Two Schemes of Privacy-Preserving Trust Evaluation

Zheng Yan*, Wenxiu Ding, Valtteri Niemi, Athanasios V. Vasilakos

*Corresponding author for this work

Research output: Contribution to journalArticleScientificpeer-review

49 Citations (Scopus)


Trust evaluation computes trust values by collecting and processing trust evidence. It plays an important role in trust management that automatically ensures trust relationships among system entities and enhances system security. But trust evidence collection and process may cause privacy leakage, which makes involved entities reluctant to provide personal evidence that is essential for trust evaluation. Current literature pays little attention to Privacy-Preserving Trust Evaluation (PPTE). Existing work still has many limitations, especially on generality, efficiency and reliability. In this paper, we propose two practical schemes to guard privacy of trust evidence providers based on additive homomorphic encryption in order to support a traditional class of trust evaluation that contains evidence summation. The first scheme achieves better computational efficiency, while the second one provides greater security at the expense of a higher computational cost. Accordingly, two trust evaluation algorithms are further proposed to flexibly support different application cases. Specifically, these algorithms can overcome attacks raised by internal malicious evidence providers to some extent even though the trust evaluation is partially performed in an encrypted form. Extensive analysis and performance evaluation show the security and effectivity of our schemes for potential application prospect and their efficiency to support big data process.

Original languageEnglish
Pages (from-to)175–189
Number of pages15
JournalFuture Generation Computer Systems: the international journal of grid computing and escience
Publication statusPublished - 2016
MoE publication typeA1 Journal article-refereed


  • Big data
  • Homomorphic encryption
  • Privacy preservation
  • Secure multiparty computation
  • Trust evaluation


Dive into the research topics of 'Two Schemes of Privacy-Preserving Trust Evaluation'. Together they form a unique fingerprint.

Cite this