Evaluation of network trust using provenance based on distributed local intelligence

Provenance can play a significant role in a military information system for supporting the calculation of information trust. A node's trust can change over time after its initial deployment due to various reasons such as energy loss, environmental conditions or exhausting sources. We introduce a node-level trust-enhancing mechanism for information networks using provenance. A unique characteristic of the proposed trust architecture presented here is the use of provenance through the path of the information from source to destination in determining the information trust. In this proposed architecture each node in the system has a trust and provenance vector. Each information item transmitted over the network has a trust value associated with it. Nodes reexamine and update the trust value associated with the information, creating a distributed system that is more flexible and more responsive. As our system allows reconfigurations, initiatives taken by the intermediate nodes such as replacement of untrusted nodes will enhance the network trust in mission critical situations faster than a centralized approach.

[1]  Chris Cornelis,et al.  Towards a Provenance-Preserving Trust Model in Agent Networks , 2006, MTW.

[2]  Jennifer Golbeck,et al.  Using Trust and Provenance for Content Filtering on the Semantic Web , 2006, MTW.

[3]  Lance M. Kaplan,et al.  Target localization using proximity binary sensors , 2010, 2010 IEEE Aerospace Conference.

[4]  Daniel Crawl,et al.  A Provenance-Based Fault Tolerance Mechanism for Scientific Workflows , 2008, IPAW.

[5]  Margo Seltzer,et al.  Foundations for provenance-aware systems , 2010 .

[6]  Juliana Freire,et al.  Provenance and scientific workflows: challenges and opportunities , 2008, SIGMOD Conference.

[7]  Luc Moreau,et al.  Stream ancestor function: A mechanism for fine-grained provenance in stream processing systems , 2012, 2012 Sixth International Conference on Research Challenges in Information Science (RCIS).

[8]  Frank Kelly Dynamic Routing in Stochastic Networks , 1995 .

[9]  Margo I. Seltzer,et al.  Provenance: a future history , 2009, OOPSLA Companion.

[10]  Omer F. Rana,et al.  Evaluating Provenance-based Trust for Scientific Workflows , 2006, Sixth IEEE International Symposium on Cluster Computing and the Grid (CCGRID'06).

[11]  Ian Foster,et al.  The First Provenance Challenge , 2008 .

[12]  Wang Chiew Tan Provenance in Databases: Past, Current, and Future , 2007, IEEE Data Eng. Bull..

[13]  Pramod K. Varshney,et al.  An intelligent deployment and clustering algorithm for a distributed mobile sensor network , 2003, SMC'03 Conference Proceedings. 2003 IEEE International Conference on Systems, Man and Cybernetics. Conference Theme - System Security and Assurance (Cat. No.03CH37483).

[14]  Jennifer Widom,et al.  Trio: A System for Integrated Management of Data, Accuracy, and Lineage , 2004, CIDR.

[15]  Ping Ji,et al.  Tiered architecture for on-line detection, isolation and repair of faults in wireless sensor networks , 2008, MILCOM 2008 - 2008 IEEE Military Communications Conference.

[16]  James Cheney,et al.  Causality and the Semantics of Provenance , 2010, DCM.

[17]  Yang-Sae Moon,et al.  Assessing the Trustworthiness of Streaming Data , 2010 .