An automated trust negotiation model based on improved coloured timed Petri net

In cross-domain computation, the establishment of mutual trust relationship between entities is the premise and basis of secure interaction. Automated trust negotiation (ATN) is an approach that establishes mutual trust between strangers wishing to share resources or conduct business by gradually requesting and disclosing credentials. According to the weaknesses of conventional ATN models, which are based on the resource unlocking strategy of ordinary tree, this paper puts forward an improved coloured timed Petri net-based ATN model and the concept of optimum certificate set, which could serve simultaneous requests of multiple target resources. Along with synchronised negotiation for finding the optimum certificate set, the negotiation effeciency is substantially improved. Moreover, this model added periodic time constraint mechanism of resource, and increased security ensurance factors for the resource sharing in cross-domain calculation.

[1]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[2]  Jin Hai,et al.  Automated Trust Negotiation and Its Development Trend , 2006 .

[3]  K.E. Seamons,et al.  Automated trust negotiation , 2000, Proceedings DARPA Information Survivability Conference and Exposition. DISCEX'00.

[4]  Liu Yun,et al.  Research on Modeling of Multiparty Trust Negotiation Based on Coloured Petri-net in P2P Network , 2010, 2010 Second International Conference on Networks Security, Wireless Communications and Trusted Computing.

[5]  Hélène Kirchner,et al.  Secure interoperation design in multi-domains environments based on colored Petri nets , 2013, Inf. Sci..

[6]  Feng Xiao,et al.  Resolving conflicts between negotiation success and sensitive information protection in automated trust negotiation , 2011, Frontiers of Computer Science in China.

[7]  Elisa Bertino,et al.  A Flexible Approach to Multisession Trust Negotiations , 2012, IEEE Transactions on Dependable and Secure Computing.

[8]  Wang Xiao A Weighted Role and Periodic Time Access Control Model of WorkFlow System , 2003 .

[9]  Hai Jin,et al.  Building Automated Trust Negotiation architecture in virtual computing environment , 2009, The Journal of Supercomputing.

[10]  Feng Xiao,et al.  A Peer-to-Peer Framework for Accelerating Trust Establishment in Automated Trust Negotiation , 2010 .