence providers to some extent even though the trust evaluation is partially performed in an encrypted form. Extensive analysis and performance evaluation show the security and effectivity of our schemes for potential application prospect and their efficiency to support big data process.
•Two security schemes for Privacy-Preserving Trust Evaluation (PPTE).•Trust evaluation algorithms cooperating with the PPTE schemes to resist internal attacks.•Security and performance proof of two PPTE schemes through analysis and implementation.•Feasibility to support various scenarios with either small or big evidence data. |
---|---|
ISSN: | 0167-739X 1872-7115 1872-7115 |
DOI: | 10.1016/j.future.2015.11.006 |