An Interactive Trust Model for Application Market of the Internet of Things

The Internet of Things (IoT) application market (IAM) is supposed to be an effective approach for service distribution in the era of IoT. To protect the privacy and security of users, a systematic mechanism to determine the trustworthiness of the applications in the IAM is demanded. In this paper, an interactive trust model (ITM) is proposed based on interaction between application market and end users. In this model, application trustworthiness (AT) is quantitatively evaluated by the similarity between the application's behavior and the behavior expected by the user. In particular, by using the evaluation vector and feedback vector feature of application in the marketplace and behavior of applications on end devices can be exchanged in mathematical form to establish the connection between market and users. Behavior-based detecting agent on a users' device gives strong evidence about what applications have done to your privacy and security issues. Indicators derived by this model are presented in the market along with the application, and it helps users to more efficiently select the most appropriate application from the market.

[1]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[2]  Landon P. Cox Usefulness Is Not Trustworthiness , 2011, IEEE Internet Computing.

[3]  Xi Vincent Wang,et al.  DIMP: an interoperable solution for software integration and product data exchange , 2012, Enterp. Inf. Syst..

[4]  Li D. Xu Information architecture for supply chain quality management , 2011 .

[5]  Lida Xu,et al.  A Novel Architecture for Requirement-Oriented Participation Decision in Service Workflows , 2014, IEEE Transactions on Industrial Informatics.

[6]  Ninghui Li,et al.  Using probabilistic generative models for ranking risks of Android apps , 2012, CCS.

[7]  Wu He,et al.  Developing Vehicular Data Cloud Services in the IoT Environment , 2014, IEEE Transactions on Industrial Informatics.

[8]  Xiaozhu Chen,et al.  Enterprise systems in financial sector – an application in precious metal trading forecasting , 2013, Enterp. Inf. Syst..

[9]  Jinpeng Huai,et al.  Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition: Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition , 2010 .

[10]  Yong Chen,et al.  A System Framework of Security Management in Enterprise Systems , 2013 .

[11]  Zhongsheng Hua,et al.  A DS-AHP approach for multi-attribute decision making problem with incomplete information , 2008, Expert Syst. Appl..

[12]  Li D. Xu,et al.  Introduction: Systems Science in Industrial Sectors , 2013 .

[13]  Han Qiang,et al.  Data Mining Based Measurement Method for Software Trustworthiness , 2010, 2010 International Symposium on Intelligence Information Processing and Trusted Computing.

[14]  Lirong Zheng,et al.  Ecosystem analysis in the design of open platform-based in-home healthcare terminals towards the internet-of-things , 2013, 2013 15th International Conference on Advanced Communications Technology (ICACT).

[15]  Larisa Bulysheva,et al.  Enterprise systems in Russia: 1992–2012 , 2013, Enterp. Inf. Syst..

[16]  Adriano Valenzano,et al.  Review of Security Issues in Industrial Networks , 2013, IEEE Transactions on Industrial Informatics.

[17]  Valtteri Niemi,et al.  Exploring Trust of Mobile Applications Based on User Behaviors , 2009, INTRUST.

[18]  Lida Xu,et al.  IoT-Based Smart Rehabilitation System , 2014, IEEE Transactions on Industrial Informatics.

[19]  Charlie Miller,et al.  Mobile Attacks and Defense , 2011, IEEE Security & Privacy.

[20]  Lida Xu,et al.  Compliance Checking for Requirement-Oriented Service Workflow Interoperations , 2014, IEEE Transactions on Industrial Informatics.

[21]  Wu He,et al.  Integration of Distributed Enterprise Applications: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[22]  Wei Xu,et al.  A framework for service enterprise workflow simulation with multi-agents cooperation , 2013, Enterp. Inf. Syst..

[23]  Huilong Duan,et al.  Data configurations in railway signalling engineering - an application of enterprise systems techniques , 2013, Enterp. Inf. Syst..

[24]  Byung-Gon Chun,et al.  Vision: automated security validation of mobile apps at app markets , 2011, MCS '11.

[25]  Jihong Liu,et al.  An efficient and flexible web services-based multidisciplinary design optimisation framework for complex engineering systems , 2012, Enterp. Inf. Syst..

[26]  Juan Vicente Capella,et al.  Smartphone-Based Industrial Informatics Projects and Laboratories , 2013, IEEE Transactions on Industrial Informatics.

[27]  Rukshan Athauda,et al.  Determining Trustworthiness and Quality of Mobile Applications , 2012, MOBILWARE.

[28]  Jaehong Park,et al.  Towards usage control models: beyond traditional access control , 2002, SACMAT '02.

[29]  Kai Pan,et al.  Public and expert collaborative evaluation model and algorithm for enterprise knowledge , 2013, Enterp. Inf. Syst..

[30]  Byung-Gon Chun,et al.  TaintDroid: An Information-Flow Tracking System for Realtime Privacy Monitoring on Smartphones , 2010, OSDI.

[31]  Lida Xu,et al.  Internet of Things for Enterprise Systems of Modern Manufacturing , 2014, IEEE Transactions on Industrial Informatics.

[32]  Robert H. Deng,et al.  TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications , 2011, Personal and Ubiquitous Computing.

[33]  Jean-Henry Morin,et al.  Toward Internet of Things Application Markets , 2012, 2012 IEEE International Conference on Green Computing and Communications.

[34]  Adrian Holzer,et al.  Mobile application market: A developer's perspective , 2011, Telematics Informatics.

[35]  Peter J. Bentley,et al.  App Epidemics: Modelling the Effects of Publicity in a Mobile App Ecosystem , 2012, ALIFE.

[36]  L. Li Technology designed to combat fakes in the global supply chain , 2013 .

[37]  Margaret Butler,et al.  Android: Changing the Mobile Landscape , 2011, IEEE Pervasive Computing.

[38]  Lida Xu,et al.  The internet of things: a survey , 2014, Information Systems Frontiers.

[39]  Lida Xu,et al.  A New Approach for Compliance Checking in Service Workflows , 2014, IEEE Transactions on Industrial Informatics.

[40]  Vyas Sekar,et al.  Measuring user confidence in smartphone security and privacy , 2012, SOUPS.

[41]  Hao Yu,et al.  Advantages of Radial Basis Function Networks for Dynamic System Design , 2011, IEEE Transactions on Industrial Electronics.

[42]  Trent Jaeger,et al.  Design and Implementation of a TCG-based Integrity Measurement Architecture , 2004, USENIX Security Symposium.

[43]  Bogdan M. Wilamowski,et al.  Implementing a fuzzy system on a field programmable gate array , 2001, IJCNN'01. International Joint Conference on Neural Networks. Proceedings (Cat. No.01CH37222).

[44]  Audun Jøsang,et al.  A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..

[45]  Zeng Jin Dynamic Evolution Mechanism for Trustworthy Software Based on Service Composition , 2010 .

[46]  Lida Xu,et al.  An Integrated Approach to Snowmelt Flood Forecasting in Water Resource Management , 2014, IEEE Transactions on Industrial Informatics.

[47]  Okyay Kaynak,et al.  Oil well diagnosis by sensing terminal characteristics of the induction motor , 2000, IEEE Trans. Ind. Electron..

[48]  Wu He,et al.  Internet of Things in Industries: A Survey , 2014, IEEE Transactions on Industrial Informatics.

[49]  Qiang Chen,et al.  Design of a terminal solution for integration of in-home health care devices and services towards the Internet-of-Things , 2015, Enterp. Inf. Syst..

[50]  SandhuRavi,et al.  The UCONABC usage control model , 2004 .

[51]  Zhang Huanguo,et al.  A behavior-based remote trust attestation model , 2008, Wuhan University Journal of Natural Sciences.

[52]  Florian Michahelles,et al.  Explicit and Implicit Ratings for Mobile Applications , 2010, GI Jahrestagung.