Measuring eTrust in Distributed Systems: General Concept and Application to Internet Voting

Emerging digital environments and infrastructures, such as distributed services and computing services, have generated new options of communication, information sharing, and resource utilization in past years. Different distributed trust concepts are applied to increase trust in such systems. However, these concepts yield to rather complex architectures which make it difficult to determine which component or system needs to be trusted. This paper presents a novel trust measurement method for distributed systems which enables the t identification of weak points in the overall system architecture. The measurement method includes the specification of a formal trust language and its representation by means of propositional logic formulas. The applicability of the proposed concepts is demonstrated by conducting a case study on the Internet voting system that was used in the 2007 parliamentary elections in Estonia.

[1]  Ülle Madise,et al.  E-voting in Estonia 2005. The first Practice of Country-wide binding Internet Voting in the World , 2006, Electronic Voting.

[2]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[3]  Melanie Volkamer,et al.  Determine the Resilience of Evaluated Internet Voting Systems , 2009, 2009 First International Workshop on Requirements Engineering for e-Voting Systems.

[4]  Epp Maaten,et al.  Towards Remote E-Voting: Estonian case , 2004, Electronic Voting in Europe.

[5]  Eric R. Verheul,et al.  Constructions and Properties of k out of n Visual Secret Sharing Schemes , 1997, Des. Codes Cryptogr..

[6]  Melanie Volkamer,et al.  Developing a Legal Framework for Remote Electronic Voting , 2009, VoteID.

[7]  David Chaum,et al.  Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.

[8]  Hans Ulrich Simon,et al.  Contrast-optimal k out of n secret sharing schemes in visual cryptography , 2000, Theor. Comput. Sci..

[9]  Sebastian Ries,et al.  Trust in ubiquitous computing , 2009 .

[10]  Jean-Jacques Quisquater,et al.  Electing a University President Using Open-Audit Voting: Analysis of Real-World Use of Helios , 2009, EVT/WOTE.

[11]  G. R. Blakley,et al.  Secret Sharing Schemes , 2011, Encyclopedia of Cryptography and Security.

[12]  Melanie Volkamer Evaluation of Electronic Voting - Requirements and Evaluation Procedures to Support Responsible Election Authorities , 2009, Lecture Notes in Business Information Processing.

[13]  Rolf Haenni,et al.  A Trust Evaluation Method Based on Logic and Probability Theory , 2008, IFIPTM.