Data Mining Application: Attack Resistant Trust Metrics

Exploring the Applications of Attack Resistant Trust Metrics

Authors

  • Mrs. Aparna Junnarkar Author
  • Dr. Udai Sutar Author
  • Mr. Amol Rajmane Author

Keywords:

data mining, trust metrics, scalar assumption, group assumption, quantitative framework, attack resistance, optimum, theoretical upper bounds, real world deployment, Advogato website, distributed name server, metadata verification, peer-to-peer networks, music sharing systems, spam resistant e-mail delivery

Abstract

This Dissertation characterizes the space of trust metrics, under both the scalar assumption where each assertion is evaluated independently, and the group assumption where a group of assertions are evaluated in tandem. We present a quantitative framework for evaluating the attack resistance of trust metrics,and give examples of trust metrics that are within a small factor of optimum compared to theoretical upper bounds. We discuss experiences with a real world deployment of a group trust metric, the Advogato website. Finally, we explore possible applications of attack resistant trust metrics, including using it as to build a distributed name server, verifying metadata in peer-to-peer networks such as music sharing systems, and a proposal for highly spam resistant e-mail delivery.

Downloads

Download data is not yet available.

Downloads

Published

2012-02-01