Trust and Privacy: Informal Ways to Assess Risk on Opportunistic Exchanges

With the astounding number of mobile devices and the increase of wireless capabilities, including the possibilities of direct interactions between them, without the use of a provider, the overall scenario becomes increasingly attractive. Whether on the way to work or out shopping, opportunistic encounters and exchanges of information can take place and render windows of opportunity, given one has the right tools. This work deals with the problem of assessing the risks that users take to interact with each other without a reliable source of information that could assign them a trust level. Informal signs such as periodicity of eventual early encounters are used to assess trust. The trust management system uses an ontology to normalize terms and facilitate the conversation between newly encountered concepts, possibly from other ontologies. A case is implemented to show the system’s possibilities.

[1]  C. Badcock,et al.  Trust : making and breaking cooperative relations , 1989 .

[2]  Marc Langheinrich,et al.  Privacy by Design - Principles of Privacy-Aware Ubiquitous Systems , 2001, UbiComp.

[3]  Djamel Djenouri,et al.  A survey of security issues in mobile ad hoc and sensor networks , 2005, IEEE Communications Surveys & Tutorials.

[4]  Munindar P. Singh,et al.  Developing trust in large-scale peer-to-peer systems , 2004, IEEE First Symposium onMulti-Agent Security and Survivability, 2004.

[5]  Rudinei Goularte,et al.  DOHand: An ontology to support building services to exploit handover information in mobile heterogeneous networks , 2006 .

[6]  D. Collard,et al.  Trust : making and breaking cooperative relations , 1989 .

[7]  Timothy W. Finin,et al.  Authorization and privacy for semantic Web services , 2004, IEEE Intelligent Systems.

[8]  Pan Hui,et al.  Exploiting contextual handover information for versatile services in NGN environments , 2007, 2007 2nd International Conference on Digital Information Management.

[9]  Joseph Gray Jackson,et al.  Privacy and Freedom , 1968 .

[10]  Harry Chen,et al.  An ontology for context-aware pervasive computing environments , 2003, The Knowledge Engineering Review.

[11]  Ian Horrocks,et al.  OWL Web Ontology Language Reference-W3C Recommen-dation , 2004 .

[12]  Diego Gambetta Can We Trust Trust , 2000 .

[13]  L. Stein,et al.  OWL Web Ontology Language - Reference , 2004 .

[14]  Jordi Sabater-Mir,et al.  Review on Computational Trust and Reputation Models , 2005, Artificial Intelligence Review.

[15]  Valérie Issarny,et al.  Enhanced Reputation Mechanism for Mobile Ad Hoc Networks , 2004, iTrust.

[16]  J. Nunamaker,et al.  Proceedings of the 32nd Hawaii International Conference on System Sciences , 1999 .

[17]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[18]  N. L. Chervany,et al.  THE MEANINGS OF TRUST , 2000 .

[19]  Luciana Andréia Fondazzi Martimiano,et al.  An ontology for privacy policy management in ubiquitous environments , 2008, NOMS 2008 - 2008 IEEE Network Operations and Management Symposium.