Context-Driven Adaptation of Trust Relationships in Pervasive Collaborative Environments

The growing diffusion of portable devices with wireless connectivity and the integration of telecommunication systems and the Internet enable users to benefit from anytime and anywhere impromptu collaboration. Security is crucial to ensure secure sharing of information, but calls for novel solutions capable of establishing trust relationships on-the-fly among previously unknown entities. Traditional trust solutions seem to be inappropriate in dynamic mobile environments. They typically rely on centralised trust certification authorities and assign to entities levels of trust that depend on static entity attributes, such as entity identity or role. However, entity identities/roles are often either not sufficiently informative or too limited to take adequate collaborative decisions. This paper presents a novel trust model that rules the assignment of trust to entities based on various dynamic context information, e.g., user/device location, device properties, user needs, local operating conditions. As key features, this model allows to determine, to associate and to adapt entity levels of trust depending on the contexts where users operate and users acquire/lose a level of trust when entering/leaving a specific context. The proposed model facilitates the update of trust relationships as relevant changes in context information occur. The paper also shows the implementation of the proposed model in the COMITY framework that provides support facilities for defining and enforcing context-based trust policies.

[1]  Jean Bacon,et al.  Trust for Ubiquitous, Transparent Collaboration , 2004, Wirel. Networks.

[2]  Stephen Hailes,et al.  Supporting trust in virtual communities , 2000, Proceedings of the 33rd Annual Hawaii International Conference on System Sciences.

[3]  Antonio Corradi,et al.  Context-based access control management in ubiquitous environments , 2004, Third IEEE International Symposium on Network Computing and Applications, 2004. (NCA 2004). Proceedings..

[4]  Refik Molva,et al.  Security in Ad Hoc Networks , 2003, PWC.

[5]  Antonio Corradi,et al.  Policy-Driven Management of Agent Systems , 2001, POLICY.

[6]  Philip R. Zimmermann,et al.  The official PGP user's guide , 1996 .

[7]  Jon Howell,et al.  A Formal Semantics for SPKI , 2000, ESORICS.

[8]  Timothy W. Finin,et al.  Trust-Based Security in Pervasive Computing Environments , 2022 .