Trust Assessment for the Security of Information Systems

Recent development of various sensors and communicating devices has significantly enhanced information systems (IS). However, the security of these objects as well as the confidence in the information they produce cannot be guaranteed. They can be deceived or under the control of a malicious third party. This raises new issues concerning trust one can have in data, sensors, and the IS itself. This research studies security of information systems considering trust assessment. This paper first introduces the concept of trust one can have in the sources of information and then defines a mathematical trust-measure. A thought on global trust measurement and propagation of trust is presented in the Discussion section, but it is not dealt with in this paper. Simulations conducted in the framework of ship navigation system illustrate the relevance of this approach.

[1]  Anne-Claire Boury-Brisset,et al.  Characterization of hard and soft sources of information: A practical illustration , 2014, 17th International Conference on Information Fusion (FUSION).

[2]  Serena Villata,et al.  Trusting the messenger because of the message: feedback dynamics from information quality to source evaluation , 2014, Comput. Math. Organ. Theory.

[3]  Marco Balduzzi,et al.  A security evaluation of AIS automated identification system , 2014, ACSAC.

[4]  B. Esfandiari,et al.  On How Agents Make Friends: Mechanisms for Trust Acquisition , 2000 .

[5]  J. Lewis,et al.  Trust as a Social Reality , 1985 .

[6]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[7]  Emiliano Lorini,et al.  From Binary Trust to Graded Trust in Information Sources: A Logical Perspective , 2008, AAMAS-TRUST.

[8]  Todd E. Humphreys,et al.  Hostile Control of Ships via False GPS Signals: Demonstration and Detection , 2017 .

[9]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[10]  Audun Jøsang,et al.  Trust revision for conflicting sources , 2015, 2015 18th International Conference on Information Fusion (Fusion).

[11]  Elizabeth Sklar,et al.  Argumentation-based reasoning in agents with varying degrees of trust , 2011, AAMAS.

[12]  Wei Liu,et al.  Trustworthiness of Information Sources and Information Pedigrees , 2001, ATAL.

[13]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[14]  Jay W. Forrester,et al.  System dynamics, systems thinking, and soft OR , 1994 .

[15]  Stephen Marsh,et al.  Formalising Trust as a Computational Concept , 1994 .

[16]  Serena Villata,et al.  A socio-cognitive model of trust using argumentation theory , 2013, Int. J. Approx. Reason..

[17]  Paul-Amaury Matt,et al.  Combining statistics and arguments to compute trust , 2010, AAMAS.

[18]  Cees Witteveen,et al.  Fuzzy Argumentation for Trust , 2008, CLIMA.

[19]  Serena Villata,et al.  Changing One's Mind: Erase or Rewind? , 2011, IJCAI.

[20]  Licia Capra,et al.  Autonomic trust prediction for pervasive systems , 2006, 20th International Conference on Advanced Information Networking and Applications - Volume 1 (AINA'06).

[21]  Zhu Han,et al.  A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[22]  Anupam Das,et al.  SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems , 2012, IEEE Transactions on Dependable and Secure Computing.

[23]  Robert Demolombe,et al.  Reasoning About Trust: A Formal Logical Framework , 2004, iTrust.

[24]  Phan Minh Dung,et al.  On the Acceptability of Arguments and its Fundamental Role in Nonmonotonic Reasoning and Logic Programming , 1993, IJCAI.

[25]  Martine De Cock,et al.  A Many Valued Representation and Propagation of Trust and Distrust , 2005, WILF.

[26]  Robert Demolombe To trust information sources: a proposal for a modal logical framework , 2001 .

[27]  M. Deutsch Trust and suspicion , 1958 .

[28]  K. Blomqvist The many faces of trust , 1997 .

[29]  Munindar P. Singh,et al.  An evidential model of distributed reputation management , 2002, AAMAS '02.

[30]  Audun Jøsang,et al.  Trust network analysis with subjective logic , 2006, ACSC.

[31]  Munindar P. Singh,et al.  Formal Trust Model for Multiagent Systems , 2007, IJCAI.

[32]  Munindar P. Singh,et al.  Trust Representation and Aggregation in a Distributed Agent System , 2006, AAAI.

[33]  N. Luhmann Trust and Power , 1979 .

[34]  Alain Bouju,et al.  DeAIS project: Detection of AIS spoofing and resulting risks , 2015, OCEANS 2015 - Genova.

[35]  Zheng Yan,et al.  Trust Evaluation Based Security Solution in Ad Hoc Networks , 2003 .

[36]  N. L. Chervany,et al.  What is Trust? A Conceptual Analysis and an Interdisciplinary Model , 2000 .