A trusted measurement scheme suitable for the clients in the trusted network

The trusted network connection is a hot spot in trusted computing field and the trust measurement and access control technology are used to deal with network security threats in trusted network. But the trusted network connection lacks fine-grained states and real-time measurement support for the client and the authentication mechanism is difficult to apply in the trusted network connection, it is easy to cause the loss of identity privacy. In order to solve the above-described problems, this paper presents a trust measurement scheme suitable for clients in the trusted network, the scheme integrates the following attributes such as authentication mechanism, state measurement, and real-time state measurement and so on, and based on the authentication mechanism and the initial state measurement, the scheme uses the real-time state measurement as the core method to complete the trust measurement for the client. This scheme presented in this paper supports both static and dynamic measurements. Overall, the characteristics of this scheme such as fine granularity, dynamic, real-time state measurement make it possible to make more fine-grained security policy and therefore it overcomes inadequacies existing in the current trusted network connection.

[1]  Zhenfu Cao,et al.  Survey of information security , 2007, Science in China Series F: Information Sciences.

[2]  Qu Yan-sheng Information exchange model of multi control nodes in trustworthy and controllable network , 2010 .

[3]  Ali Miri,et al.  Combining Attribute-Based and Access Systems , 2009, 2009 International Conference on Computational Science and Engineering.

[4]  Mozhgan Tavakolifard,et al.  Similarity-based Techniques for Trust Management , 2010 .

[5]  John S. Baras,et al.  On trust models and trust evaluation metrics for ad hoc networks , 2006, IEEE Journal on Selected Areas in Communications.

[6]  Brent Waters,et al.  Efficient Identity-Based Encryption Without Random Oracles , 2005, EUROCRYPT.

[7]  Julita Vassileva,et al.  Bayesian Network Trust Model in Peer-to-Peer Networks , 2003, AP2PC.

[8]  Munindar P. Singh,et al.  Generalized framework for personalized recommendations in agent networks , 2012, Autonomous Agents and Multi-Agent Systems.

[9]  Nicholas R. Jennings,et al.  TRAVOS: Trust and Reputation in the Context of Inaccurate Information Sources , 2006, Autonomous Agents and Multi-Agent Systems.

[10]  Oded Goldreich,et al.  Foundations of Cryptography: Volume 1, Basic Tools , 2001 .

[11]  Emiliano Lorini,et al.  A logic of trust and reputation , 2010, Log. J. IGPL.