A Framework for the Assessment of the Trustworthiness of Digital Records over Time

Digital documents are prone to be compromised, especially the archival records which are intended to be stored for a very long period (say 30+ years). Many modern security mechanisms, such as cryptography, are poorly suited to protect these archival records because it is often difficult to maintain decryption keys and update cryptographic systems over decades. An adversary that wants to tamper these archival records may only need to wait until the encryption algorithm used is compromised. In addition, the preservation of encrypted documents is not generally accepted in the international archival community. Thus, in this paper, we propose a framework for the assessment of the trustworthiness of digital records. The framework looks into evidence around digital records. On the assessment of the trustworthiness of a record, it structures the preserved evidence into an evidence tree and assigns evidential values to every pieces of evidence using experts' knowledge or a reputation system. Finally, using the Dempster-Shafer (D-S) theory, the framework combines these evidential values from different evidence in the face of uncertainty, and arrive at the trustworthiness of digital records.

[1]  Ling Liu,et al.  PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.

[2]  Diego Gambetta Can We Trust Trust , 2000 .

[3]  K.J.R. Liu,et al.  Attacks on Trust Evaluation in Distributed Networks , 2006, 2006 40th Annual Conference on Information Sciences and Systems.

[4]  Bandar Alhaqbani,et al.  A Time-Variant Medical Data Trustworthiness assessment model , 2009, 2009 11th International Conference on e-Health Networking, Applications and Services (Healthcom).

[5]  Habtamu Abie,et al.  Assessment of the Trustworthiness of Digital Records , 2011, IFIPTM.

[6]  Ethan L. Miller,et al.  POTSHARDS—a secure, recoverable, long-term archival storage system , 2009, TOS.

[7]  Filip Boudrez,et al.  Digital signatures and electronic records , 2007 .

[8]  Hans-Peter Kriegel,et al.  LOF: identifying density-based local outliers , 2000, SIGMOD '00.

[9]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[10]  W. R. Buckland,et al.  Outliers in Statistical Data , 1979 .

[11]  Raymond T. Ng,et al.  Finding Intensional Knowledge of Distance-Based Outliers , 1999, VLDB.

[12]  Martin Pilgram,et al.  Consultative Committee For Space Data Systems , 2009 .

[13]  Arthur P. Dempster,et al.  Upper and Lower Probabilities Induced by a Multivalued Mapping , 1967, Classic Works of the Dempster-Shafer Theory of Belief Functions.

[14]  Ccsds Secretariat,et al.  Reference Model for an Open Archival Information System (OAIS) , 1999 .

[15]  D. Collard,et al.  Trust : making and breaking cooperative relations , 1989 .

[16]  Glenn Shafer,et al.  A Mathematical Theory of Evidence , 2020, A Mathematical Theory of Evidence.

[17]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[18]  A. Jøsang Artificial Reasoning with Subjective Logic , 2008 .

[19]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[20]  Ethan L. Miller,et al.  Long-term threats to secure archives , 2006, StorageSS '06.

[21]  Thomas M. Chen,et al.  Dempster-Shafer theory for intrusion detection in ad hoc networks , 2005, IEEE Internet Computing.

[22]  Liuba Shrira,et al.  Providing high availability using lazy replication , 1992, TOCS.

[23]  Henry M. Gladney,et al.  Trustworthy 100-year digital objects: Evidence after every witness is dead , 2004, TOIS.

[24]  Habtamu Abie,et al.  Development and Validation of Requirements for Evidential Value for Assessing Trustworthiness of Digital Records over Time , 2010 .