• Title/Summary/Keyword: Dynamic trust model

Search Result 31, Processing Time 0.023 seconds

Dynamic Trust Model Based on Extended Subjective Logic

  • Junfeng, Tian;Jiayao, Zhang;Peipei, Zhang;Xiaoxue, Ma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3926-3945
    • /
    • 2018
  • In Jøsang's trust model, trust evaluation is obtained through operators, but there are problems with the mutuality and asymmetry of trust and the impact of event weight on trust evaluation. Trust evaluation is updated dynamically and continuously with time and the process of interactions, but it has not been reflected in Jøsang's model. Therefore, final trust evaluation is not accurate, and malicious fraud cannot be prevented effectively. This causes the success rate of interaction to be low. To solve these problems, a new dynamic trust model is proposed based on extended subjective logic (DTM-ESL). In DTM-ESL, the event weight and the mutuality of trust are fully considered, the original one-way trust relationship is extended to a two-way trust relationship, discounting and consensus operators are improved, and trust renewal is designed based on event weight. The viability and effectiveness of this new model are verified by simulation experiments.

Dynamic Cloud Resource Reservation Model Based on Trust

  • Qiang, Jiao-Hong;Ning, Ding-Wan;Feng, Tian-Jun;Ping, Li-Wei
    • Journal of Information Processing Systems
    • /
    • v.14 no.2
    • /
    • pp.377-395
    • /
    • 2018
  • Aiming at the problem of service reliability in resource reservation in cloud computing environments, a model of dynamic cloud resource reservation based on trust is proposed. A domain-specific cloud management architecture is designed in which resources are divided into different management domains according to the types of service for easier management. A dynamic resource reservation mechanism (DRRM) is used to test users' reservation requests and reserve resources for users. According to user preference, several resources are chosen to be candidate resources by fuzzy cluster analysis. The fuzzy evaluation method and a two-way trust evaluation mechanism are adopted to improve the availability and credibility of the model. An analysis and simulation experiments show that this model can increase the flexibility of resource reservation and improve user satisfaction.

DTSTM: Dynamic Tree Style Trust Measurement Model for Cloud Computing

  • Zhou, Zhen-Ji;Wu, Li-Fa;Hong, Zheng;Xu, Ming-Fei;Pan, Fan
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.1
    • /
    • pp.305-325
    • /
    • 2014
  • In cloud computing infrastructure, current virtual machine trust measurement methods have many shortcomings in dynamism, security and concurrency. In this paper, we present a new method to measure the trust of virtual machine. Firstly, we propose "behavior trace" to describe the state of virtual machine. Behavior trace is a sequence of behaviors. The measurement of behavior trace is conducted on the basis of anticipated trusted behavior, which not only ensures security of the virtual machine during runtime stage but also reduces complexity of the trust measurement. Based on the behavior trace, we present a Dynamic Tree Style Trust Measurement Model (DTSTM). In this model, the measurement of system domain and user domain is separated, which enhances the extensibility, security and concurrency of the measurement. Finally, based on System Call Interceptor (SCI) and Virtual Machine Introspection (VMI) technology, we implement a DTSTM prototype system for virtual machine trust measurement. Experimental results demonstrate that the system can effectively verify the trust of virtual machine and requires a relatively low performance overhead.

System Dynamic Model Study of Public Trust on Nuclear Regulation Policy (원자력 규제정책에 대한 국민신뢰도 평가 SD모델 연구)

  • Kwak, Mi-Aie;Cha, Hyun-Ju;Kim, Sung-Hyun;Jung, Kwan-Yong
    • Korean System Dynamics Review
    • /
    • v.16 no.1
    • /
    • pp.53-74
    • /
    • 2015
  • The purpose of this paper is to simulate public trust on nuclear regulation policy. The first of all, public trust variables and the model were developed and analysed by system dynamic method. The model are consisted of the operator safety culture level, regulatory competence levels, the public satisfaction and public trust level. The scenario is made up three type which base scenario, the system operator's safety culture level and accident event level. First. the simulation results of standard scenario shows that rapidly declining public satisfaction and trust level of the national safety after Japan's nuclear accident in November 2011. Second, operator safety culture level and simulated divided into three levels. The results showed that a greater impact on the public satisfaction if bad than good case. Finally, the size of the accident was simulated divided into three levels levels(no accident, medium, serious accidents). the results showed a weak effect against the regulatory capacity and safety performance levels but showed a significant impact on public satisfaction and confidence level.

Trustworthy Service Discovery for Dynamic Web Service Composition

  • Kim, Yukyong;Choi, Jong-Seok;Shin, Yongtae
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.9 no.3
    • /
    • pp.1260-1281
    • /
    • 2015
  • As the number of services available on the Web increases, it is vital to be able to identify which services can be trusted. Since there can be an extremely large number of potential services that offer similar functionality, it is challenging to select the right ones. Service requestors have to decide which services closelysatisfy their needs, and theymust worry about the reliability of the service provider. Although an individual service can be trusted, a composed service is not guaranteed to be trustworthy. In this paper, we present a trust model that supports service discovery and composition based on trustworthiness. We define a method to evaluate trust in order to discover trustworthy services. We also provide a method to perform trust estimation for dynamic service composition, and we present results of two experiments. The proposed model allows for service requestors to obtain the most trustworthy services possible. Our mechanism uses direct and indirect user experience to discover the trustworthiness of the services and service providers. Moreover, composing services based on quantitative trust measurements will allow for consumers to acquire a highly reliable service that meet their quality and functional requirements.

Prediction Method for the Implicit Interpersonal Trust Between Facebook Users (페이스북 사용자간 내재된 신뢰수준 예측 방법)

  • Song, Hee Seok
    • Journal of Information Technology Applications and Management
    • /
    • v.20 no.2
    • /
    • pp.177-191
    • /
    • 2013
  • Social network has been expected to increase the value of social capital through online user interactions which remove geographical boundary. However, online users in social networks face challenges of assessing whether the anonymous user and his/her providing information are reliable or not because of limited experiences with a small number of users. Therefore. it is vital to provide a successful trust model which builds and maintains a web of trust. This study aims to propose a prediction method for the interpersonal trust which measures the level of trust about information provider in Facebook. To develop the prediction method. we first investigated behavioral research for trust in social science and extracted 5 antecedents of trust : lenience, ability, steadiness, intimacy, and similarity. Then we measured the antecedents from the history of interactive behavior and built prediction models using the two decision trees and a computational model. We also applied the proposed method to predict interpersonal trust between Facebook users and evaluated the prediction accuracy. The predicted trust metric has dynamic feature which can be adjusted over time according to the interaction between two users.

A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments

  • Wu, Xu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2396-2413
    • /
    • 2018
  • Trust management is one of the most challenging issues for the highly heterogeneous Internet of Things (IoT). In the context of the IoT, it is difficult to evaluate the node's trustworthiness in the same trust model when a node provides different services. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of IoT environments. With these issues in mind, this paper propose a robust and adaptive trust management system for the IoT that is able to measure the trustworthiness of nodes based on feedbacks collected from participants in a specific context and ensure the availability of trust management services. The main contributions of our system are: 1) Proposing a partly decentralized trust management framework, which improves the resiliency of the trust mechanism; 2) Proposing an adaptive trust evaluation scheme and a three-dimensional context representation makes trust evaluation more accurate and specific; 3) Enhancing the adaptive trust evaluation scheme by incorporating a bad behavior factor in trust estimation, which efficiently distinguishes misleading feedbacks from On-Off attacks. Simulation results show the good performance of the proposed system and especially show effectiveness against On-Off attacks compared to other trust mechanisms.

Trust-Tech based Parameter Estimation and its Application to Power System Load Modeling

  • Choi, Byoung-Kon;Chiang, Hsiao-Dong;Yu, David C.
    • Journal of Electrical Engineering and Technology
    • /
    • v.3 no.4
    • /
    • pp.451-459
    • /
    • 2008
  • Accurate load modeling is essential for power system static and dynamic analysis. By the nature of the problem of parameter estimation for power system load modeling using actual measurements, multiple local optimal solutions may exist and local methods can be trapped in a local optimal solution giving possibly poor performance. In this paper, Trust-Tech, a novel methodology for global optimization, is applied to tackle the multiple local optimal solutions issue in measurement-based power system load modeling. Multiple sets of parameter values of a composite load model are obtained using Trust-Tech in a deterministic manner. Numerical studies indicate that Trust-Tech along with conventional local methods can be successfully applied to power system load model parameter estimation in measurement-based approaches.

Trust Based Authentication and Key Establishment for Secure Routing in WMN

  • Akilarasu, G.;Shalinie, S. Mercy
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.8 no.12
    • /
    • pp.4661-4676
    • /
    • 2014
  • In Wireless Mesh Networks (WMN), an authentication technique can be compromised due to the distributed network architecture, the broadcast nature of the wireless medium and dynamic network topology. Several vulnerabilities exist in different protocols for WMNs. Hence, in this paper, we propose trust based authentication and key establishment for secure routing in WMN. Initially, a trust model is designed based on Ant Colony Optimization (ACO) to exchange the trust information among the nodes. The routing table is utilized to select the destination nodes, for which the link information is updated and the route verification is performed. Based on the trust model, mutual authentication is applied. When a node moves from one operator to another for accessing the router, inter-authentication will be performed. When a node moves within the operator for accessing the router, then intra-authentication will be performed. During authentication, keys are established using identity based cryptography technique. By simulation results, we show that the proposed technique enhances the packet delivery ratio and resilience with reduced drop and overhead.

Network Traffic-Based Access Control Using Software-Defined Perimeter (소프트웨어 정의 경계를 이용한 네트워크 트래픽 기반 동적 접근 제어)

  • Seo-Yi Kim;Il-Gu Lee
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.34 no.4
    • /
    • pp.735-746
    • /
    • 2024
  • The rapid advancement of computer technology has necessitated a safer user environment, prompting the adoption of the zero trust model, which verifies all internal and external network activities. This paper proposes an efficient network traffic data-based dynamic access control method leveraging Software-Defined Perimeter (SDP) capabilities to implement zero trust and address latency issues. According to the performance evaluation results, the detection performance of the proposed scheme is similar to that of conventional schemes, but the dataset size was reduced by 62.47%. Additionally, by proposing an adaptive zero trust verification approach, the dataset size and verification time were reduced by 83.9% and 9.1%, respectively, while maintaining similar detection performance to conventional methods.