International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016 Empowering Trustworthy Valuation of Reviews in Service-oriented Social networks Divya J Laxmi V Dept of ISE, BNM Institute of Technology, Bengaluru , India. Assistant Professor, Dept of ISE, BNM Institute of Technology, Bengaluru , India. Abstract— The Trustworthy Service Evaluation (TSE) system allows users to share service reviews in serviceoriented social networks. With the third trusted authority each service provider maintains a TSE to collects and stores the reviews about its service and these reviews are made available to the interested users in making the right service selection. The three types of service review attacks, i.e., linkability, rejection, and modification attacks, and two types of Sybil attacks, type 1 attacked by a group of registered users and type 2 is launched by service provider and a group of registered users are identified. The basic TSE (bTSE) system uses MD5 algorithm to prevent the service providers from rejecting, modifying, or deleting the reviews and therefore sustaining the integrity and authenticity of the reviews. Each user is provided with a token before submitting a review and user with token is only allowed to submit the review. The system uses the RSA algorithm to generate the token. If a user shares a multiple reviews in a particular time slot for a service provider, the real identity of that user will be reported and the user is blocked. Thus, by using bTSE systems the review attacks and Sybil attacks are efficiently resisted. Keywords— Social network; Sybil attacks; review attacks. I. INTRODUCTION The interests of the local service providers are serving the users in close geographic region on the grounds that most user’s select services based on the comparison of the service quality. In the social networks, to build up the trust relations between the service providers and the users is significant. A service provider is more likely to be chosen by the users based on the high reputation. However, social networks are autonomous and distributed networks where no third trusted authority exists for bootstrapping the trust relations. Therefore, for the users in the service-oriented social networks, how to ensure the trust evaluation of the service providers is a challenging problem. Trustworthy service evaluation (TSE) systems enable service providers or any third trusted authority to receive user feedback, known as service reviews or simply reviews, such as compliments and complaints about their services [1]. By utilizing the TSE, the service providers study the service experiences of the users and can enhance their administration technique in time. In addition, the collected reviews can be made available to the public, which enhances service advertising and assists the users in making ISSN: 2231-5381 wise service selections. The TSE is often maintained by a third trusted authority that is trusted to host authentic reviews. Popular TSE can be found in web based social networks such as Facebook and online stores like eBay. They are important marketing tools for service providers who target the global market. The TSE is moved into the service-oriented social networks settings. It requires service providers to maintain the TSE by themselves. The possible malicious behaviours conducted by the service providers and the users are studied. In the TSE, the vendor stores and disseminates service information to the users. The adoption of the TSE is subject to vendors’ own decisions. However, the users expect to read comprehensive and authentic reviews of services, and this expectation makes vendors who support the TSE appear more attractive than the others. Without in-network third trusted authorities in the service-oriented social networks, vendors are required to manage reviews for themselves. This requirement brings unique security problems to the review submission process. For example, vendors may reject or delete negative reviews and insert forged positive ones, and the malicious users can leave false negative reviews or drop the reviews from others to decrease the reputation of some particular vendors. In the design of the TSE for the service-oriented social networks, security mechanisms must be included to resist these attacks. Notorious Sybil attacks also cause huge damage to the effectiveness of the TSE. On the other hand, in trust systems like the TSE, if users abuse their pseudonyms to leave reviews toward a vendor, the reputation of the vendor can be easily increased or decreased. Even if a trusted authority later identifies the malicious behaviour, the detection delay cannot be tolerated in the TSE. It is necessary to tackle how to resist the Sybil attacks and guarantee both review integrity and review authenticity in the design of the TSE for the service-oriented social networks. II. LITERATURE SURVEY D. Quercia and S. Hailes[2] proposed a collaborative applications for co-located mobile users can be severely disrupted by a sybil attack to the point of being unusable. Existing decentralized defenses have largely been designed for peer-to-peer networks but not for mobile networks. That is why we propose a new decentralized defense for portable devices and call it MobID. The idea is that a device manages two small networks in which it stores information about the devices it meets: its network of friends contains honest devices, and its network of foes contains suspicious devices. By reasoning on these two networks, the device is then able to determine whether an unknown individual is carrying out a sybil attack or not. The extent to which MobID reduces the number of interactions with sybil http://www.ijettjournal.org Page 118 International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016 attackers and consequently enables collaborative applications is evaluated. X. Liang, X. Li, R. Lu, X. Lin[3] proposed a Secure and Efficient service Review (SEER) system to enable user feedback in service-oriented mobile social networks (SMSNs). Each service provider independently maintains a SEER system for itself, which collects and stores user reviews about its services without requiring any central trusted authority. The service reviews can then be made available to interested users in making wise service selection decisions. The three unique service review attacks are identified and then develop sophisticated security mechanisms for SEER to deal with these attacks. Specifically, SEER enables users to distributed and cooperatively submit their reviews in an integrated chain form by using hierarchical and aggregate signature techniques. It discourages service providers to reject, modify or delete their reviews. Das and Islam [4] introduced a dynamic model computing confidence to address strategic behaviour alteration of malicious agents. W. Dong, V. Dave, L. Qiu, and Y. Zhang has enabled mobile to submit their views to a local dealer maintained by the system, where opinions represent the results of the evaluation to the services of a seller users. It believes that the malicious behaviour by the supplier and users, including attacks revision and Sybil attacks[4], [5]. Instead of using an additional monitor device at the site of the seller, explore cooperative efforts of users and use efficient techniques based on cryptography to increase SR, SD reduce and mitigate the impact of malicious behaviour. Distributed systems are vulnerable to Sybil attacks where an adversary manipulates false identities or pseudonyms abuse jeopardizes the effectiveness of the systems. For example, peer-to-peer, Douceur [6] indicated that the Sybil attacks can compromise the redundancy of distributed storage systems. In sensor networks, Karloff and Wagner [7] showed that the Sybil attacks can damage the routing efficiency. Lu et al. [8] proposed a mechanism for efficient detection of double registration, which can be done to mitigate potential attacks Sybil. The Sybil attacks on social networks have attracted much attention recently [9], [10]. In social networks, Wei et al. [11] mentions the existence of a trusted authority can mitigate the effect of Sybil attacks, but considers that these requirements impose additional burdens on users is not acceptable. The Sybil attacks in the S-MSN, where registered users can legally apply for multiple pseudonyms and alternatively use pseudonyms to preserve their identity and location privacy [5]. Meanwhile, the lack of authority in the third network of trust makes it very difficult to detect Sybil attacks. It identifies two typical types of Sybil attacks, which are proposed to a pseudonym sophisticated design and build the SrTSE based bTSE [11] to resist two Sybil attacks. Review attack 1. Review linkability attack is executed by malicious users, who claim to be members of a specific group, but disable the group authority to trace the review back to its unique identity, thus breaking review linkability. Review attack 2. Review rejection attack is launched by the vendor when a user submits a negative review to it. In the attack, the vendor drops the review silently without responding to the submission request from the user, and hides public opinions and mislead users. Review attack 3. Review modification attack is performed by the vendor toward locally stored review collections. The vendor inserts forged complimentary reviews, or modifies negative reviews in a review collection. Such attacks aim at false advertising by breaking review integrity and influencing user behaviours. The sybil attacks can be easily performed in the TSE as follows: Sybil attack 1. Such an attack is launched by malicious users: One registered user leaves multiple reviews toward a vendor in a time slot, where the reviews are false and negative to the service. Sybil attack 2. Such an attack is launched by malicious vendors with colluded users: A malicious vendor asks one registered user to leave multiple reviews toward itself in a time slot, where the reviews are positive to the service. The above two sybil attacks produce inaccurate information, which is unfair to either vendors or users, and disrupt the effectiveness of the TSE. To this end, we propose another security mechanism to effectively resist the sybil attacks by limiting each user to generate only one review toward a vendor. If any user generates two or more than two reviews with different pseudonyms toward a vendor in a time slot, its real identity will be exposed to the public. IV. DESIGN OF bTSE In the bTSE, a user, after being serviced by the vendor, submits a review to the vendor, which then stores the review in its local repository. During review submission, data integrity, authenticity, and non repudiation can be obtained by directly applying traditional cryptography technique such as hashing on review content However, it is challenging to resist the three review attacks and the two sybil attacks introduced in Section III. III. PROBLEM STATEMENT The user is allowed to share a review about service vendor after receiving its services and all the reviews are maintained in Trustworthy Service Evaluation (TSE). The TSE systems are managed by the service provider or the third trusted party. The TSE maintained by the vendors are vulnerable to review attacks and sybil attacks since there is no security mechanism for the TSE systems. The various malicious attacks that aim especially at the TSE are described below. ISSN: 2231-5381 Figure 1. System Architecture The Admin is the third trusted party. The admin adds the various services provided by the service vendors. After adding the services, the admin uploads the services to the http://www.ijettjournal.org Page 119 International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016 database. These services are then made available for the registered users to write the reviews. The admin uploads the services; the user can use these services. Then the user can share his opinion regarding the services. This feedback is also stored in the database. The user requests the admin for the token to share the feedback. The admin generates the one time transaction token and sends token to the user through mail. The token is generated using the RSA algorithm. The user retrieves the token from the mail and writes the feedback using the token and then submits it, which is stored in the database. For each service a user can write the feedback only once. The system architecture is shown in the Figure 1. The MD5 algorithm is applied on reviews to provide integrity. So if the vendor attempts to perform the attacks on the reviews will be identified as an attacker. The user allowed submitting the review only if the token is valid, thus it prevents user to leave multiple reviews towards the service providers. A.Token generation The keys for the RSA algorithm are generated the following way: 1.Choose two distinct prime numbers p and q. For security purposes, the integers p and q should be chosen at random, and should be similar in magnitude but 'differ in length by a few digits to make factoring harder. Prime integers can be efficiently found using a primality test. 2.Compute n = pq. n is used as the modulus for both the public and private keys. Its length, usually expressed in bits, is the key length. 3.Compute φ(n) = φ(p)φ(q) = (p − 1)(q − 1) = n − (p + q − 1), where φ is Euler's totient function. This value is kept private. 4.Choose an integer e such that 1 < e < φ(n) and gcd(e, φ(n)) = 1; i.e., e and φ(n) are coprime. 5.Determine d as d ≡ e−1 (mod φ(n)); i.e., d is the modular multiplicative inverse of e (modulo φ(n)) This is more clearly stated as: solve for d given d⋅e ≡ 1 (mod φ(n)) e having a short bit-length and small Hamming weight results in more efficient encryption – most commonly 216 + 1 = 65,537. However, much smaller values of e (such as 3) have been shown to be less secure in some settings. e is released as the public key exponent. d is kept as the private key exponent. The public key consists of the modulus n and the public (or encryption) exponent e. The private key consists of the modulus n and the private (or decryption) exponent d, which must be kept secret. p, q, and φ(n) must also be kept secret because they can be used to calculate d. An alternative, used by PKCS#1, is to choose d matching de ≡ 1 (mod λ) with λ = lcm(p − 1, q − 1), where lcm is the least common multiple. Using λ instead of φ(n) allows more choices for d. λ can also be defined using the Carmichael function, λ(n). Since any common factors of (p − 1) and (q − 1) are present in the factorization of pq − 1,it is recommended that (p − 1) and (q − 1) have only very small common factors, if any besides the necessary 2. B. MD5 ALGORITHM MD5 Algorithm: The MD5 message digest algorithm is a widely used cryptographic hash function producing a ISSN: 2231-5381 128-bit (16-byte) hash value, typically expressed in text format as a 32 digit hexadecimal number. MD5 has been utilized in a wide variety of cryptographic applications, and is also commonly used to verify data integrity. MD5 algorithm consists of 5 steps: Step 1. Appending Padding Bits. The original message is "padded" (extended) so that its length (in bits) is congruent to 448, modulo 512. The padding rules are: The original message is always padded with one bit "1" first. Then zero or more bits "0" are padded to bring the length of the message up to 64 bits fewer than a multiple of 512. Step 2. Appending Length. 64 bits are appended to the end of the padded message to indicate the length of the original message in bytes. The rules of appending length are: The length of the original message in bytes is converted to its binary format of 64 bits. If overflow happens, only the low-order 64 bits are used. Break the 64-bit length into 2 words (32 bits each). The low-order word is appended first and followed by the high-order word. Step 3. Initializing MD Buffer. MD5 algorithm requires a 128-bit buffer with a specific initial value. The rules of initializing buffer are: The buffer is divided into 4 words (32 bits each), named as A, B, C, and D. Word A is initialized to: 0x67452301. Word B is initialized to: 0xEFCDAB89. Word C is initialized to: 0x98BADCFE. Word D is initialized to: 0x10325476. Step 4. Processing Message in 512-bit Blocks. This is the main step of MD 5 algorithm, which loops through the padded and appended message in blocks of 512 bits each. For each input block, 4 rounds of operations are performed with 16 operations in each round. Step 5. Output. The contents in buffer words A, B, C, D are returned in sequence with low-order byte first. CONCLUSION The bTSE(basic Trustworthy Service Evaluation) system for Service-oriented social networks is proposed to write a review. The system involves token to submit a review. The system engages RSA algorithm to generate the one time transaction token. The user before writing the feedback requests for a one time transaction token for a selected service. The requested token is sent to the user mail, using the token review is submitted. The MD5 hashing technique is applied on the review which improves review integrity and significantly reduces vendors’ modification capability. The three review attacks link ability, modification, rejection attacks are resisted effectively with relying on a third trusted authority. The system allows users to leave only one review towards a vendor in a predefined time slot. If multiple reviews with different pseudonyms from one user are generated, the real identity will be disclosed and the user will be blocked from writing the review. http://www.ijettjournal.org Page 120 International Journal of Engineering Trends and Technology (IJETT) – Volume 35 Number 3- May 2016 REFERENCES [1] Xiaohui Liang, Student Member, IEEE, Xiaodong Lin, Member, IEEE, and Xuemin (Sherman) Shen, “Enabling Trustworthy Service Evaluation in Service-Oriented Mobile Social Networks” Fellow, IEEE 2014. [2] D. Quercia and S. Hailes, “Sybil Attacks Against Mobile Users: Friends and Foes to the Rescue,” Proc. IEEE INFOCOM, pp. 336340, 2010. [3] X. Liang, X. Li, R. Lu, X. Lin, and X. Shen, “Seer: A Secure and Efficient Service Review System for Service- Oriented Mobile Social Networks,” IEEE, 2012. [4] A. Das and M.M. Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems,” IEEE, 2012. [5] W. Dong, V. Dave, L. Qiu, and Y. Zhang, “Secure Friend Discovery in Mobile Social Networks,” IEEE, 2011. ISSN: 2231-5381 [6] J. Douceur, “The Sybil Attack,” Proc. Revised Papers First Int’l Workshop Peer-to-Peer Systems, 2002. [7] C. Karlof and D. Wagner, “Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures,” Ad Hoc Networks, 2003. [8] R. Lu, X. Lin, X. Liang, and X. Shen, “A Dynamic PrivacyPreserving Key Management Scheme for Location-Based Services in VANETs,” IEEE, 2012. [9] B. Viswanath, A. Post, P.K. Gummadi, and A. Mislove, “An Analysis of Social Network-Based Sybil Defenses,” ACM, 2010. [10] A. Mohaisen, N. Hopper, and Y. Kim, “Keep Your Friends Close: Incorporating Trust into Social Network-Based Sybil Defenses,” IEEE, 2011. [11] W. Wei, F. Xu, C.C. Tan, and Q. Li, “Sybil defender: Defend against Sybil Attacks in Large Social Networks,” IEEE, 2012. http://www.ijettjournal.org Page 121