Two Schemes of Privacy-Preserving Trust Evaluation

Zheng Yan*, Wenxiu Ding, Valtteri Niemi, Athanasios V. Vasilakos

*Corresponding author for this work

    Research output: Contribution to journalArticleScientificpeer-review

    59 Citations (Scopus)

    Abstract

    Trust evaluation computes trust values by collecting and processing trust evidence. It plays an important role in trust management that automatically ensures trust relationships among system entities and enhances system security. But trust evidence collection and process may cause privacy leakage, which makes involved entities reluctant to provide personal evidence that is essential for trust evaluation. Current literature pays little attention to Privacy-Preserving Trust Evaluation (PPTE). Existing work still has many limitations, especially on generality, efficiency and reliability. In this paper, we propose two practical schemes to guard privacy of trust evidence providers based on additive homomorphic encryption in order to support a traditional class of trust evaluation that contains evidence summation. The first scheme achieves better computational efficiency, while the second one provides greater security at the expense of a higher computational cost. Accordingly, two trust evaluation algorithms are further proposed to flexibly support different application cases. Specifically, these algorithms can overcome attacks raised by internal malicious evidence providers to some extent even though the trust evaluation is partially performed in an encrypted form. Extensive analysis and performance evaluation show the security and effectivity of our schemes for potential application prospect and their efficiency to support big data process.

    Original languageEnglish
    Pages (from-to)175–189
    Number of pages15
    JournalFuture Generation Computer Systems: The International Journal of Grid Computing: Theory Methods and Applications
    Volume62
    DOIs
    Publication statusPublished - 2016
    MoE publication typeA1 Journal article-refereed

    Keywords

    • Big data
    • Homomorphic encryption
    • Privacy preservation
    • Secure multiparty computation
    • Trust evaluation

    Fingerprint

    Dive into the research topics of 'Two Schemes of Privacy-Preserving Trust Evaluation'. Together they form a unique fingerprint.

    Cite this