• Title/Summary/Keyword: user reputation

Search Result 69, Processing Time 0.021 seconds

A New Reputation System for Reducing the Liars in P2P (P2P에서 Liar 감소를 위한 새로운 평판 시스템)

  • Shin, Jung-Hwa;Rhee, Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.13A no.7 s.104
    • /
    • pp.599-606
    • /
    • 2006
  • As the P2P service does not have any administration authorities that are able to manage the behavior of participants and control the malicious users, malicious user can give harm to legitimate users for the benefit of themselves. To perform the secure transaction with new members who did not have past experiences on transaction, service users can differentiate malicious users and legitimate users by referring to the reputation information that provided by users having past experience. However, users can intentionally give false evaluation to other users on Performed transaction. We call these users as 'liar'. In this Paper, we propose a new reputation system for liar reduction to guarantee an accuracy on reputation information.

Personal Information Disclosure Control in Context-aware Healthcare Applications (컨텍스트 인식 헬스케어 어플리케이션을 위한 개인화된 정보 공개 기법)

  • Rashid, Umar;Choi, Ah-Young;Woo, Woon-Tack
    • 한국HCI학회:학술대회논문집
    • /
    • 2006.02a
    • /
    • pp.970-975
    • /
    • 2006
  • There is a tradeoff between user's privacy and utility of context-aware services in ubiquitous computing environments. Many privacy models have been proposed to support the disclosure of personal information at different levels of detail, in ubiquitous computing environments. However, most of these models do not allow for explicit criteria to assess the benefit users are likely to reap by disclosing their personal information. In this paper, we propose an automated decision making mechanism that evaluates the "benefit of disclosure" for the users based on trust relationships between users and information requesters and manages the disclosure of user's personal information accordingly. Unlike other trust models, we do not regard the reputation of an information requester as sufficient to determine his/her trustworthiness. Instead, we represent trustworthiness as a function of information requester's reputation in the eyes of the user and his/her competence in a given context. To validate our mechanism, we apply it to context-aware healthcare application that monitors physiological condition of a user.

  • PDF

A Study on the Design and the Performance Improvement of TCP User Authentication ECC Algorithm Protocol for Mobile terminal (이동단말을 위한 TCP 사용자 인증 타원곡선 알고리즘 프로토콜의 설계 및 성능 개선에 관한 연구)

  • 임승린;박대우
    • Journal of the Korea Society of Computer and Information
    • /
    • v.9 no.2
    • /
    • pp.7-17
    • /
    • 2004
  • It requires that user have to verify and conform with user authentication Protocol on non-meet face to face internet services offered by mobile terminal which user make known user's own intention, and user be using the normal. It is more operation time authentication protocol than Access control Protocol. That is what need to be user authentication protocol have verified security. non-reputation, and improved high-performance in operation time for mobile terminal. In order to solve the above demand, in this paper, we would design for mobile terminal of TCP User Authentication ECC Algorithm Protocol with a performance test. Algorithm has 160 bit key and designed IPv4 & IPv6 frame architecture. We should conclude that the proposed protocol have more verified security, non-reputation, confidentiality, and improved high-performance in operation time of mobile terminal from 1 to 17 times than before.

  • PDF

An Access Control using Reputation Information in P2P File Sharing System (P2P 파일 공유 시스템에서 평판 정보를 이용한 접근 제어)

  • Shin Jung-Hwa;Shin Weon;Rhee Kyung-Hyune
    • The KIPS Transactions:PartA
    • /
    • v.12A no.6 s.96
    • /
    • pp.493-498
    • /
    • 2005
  • P2P service is a method that can share various information through direct connection between computer of a person who have information and a Person who have information without server in the Internet and it is getting a lot of popularity by method for free ex change of file. P2P file sharing systems have become popular as a new paradigm for information exchange. Because all users who use service in P2P file sharing system can use shared files of several users freely by equal access privilege, it is happening the 'free rider' that only download shared file of other users without share own files. Although a user share a malicious file including virus, worm or file that have title differing with actuality contents, can use file sharing service without limitation. In this paper, we propose a method that restrict access of 'free rider' that only download using reputation information that indicate reliability of user. Also, we restrict usage ons hared file of other users about users who share harmful file.

An Intimacy-based Trust Reasoning Method for Intelligent Ecommerce Systems (지능형 전자 상거래 시스템 구축을 위한 친밀도 기반 신뢰도 추론방법)

  • Kwon, Ohbyung;Park, Kwangho
    • The Journal of Society for e-Business Studies
    • /
    • v.18 no.2
    • /
    • pp.1-26
    • /
    • 2013
  • Estimating levels of user trust is important for maintaining continuous use of e-commerce systems because trust alleviates user concerns about the invisibility of service providers or their reputation. Conventional trust estimation approaches such as policy-and reputationbased reasoning have focused on the experience of e-commerce systems at an early stage. However, only a few trust reasoning methods have considered the mature stage, which is more related to continuance intention. We propose a trust reasoning method dedicated to the mature stage of using e-commerce systems. In particular, a new method of unobtrusively estimating the degree of user intimacy is developed, because intimacy has been highly associated with trust as well as reputation. Our experiments show that the proposed method is valid and can be used in conjunction with reputation-based trust reasoning.

Palliates the Attack by Hacker of Android Application through UID and Antimalware Cloud Computing

  • Zamani, Abu Sarwar;Ahmad, Sultan;Uddin, Mohammed Yousuf;Ansari, Asrar Ahmad;Akhtar, Shagufta
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.8
    • /
    • pp.182-186
    • /
    • 2021
  • The market for smart phones has been booming in the past few years. There are now over 400,000 applications on the Android market. Over 10 billion Android applications have been downloaded from the Android market. Due to the Android popularity, there are now a large number of malicious vendors targeting the platform. Many honest end users are being successfully hacked on a regular basis. In this work, a cloud based reputation security model has been proposed as a solution which greatly mitigates the malicious attacks targeting the Android market. Our security solution takes advantage of the fact that each application in the android platform is assigned a unique user id (UID). Our solution stores the reputation of Android applications in an anti-malware providers' cloud (AM Cloud). The experimental results witness that the proposed model could well identify the reputation index of a given application and hence its potential of being risky or not.

The Influence of Online Information on a Consumer's Purchase at Social Commerce Websites (온라인 정보가 소셜커머스 구매에 미치는 영향)

  • Kim, Jin Baek
    • Informatization Policy
    • /
    • v.21 no.4
    • /
    • pp.40-58
    • /
    • 2014
  • This study investigated how online information affected consumers' purchases at social commerce websites. In the online purchase process, consumers use two types of online information: user generated content(UGC) and vendor generated content(VGC). These information types may influence consumers'purchase intention differently because each information builds entity trust and content trust, which play mediation roles between online information and purchase intention. According to the analysis results, general transactional information and safe transaction information of VGC and reputation information of UGC significantly affected entity trust. But content trust was affected only from general transactional information of VGC. And entity trust significantly affected content trust as well as purchase intention. These findings imply that social commerce vendors should focus mainly on entity trust for enhancing consumers' purchase intention. To achieve this objective, in the short term perspective, they should endeavor how to enhance general transaction information and safe transaction information qualities because these information types are easily controlled and improved by vendors. In the long term perspective, they should focus on reputation formation because reputation takes long time.

An Empirical Study on the Determinants of Trust in Internet Shopping Mall : The Comparison of Korean and Chinese Users (인터넷 쇼핑몰의 신뢰 결정요인에 관한 실증연구 : 한.중국 이용자 비교 분석)

  • Jung, Chul-Ho;Chung, Young-Soo
    • Proceedings of the Korea Society of Information Technology Applications Conference
    • /
    • 2006.06a
    • /
    • pp.437-462
    • /
    • 2006
  • The objective of this study is to investigate what factors influence a major role in building trust on Internet shopping mall and to examine whether these factors on trust have differences between Korean and Chinese users. Based on relevant literature review, this study posits six factors of transaction security, perceived reputation, Perceived size, interactivity, propensity of trust, and familiarity as key determinants of trust in internet shopping mall. Analysis of 470 responses(Korean: 320 users, Chinese: 150 users) of survey questionnaire indicates the following; First, in terms of the relationship between influencing factors and the trust, five factors of transaction security, perceived reputation, perceived size, interactivity, and propensity to trust have a significant positive effects on the trust. Second, the differences between Korean and Chinese users are transaction security, perceived size, and familiarity. In conclusions, we suggested the factors to create user trust in internet shopping mall. Also we suggested differences in the determinant factors between Korean and Chinese users, and discussed some policies to build the trust in each user types.

  • PDF

A Study on Prediction Reputation System for Prevention of SPIT (SPIT 차단을 위한 예측 평판도 기법에 대한 연구)

  • Bae, Kwang-Yong;Lee, Jae-Eun;Kim, Young-Beom
    • Journal of the Institute of Electronics and Information Engineers
    • /
    • v.50 no.2
    • /
    • pp.152-160
    • /
    • 2013
  • This paper proposes a prediction reputation system for the anti-SPIT solution in real-time VoIP environment. The existing schemes need to get the user's feedback and/or have experienced the time delay and overload as session initiates due to real-time operation. To solve these problems, the proposed scheme predicts the reputation through the statistical analysis based on the period of session initiation of each caller and the call duration of each receiver. As per the second mentioned problem, this scheme performs the prediction before session initiation, therefore, it's proper for real-time VoIP environment.

A Study on the Factors Influencing Repurchase Intention in Social Commerce (공동구매형 소셜 커머스의 재구매의도에 영향을 미치는 요인에 관한 연구)

  • Wang, Yu;Kwon, Sun-Dong
    • Journal of Information Technology Applications and Management
    • /
    • v.19 no.4
    • /
    • pp.137-152
    • /
    • 2012
  • As social media such as facebook and twitter is widespread, social commerce appears as a new way of e-commerce. Social commerce is a subset of electronic commerce that involves using social media that supports social interaction and user contributions. From the understanding of social commerce and literature review, we deduced the research model that relationship, collectivism, convenience, usefulness, low price, reputation, and rapidness have influence on satisfaction and repurchase intention. As a result of data analysis, relationship, convenience, usefulness, low price, and rapidness had influence on satisfaction and repurchase intention. And collectivism had influence on relationship. But reputation did not have influence on satisfaction. The focus of this study is on the effect of relationship and collectivism on satisfaction and repurchase, because relationship and collectivism is the major feature of social commerce. Succinctly speaking, collectivism affects relationship among users, in turn, relationship affects satisfaction and repurchase intention. This study gives a contribution to business. Business related with social commerce has to make a business strategy for managing relationship and consider collectivism tendency for selecting target customer.