• Title/Summary/Keyword: Trust Evaluation

Search Result 290, Processing Time 0.023 seconds

Internet of Things (IoT) Framework for Granting Trust among Objects

  • Suryani, Vera;Sulistyo, Selo;Widyawan, Widyawan
    • Journal of Information Processing Systems
    • /
    • v.13 no.6
    • /
    • pp.1613-1627
    • /
    • 2017
  • The concept of the Internet of Things (IoT) enables physical objects or things to be virtually accessible for both consuming and providing services. Undue access from irresponsible activities becomes an interesting issue to address. Maintenance of data integrity and privacy of objects is important from the perspective of security. Privacy can be achieved through various techniques: password authentication, cryptography, and the use of mathematical models to assess the level of security of other objects. Individual methods like these are less effective in increasing the security aspect. Comprehensive security schemes such as the use of frameworks are considered better, regardless of the framework model used, whether centralized, semi-centralized, or distributed ones. In this paper, we propose a new semi-centralized security framework that aims to improve privacy in IoT using the parameters of trust and reputation. A new algorithm to elect a reputation coordinator, i.e., ConTrust Manager is proposed in this framework. This framework allows each object to determine other objects that are considered trusted before the communication process is implemented. Evaluation of the proposed framework was done through simulation, which shows that the framework can be used as an alternative solution for improving security in the IoT.

Machine Learning Methods for Trust-based Selection of Web Services

  • Hasnain, Muhammad;Ghani, Imran;Pasha, Muhammad F.;Jeong, Seung R.
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.16 no.1
    • /
    • pp.38-59
    • /
    • 2022
  • Web services instances can be classified into two categories, namely trusted and untrusted from users. A web service with high throughput (TP) and low response time (RT) instance values is a trusted web service. Web services are not trustworthy due to the mismatch in the guaranteed instance values and the actual values achieved by users. To perform web services selection from users' attained TP and RT values, we need to verify the correct prediction of trusted and untrusted instances from invoked web services. This accurate prediction of web services instances is used to perform the selection of web services. We propose to construct fuzzy rules to label web services instances correctly. This paper presents web services selection using a well-known machine learning algorithm, namely REPTree, for the correct prediction of trusted and untrusted instances. Performance comparison of REPTree with five machine learning models is conducted on web services datasets. We have performed experiments on web services datasets using a ten k-fold cross-validation method. To evaluate the performance of the REPTree classifier, we used accuracy metrics (Sensitivity and Specificity). Experimental results showed that web service (WS1) gained top selection score with the (47.0588%) trusted instances, and web service (WS2) was selected the least with (25.00%) trusted instances. Evaluation results of the proposed web services selection approach were found as (asymptotic sig. = 0.019), demonstrating the relationship between final selection and recommended trust score of web services.

Trustworthy Service Selection using QoS Prediction in SOA-based IoT Environments (SOA기반 IoT환경에서 QoS 예측을 통한 신뢰할 수 있는 서비스 선택)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.1
    • /
    • pp.123-131
    • /
    • 2019
  • The Internet of Things (IoT) environment must be able to meet the needs of users by providing access to various services that can be used to develop diverse user applications. However, QoS issues arise due to the characteristics of the IoT environment, such as numerous heterogeneous devices and potential resource constraints. In this paper, we propose a QoS prediction method that reflects trust between users in SOA based IoT. In order to increase the accuracy of QoS prediction, we analyze the trust and distrust relations between users and identify similarities among users and predict QoS based on them. The centrality is calculated to enhance trust relationships. Experimental results show that QoS prediction can be improved.

A Study on Shopping Mall Quality, Satisfaction, Trust, Commitment and Purchase Intention According to Shopping Propensity of Chinese Consumer (중국 패션소비자의 쇼핑성향에 따른 인터넷 쇼핑몰 품질지각, 만족, 신뢰, 몰입 및 구매의도에 관한 연구)

  • Hong, Byung-Sook;Na, Youn-Kue;Xu, Dan Dan
    • Journal of the Korean Society of Clothing and Textiles
    • /
    • v.33 no.4
    • /
    • pp.622-633
    • /
    • 2009
  • I need to study variations which affect Chinese internet shopping-mall vendor and Chinese buyer's long term relationship and utilize that insight on marketing strategy. For that, I studied effect of shopping propensity, internet shipping-mall quality on satisfaction, trust, commitment and purchase intention of fashion products, mainly fashion goods consumers in their 20s-30s at Shanghai and Beijing. 453 respondents' survey was used for this study by random sample selection and analyzed through frequency analysis, factor analysis, regression analysis, cross-tab, ANOVA test with SPSS12.0. Through this study, I found out that Chinese fashion goods consumer can be categorized as information seeker, variety seeker and innovation seeker. Among them, innovation seeker was most sensitive on shopping mall's quality, satisfaction, trust, commitment and purchase intention and Chinese consumer's evaluation on internet shopping-mall' perceived quality affect satisfaction, absorption, trust and fashion goods purchase intention. Based on that, I need to understand more about target consumer before enter the market, because there is difference of shopping-mall quality, satisfaction, trust, absorption and purchase intention according to shopper's propensity and demographic factors.

Trust Discrimination Scheme Considering Limited Resources in Mobile P2P Environments (모바일 P2P환경에서 제한적인 자원을 고려한 신뢰성 판별 기법)

  • Choi, Minwoong;Ko, Geonsik;Jeon, Hyeonnwook;Kim, Yeonwoo;Lim, Jongtae;Bok, Kyoungsoo;Yoo, Jaesoo
    • The Journal of the Korea Contents Association
    • /
    • v.17 no.1
    • /
    • pp.662-672
    • /
    • 2017
  • Recently, with the development of mobile devices and near field communication, mobile P2P networks have been actively studied to improve the limits of the existing centralized processing system. A peer has limited components such as batteries, memory and storage spaces in mobile P2P networks. The trust of a peer should be discriminated in order to share reliable contents in mobile P2P networks. In this paper, we propose a trust discrimination scheme considering limited resources in mobile P2P environments. The proposed scheme discriminates the trust of a peer by direct rating values using the rating information of the peer and indirect rating values by the other peers. The recent update time is included in the rating information. The proposed scheme reduces the redundant rating information by comparing the recent update times of the rating information. It is shown through performance evaluation that the proposed scheme reduces the number of messages and improves the accuracy of trust over the existing scheme.

The Evaluation Model for Natural Resource Conservation Areas - Focused on Site Selection for the National Trust - (자연자원 보전지역의 평가모형 - 내셔널 트러스트 후보지 선정을 중심으로 -)

  • 유주한;정성관
    • Journal of the Korean Institute of Landscape Architecture
    • /
    • v.30 no.2
    • /
    • pp.39-49
    • /
    • 2002
  • The purpose of this study is to propose an objective and rational methodology for the selection of proposed sites far the National Trust(NT), which is the new alterative proposal far the conservation of natural environments destroyed by injudicious land development and economic growth. That is to enforce many analysis for the effective estimation of rare ecological and landscape resources and to propose a model based on estimation and united indicators. Using the estimative model, we apply it to the selection of the proposed site in micro scale and simultaneously offer the basic methodology of effective and systematic land conservation in macro scale. The results of this study are as follows: 1) The results of analysis for the reliability of estimative items and indicators, presented no problem in that the coefficient of reliability was over 0.7. 2) The correlation measure of the estimative indicator indicated that 'succession'and 'regenerating restorability' were highly correlative in the item of plants. Another three items showed a tendency to be alike. 3) The results of factor analysis on the characteristics of indicators, classified plants into four categories including a stable factor. The item of animals was classified as a stable and rare factor. The item of landscape was classified as a physical and mental factor and the environment as a pollutional and conditional factor. 4) The model of estimation created through factor analysis was valid for the approval of the regression model because significant probability was 0.00. When we consider the NT proposed site as a complex body that is composed of diverse natural and manmade resources, certainly the synthetic methodology of estimation is needed. If these studies are carried out, NT sites will be selected more rationally and effectively than at present. Consequently, they have the potential to play a core role of natural ecosystem conservation in Korea.

Dynamic Remote User Trust Evaluation Scheme for Social Network Service (소셜 네트워크에서 원거리 노드를 고려한 동적 사용자 신뢰도 평가 스킴)

  • Kim, Youngwoong;Choi, Younsung;Kwon, Keun;Jeon, Woongryul;Won, Dongho
    • Journal of the Korea Institute of Information Security & Cryptology
    • /
    • v.24 no.2
    • /
    • pp.373-384
    • /
    • 2014
  • The social network service is the bidirectional media that many users can build relations not only friends but also other people. However, a process to approach in the social network is so simple that untrustable information, which malignant users make, is spreaded rapidly in many the social network uses. This causes many users to suffer material or psychological damages. Because of openness in the social network, there will be higher risk of the privacy invasion. Therefore, sensitive information should be transferred or provided only to reliable users. In general, because many users exchange among one hops, many researches have focused on one hop's trust evaluation. However, exchanges between users happen not only one joint bridege but also far nodes more than two nodes on account of dense network and openness. In this paper we propose the efficient scheme combining transitivity and composability for remote users.

A Study on Trusted Routing Scheme for Secure Path and Secure Data Transmission in MANET (MANET에서 보안 경로와 안전한 데이터 전송을 위한 신뢰 기반 라우팅 기법에 관한 연구)

  • Yang, Hwanseok
    • Journal of Korea Society of Digital Industry and Information Management
    • /
    • v.13 no.2
    • /
    • pp.43-51
    • /
    • 2017
  • Recently, MANET has been used in many fields as the range of applications increases. However, the dynamic topology that MANET has makes it difficult to route and provides the cause of exposure to security vulnerabilities. Therefore, the security features that can be robust to many attacks must have been applied in the routing technique provided in the MANET. In this paper, we propose a secure routing method that secure route is established by reliability evaluation of nodes and secure data communication has applied through key exchange mechanism. The proposed technique used hierarchical structure for efficiency of reliability evaluation of nodes. The reliability of nodes is performed by trust management node and reliability of nodes managed periodically is broadcasted. And the key exchange for secure data transmission is dene without CA as the certificate issuing organization. This allows fast key exchange and the integrity of data transmission improved. The proposed technique improves the security of the data transmission because a secure route to the destination node is established by the reliability evaluation and the data transmission is performed after the key between the source node and the destination node is exchanged through the established route.

An Evaluation of Informal Environmental Education Program Based on Evaluation Procedure Model - A Case Study on the Evaluation of Non-Indigenous, Invasive Species Management Program in New York State - (절차 모형에 따른 사회 환경교육 프로그램의 평가 - 뉴욕주의 외래종 관리 프로그램 평가 사례를 중심으로 -)

  • ;Marianne E. Krasny
    • Hwankyungkyoyuk
    • /
    • v.15 no.1
    • /
    • pp.83-100
    • /
    • 2002
  • This study introduced various theories and related studies on the evaluation of informal environmental education programs and suggested an evaluation procedure for them. The case study on the procedure and the result of Non-indigenous, Invasive Species Management/Education program evaluation was provided, which was conducted by Cornell University in cooperation with Cornell Cooperative Extension, The Nature Conservancy, and Finger Lake Land Trust. The procedure model that was used in this study was based on Herman et al. (1987) and slightly modified for the environmental education program evaluation. The procedure and results indicated that the implementation of NIS management/education program properly accomplished it's intended goal and objectives. This study also specifically described its implications for the evaluation of environmental education programs in informal settings.

  • PDF

The effects of brand trust and attributions on the eco-friendly line extension (브랜드 신뢰와 사회적 CSR 동기귀인이 환경친화적 라인확장에 미치는 영향)

  • Moon, Heekang;Lee, Hyun-Hwa
    • The Research Journal of the Costume Culture
    • /
    • v.23 no.4
    • /
    • pp.537-553
    • /
    • 2015
  • Recently, some fashion retailers have initiated sustainable actions in the form of corporate social responsibility (CSR) activities to address consumers' social concerns. This study intends to combine the concept of CSR motivation attributions with brand extension literature in order to examine how consumers' trust of a parent brand affects their CSR motivation attributions and ultimately their attitudes towards parent-brand CSR activities and sustainable extension lines. A self-administered online survey was conducted using scenarios describing a fast fashion retailer introducing a sustainable line. Data from 303 female U.S. consumers, aged between 18 and 34 years, were used for the statistical analysis. Data analyses were conducted using SPSS 21.0 for descriptive analysis, exploratory factor analysis, and regression analysis. The results revealed that all hypotheses were supported. The findings show that consumers' trust of a parent brand has an indirect impact on positive attitudes towards the parent brand's CSR activities as well as the sustainable extension product line, mediating positive evaluations of the brand's social CSR motivations. In addition, this study suggests consumers' prior trust of the parent brand is a variable that affects consumers' evaluation of CSR motivation sincerity. Marketing suggestions and thoughts based on the findings of this study were provided.