• Title/Summary/Keyword: Trust Evaluation

Search Result 293, Processing Time 0.03 seconds

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

Machine Learning Methods for Trust-based Selection of Web Services

  • Hasnain, Muhammad;Ghani, Imran;Pasha, Muhammad F.;Jeong, Seung R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.38-59
    • /
    • 2022
  • Web services instances can be classified into two categories, namely trusted and untrusted from users. A web service with high throughput (TP) and low response time (RT) instance values is a trusted web service. Web services are not trustworthy due to the mismatch in the guaranteed instance values and the actual values achieved by users. To perform web services selection from users' attained TP and RT values, we need to verify the correct prediction of trusted and untrusted instances from invoked web services. This accurate prediction of web services instances is used to perform the selection of web services. We propose to construct fuzzy rules to label web services instances correctly. This paper presents web services selection using a well-known machine learning algorithm, namely REPTree, for the correct prediction of trusted and untrusted instances. Performance comparison of REPTree with five machine learning models is conducted on web services datasets. We have performed experiments on web services datasets using a ten k-fold cross-validation method. To evaluate the performance of the REPTree classifier, we used accuracy metrics (Sensitivity and Specificity). Experimental results showed that web service (WS1) gained top selection score with the (47.0588%) trusted instances, and web service (WS2) was selected the least with (25.00%) trusted instances. Evaluation results of the proposed web services selection approach were found as (asymptotic sig. = 0.019), demonstrating the relationship between final selection and recommended trust score of web services.

Trustworthy Service Selection using QoS Prediction in SOA-based IoT Environments (SOA기반 IoT환경에서 QoS 예측을 통한 신뢰할 수 있는 서비스 선택)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.123-131
    • /
    • 2019
  • The Internet of Things (IoT) environment must be able to meet the needs of users by providing access to various services that can be used to develop diverse user applications. However, QoS issues arise due to the characteristics of the IoT environment, such as numerous heterogeneous devices and potential resource constraints. In this paper, we propose a QoS prediction method that reflects trust between users in SOA based IoT. In order to increase the accuracy of QoS prediction, we analyze the trust and distrust relations between users and identify similarities among users and predict QoS based on them. The centrality is calculated to enhance trust relationships. Experimental results show that QoS prediction can be improved.

A Study on Shopping Mall Quality, Satisfaction, Trust, Commitment and Purchase Intention According to Shopping Propensity of Chinese Consumer (중국 패션소비자의 쇼핑성향에 따른 인터넷 쇼핑몰 품질지각, 만족, 신뢰, 몰입 및 구매의도에 관한 연구)

  • Hong, Byung-Sook;Na, Youn-Kue;Xu, Dan Dan
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.4
    • /
    • pp.622-633
    • /
    • 2009
  • I need to study variations which affect Chinese internet shopping-mall vendor and Chinese buyer's long term relationship and utilize that insight on marketing strategy. For that, I studied effect of shopping propensity, internet shipping-mall quality on satisfaction, trust, commitment and purchase intention of fashion products, mainly fashion goods consumers in their 20s-30s at Shanghai and Beijing. 453 respondents' survey was used for this study by random sample selection and analyzed through frequency analysis, factor analysis, regression analysis, cross-tab, ANOVA test with SPSS12.0. Through this study, I found out that Chinese fashion goods consumer can be categorized as information seeker, variety seeker and innovation seeker. Among them, innovation seeker was most sensitive on shopping mall's quality, satisfaction, trust, commitment and purchase intention and Chinese consumer's evaluation on internet shopping-mall' perceived quality affect satisfaction, absorption, trust and fashion goods purchase intention. Based on that, I need to understand more about target consumer before enter the market, because there is difference of shopping-mall quality, satisfaction, trust, absorption and purchase intention according to shopper's propensity and demographic factors.

Trust Discrimination Scheme Considering Limited Resources in Mobile P2P Environments (모바일 P2P환경에서 제한적인 자원을 고려한 신뢰성 판별 기법)

  • Choi, Minwoong;Ko, Geonsik;Jeon, Hyeonnwook;Kim, Yeonwoo;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.662-672
    • /
    • 2017
  • Recently, with the development of mobile devices and near field communication, mobile P2P networks have been actively studied to improve the limits of the existing centralized processing system. A peer has limited components such as batteries, memory and storage spaces in mobile P2P networks. The trust of a peer should be discriminated in order to share reliable contents in mobile P2P networks. In this paper, we propose a trust discrimination scheme considering limited resources in mobile P2P environments. The proposed scheme discriminates the trust of a peer by direct rating values using the rating information of the peer and indirect rating values by the other peers. The recent update time is included in the rating information. The proposed scheme reduces the redundant rating information by comparing the recent update times of the rating information. It is shown through performance evaluation that the proposed scheme reduces the number of messages and improves the accuracy of trust over the existing scheme.

The Evaluation Model for Natural Resource Conservation Areas - Focused on Site Selection for the National Trust - (자연자원 보전지역의 평가모형 - 내셔널 트러스트 후보지 선정을 중심으로 -)

  • 유주한;정성관
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.2
    • /
    • pp.39-49
    • /
    • 2002
  • The purpose of this study is to propose an objective and rational methodology for the selection of proposed sites far the National Trust(NT), which is the new alterative proposal far the conservation of natural environments destroyed by injudicious land development and economic growth. That is to enforce many analysis for the effective estimation of rare ecological and landscape resources and to propose a model based on estimation and united indicators. Using the estimative model, we apply it to the selection of the proposed site in micro scale and simultaneously offer the basic methodology of effective and systematic land conservation in macro scale. The results of this study are as follows: 1) The results of analysis for the reliability of estimative items and indicators, presented no problem in that the coefficient of reliability was over 0.7. 2) The correlation measure of the estimative indicator indicated that 'succession'and 'regenerating restorability' were highly correlative in the item of plants. Another three items showed a tendency to be alike. 3) The results of factor analysis on the characteristics of indicators, classified plants into four categories including a stable factor. The item of animals was classified as a stable and rare factor. The item of landscape was classified as a physical and mental factor and the environment as a pollutional and conditional factor. 4) The model of estimation created through factor analysis was valid for the approval of the regression model because significant probability was 0.00. When we consider the NT proposed site as a complex body that is composed of diverse natural and manmade resources, certainly the synthetic methodology of estimation is needed. If these studies are carried out, NT sites will be selected more rationally and effectively than at present. Consequently, they have the potential to play a core role of natural ecosystem conservation in Korea.

Dynamic Remote User Trust Evaluation Scheme for Social Network Service (소셜 네트워크에서 원거리 노드를 고려한 동적 사용자 신뢰도 평가 스킴)

  • Kim, Youngwoong;Choi, Younsung;Kwon, Keun;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.373-384
    • /
    • 2014
  • The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users make, is spreaded rapidly in many the social network uses. This causes many users to suffer material or psychological damages. Because of openness in the social network, there will be higher risk of the privacy invasion. Therefore, sensitive information should be transferred or provided only to reliable users. In general, because many users exchange among one hops, many researches have focused on one hop's trust evaluation. However, exchanges between users happen not only one joint bridege but also far nodes more than two nodes on account of dense network and openness. In this paper we propose the efficient scheme combining transitivity and composability for remote users.

A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET (MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.43-51
    • /
    • 2017
  • Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.

A Study to Improve the Trustworthiness of Data Repositories by Obtaining CoreTrustSeal Certification (CoreTrustSeal 인증 획득을 통한 데이터 리포지토리의 신뢰성 향상을 위한 연구)

  • Hea Lim Rhee;Jung-Ho Um;Youngho Shin;Hyung-jun Yim;Na-eun Han
    • Journal of the Korean Society for information Management
    • /
    • v.41 no.2
    • /
    • pp.245-268
    • /
    • 2024
  • As the recognition of data's value increases, the role of data repositories in managing, preserving, and utilizing data is becoming increasingly important. This study investigates ways to enhance the trustworthiness of data repositories through obtaining CoreTrustSeal (CTS) certification. Trust in data repositories is critical not only for data protection but also for building and maintaining trust between the repository and stakeholders, which in turn affects researchers' decisions on depositing and utilizing data. The study examines the CoreTrustSeal, an international certification for trustworthy data repositories, analyzing its impact on the trustworthiness and efficiency of repositories. Using the example of DataON, Korea's first CTS-certified repository operated by the Korea Institute of Science and Technology Information (KISTI), the study compares and analyzes four repositories that have obtained CTS certification. These include DataON, the Physical Oceanography Distributed Active Archive Center (PO.DAAC) from NASA, Yareta from the University of Geneva, and the DARIAH-DE repository from Germany. The research assesses how these repositories meet the mandatory requirements set by CTS and proposes strategies for improving the trustworthiness of data repositories. Key findings indicate that obtaining CTS certification involves rigorous evaluation of organizational infrastructure, digital object management, and technological aspects. The study highlights the importance of transparent data processes, robust data quality assurance, enhanced accessibility and usability, sustainability, security measures, and compliance with legal and ethical standards. By implementing these strategies, data repositories can enhance their reliability and efficiency, ultimately promoting wider data sharing and utilization in the scientific community.

An Evaluation of Informal Environmental Education Program Based on Evaluation Procedure Model - A Case Study on the Evaluation of Non-Indigenous, Invasive Species Management Program in New York State - (절차 모형에 따른 사회 환경교육 프로그램의 평가 - 뉴욕주의 외래종 관리 프로그램 평가 사례를 중심으로 -)

  • ;Marianne E. Krasny
    • Hwankyungkyoyuk
    • /
    • v.15 no.1
    • /
    • pp.83-100
    • /
    • 2002
  • This study introduced various theories and related studies on the evaluation of informal environmental education programs and suggested an evaluation procedure for them. The case study on the procedure and the result of Non-indigenous, Invasive Species Management/Education program evaluation was provided, which was conducted by Cornell University in cooperation with Cornell Cooperative Extension, The Nature Conservancy, and Finger Lake Land Trust. The procedure model that was used in this study was based on Herman et al. (1987) and slightly modified for the environmental education program evaluation. The procedure and results indicated that the implementation of NIS management/education program properly accomplished it's intended goal and objectives. This study also specifically described its implications for the evaluation of environmental education programs in informal settings.

  • PDF