DocumentCode
652242
Title
Multivalued and Deterministic Peer-to-Peer Polling in Social Networks with Reputation Conscious Participants
Author
Englert, Burkhard ; Gheissari, Reza
Author_Institution
Dept. of Comput. Sci., California State Univ. Long Beach, Long Beach, CA, USA
fYear
2013
fDate
16-18 July 2013
Firstpage
895
Lastpage
902
Abstract
We study the polling problem in a social network and present a private and precise n-ary voting protocol. We assume that members are concerned about their reputation in the sense that they do not want their votes to be disclosed and their potentially malicious actions to become public. Our protocol neither requires a central authority, strong cryptography, nor a randomization mechanism, using a simple secret sharing scheme and verification procedures to accurately determine the result of each poll. Our scalable protocol expands on the binary polling protocol by Guerraoui, Huguenin, Kermarrec and Monod and enables deterministic n-ary voting without significantly increasing the complexity of the protocol while preserving optimal voter privacy, allowing nodes to abstain from a poll--assuming honest nodes--and tabulating exact poll results. Misbehaving nodes are exposed with a non-zero probability and the probability of dishonest members violating voter privacy is balanced by their impact on the accuracy of the result. Limiting the number of dishonest nodes (B) such that they do not constitute a majority in any two consecutive groups of nodes and using a privacy parameter k, the impact of colluding malicious nodes is bounded by (2nk-k+1)B for any one element of the global tally and significantly less for all successive elements. Further, our algorithm improves on prior algorithms and ensures that voter privacy is optimally protected and that in the worst case, a node´s vote is only compromised with probability (Bi/nk+1)k+1.
Keywords
cryptographic protocols; data protection; distributed algorithms; probability; social networking (online); binary polling protocol; colluding malicious nodes; deterministic n-ary voting protocol; dishonest members; dishonest nodes; global tally element; honest nodes; malicious actions; misbehaving nodes; multivalued-deterministic peer-to-peer polling; nonzero probability; optimal voter privacy preservation; optimally protected voter privacy parameter; poll result tabulation; reputation conscious participants; secret sharing scheme; social networks; verification procedures; voter privacy violation probability; Arrays; Cryptography; Peer-to-peer computing; Privacy; Protocols; Radiation detectors; Social network services; Accuracy; Distributed Algorithm; Polling; Privacy; Social Networks;
fLanguage
English
Publisher
ieee
Conference_Titel
Trust, Security and Privacy in Computing and Communications (TrustCom), 2013 12th IEEE International Conference on
Conference_Location
Melbourne, VIC
Type
conf
DOI
10.1109/TrustCom.2013.109
Filename
6680929
Link To Document