STEP-a: An Algorithmic Approach towards Trust Based Security in Pervasive Computing Environment

-- To secure computing in pervasive environment, an adaptive algorithmic approach for access control (based on human notion of trust) is proposed. The proposed model provides support to calculate direct trust in situations when the requesting entity has a past experience with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. An adaptive policy based management is proposed to handle strategic malicious behavior. The defense mechanism incorporated by proposed model against strategic attack is also demonstrated. Finally we have compared our model with existing evolutionary models in this field.

[1]  Tao Sun,et al.  Probabilistic Trust Management in Pervasive Computing , 2008, 2008 IEEE/IFIP International Conference on Embedded and Ubiquitous Computing.

[2]  Christian Damsgaard Jensen,et al.  Towards a Framework for Assessing Trust-Based Admission Control in Collaborative Ad Hoc Applications , 2002 .

[3]  Paddy Nixon,et al.  Trusting Collaboration in Global Computing Systems , 2003, iTrust.

[4]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .

[5]  Paddy Nixon,et al.  Security models for trusting network appliances , 2002, Proceedings 3rd IEEE International Workshop on System-on-Chip for Real-Time Applications.

[6]  G. G. Stokes "J." , 1890, The New Yale Book of Quotations.

[7]  Jianping Hu,et al.  A novel cloud-based trust model for pervasive computing , 2004, The Fourth International Conference onComputer and Information Technology, 2004. CIT '04..

[8]  Munindar P. Singh,et al.  An adaptive probabilistic trust model and its evaluation , 2008, AAMAS.

[9]  Jean Bacon,et al.  Trust for Ubiquitous, Transparent Collaboration , 2003, Proceedings of the First IEEE International Conference on Pervasive Computing and Communications, 2003. (PerCom 2003)..

[10]  M. Lynn Hawaii International Conference on System Sciences , 1996 .

[11]  Michel Riguidel,et al.  Adjustable Trust Model for Access Control , 2008, ATC.

[12]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[13]  Young-Koo Lee,et al.  A trust model for ubiquitous systems based on vectors of trust values , 2005, Seventh IEEE International Symposium on Multimedia (ISM'05).

[14]  Yong Chen,et al.  Using Trust for Secure Collaboration in Uncertain Environments , 2003, IEEE Pervasive Comput..

[15]  Emil C. Lupu,et al.  Security and management policy specification , 2002, IEEE Netw..

[16]  Sheikh Iqbal Ahamed,et al.  A trust-based secure service discovery (TSSD) model for pervasive computing , 2008, Comput. Commun..

[17]  Sheikh Iqbal Ahamed,et al.  Design, analysis, and deployment of omnipresent Formal Trust Model (FTM) with trust bootstrapping for pervasive environments , 2010, J. Syst. Softw..

[18]  Andrés Marín López,et al.  Developing a model for trust management in pervasive devices , 2006, Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOMW'06).

[19]  Vijay Varadharajan,et al.  Interaction Trust Evaluation in Decentralized Environments , 2004, EC-Web.

[20]  Andrés Marín López,et al.  Trust management for multimedia P2P applications in autonomic networking , 2011, Ad Hoc Networks.

[21]  Andrés Marín López,et al.  TrustAC: Trust-Based Access Control for Pervasive Devices , 2005, SPC.

[22]  Elisa Bertino,et al.  A Trust-Based Context-Aware Access Control Model for Web-Services , 2004, Proceedings. IEEE International Conference on Web Services, 2004..

[23]  Sheikh Iqbal Ahamed,et al.  An Omnipresent Formal Trust Model (FTM) for Pervasive Computing Environment , 2007, 31st Annual International Computer Software and Applications Conference (COMPSAC 2007).

[24]  M. Weiser The Computer for the Twenty-First Century , 1991 .

[25]  Celeste Campo,et al.  PTM: A Pervasive Trust Management Model for Dynamic Open Environments ⁄ , 2003 .

[26]  Timothy W. Finin,et al.  Vigil: Enforcing Security in Ubiquitous Environments , 2002 .

[27]  David M. Eyers,et al.  Using trust and risk in role-based access control policies , 2004, SACMAT '04.

[28]  Audun Jøsang,et al.  An Algebra for Assessing Trust in Certification Chains , 1999, NDSS.