Trust in global computing systems as a limit property emerging from short range random interactions

Today we are experiencing a major reconsideration of the computing paradigm, as witnessed by the abundance and increasing frequency of use of terms such as ambient intelligence, ubiquitous computing, disappearing computer, grid computer, global computing and mobile ad-hoc networks. Systems that can be described with such terms are of a dynamic, with no clear physical boundary, nature and it seems that it is impossible (or, at least, difficult) to define sharply a number of important properties holding with certainty as well as holding throughout the whole lifetime of the system. One such system property, which is important for the viability of a system, is trust. Our departure point is the assumption that it seems very difficult to define static system properties related to trust and expect that they hold eternally in the rapidly changing systems falling under the new computing paradigm. One should, rather, attempt to define trust in terms of properties that hold with some limiting probability as the system grows and try to establish conditions that ensure that "good" properties hold almost certainly. Based on this viewpoint, in this paper we provide a new framework for defining trust through formally definable properties that hold, almost certainly, in the limit in randomly growing combinatorial structures that model "shapeless" computing systems (e.g., ad-hoc networks), drawing on results that establish the threshold behavior of predicates written in the first and second order logic

[1]  Walter Willinger,et al.  Towards a Theory of Scale-Free Graphs: Definition, Properties, and Implications , 2005, Internet Math..

[2]  John S. Baras,et al.  Trust evaluation in ad-hoc networks , 2004, WiSe '04.

[3]  Azadeh Iranmehr,et al.  Trust Management for Semantic Web , 2009, 2009 Second International Conference on Computer and Electrical Engineering.

[4]  Hector Garcia-Molina,et al.  The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.

[5]  Peter Dolan Undecidable statements and random graphs , 2005, Annals of Mathematics and Artificial Intelligence.

[6]  J.-M. Le Bars Fragments of existential second-order logic without 0-1 laws , 1998, Proceedings. Thirteenth Annual IEEE Symposium on Logic in Computer Science (Cat. No.98CB36226).

[7]  Morris Sloman,et al.  A survey of trust in internet applications , 2000, IEEE Communications Surveys & Tutorials.

[8]  J. Spencer The Strange Logic of Random Graphs , 2001 .

[9]  Ramanathan V. Guha,et al.  Propagation of trust and distrust , 2004, WWW '04.

[10]  J. Ferreirós From Frege to Gödel. A Source Book in Mathematical Logic, 1879¿1931: By Jean van Heijenoort. Cambridge, MA (Harvard University Press). 1967; new paperback edn., 2002. 664 pages, 1 halftone. ISBN: 0-674-32449-8. $27.95 , 2004 .

[11]  Audun Jøsang,et al.  The right type of trust for distributed systems , 1996, NSPW '96.

[12]  Phokion G. Kolaitis,et al.  The decision problem for the probabilities of higher-order properties , 1987, STOC.

[13]  Peter C. Cheeseman,et al.  Where the Really Hard Problems Are , 1991, IJCAI.

[14]  Alan M. Frieze,et al.  Random graphs , 2006, SODA '06.

[15]  P. Kidwell,et al.  The universal turing machine: a half-century survey , 1996, IEEE Annals of the History of Computing.

[16]  Ronald Fagin,et al.  Probabilities on finite models , 1976, Journal of Symbolic Logic.

[17]  John S. Baras,et al.  On Trust Establishment in Mobile Ad-Hoc Networks , 2002, Security Protocols Workshop.

[18]  Phokion G. Kolaitis,et al.  0-1 Laws for Fragments of Existential Second-Order Logic: A Survey , 2000, MFCS.

[19]  Paul G. Spirakis,et al.  Can Formalism Alone Provide an Answer to the Quest of a Viable Definition of Trust in the WWW Society? , 2009, e-Democracy.

[20]  Paul G. Spirakis,et al.  The Threshold Behaviour of the Fixed Radius Random Graph Model and Applications to the Key Management Problem of Sensor Networks , 2006, ALGOSENSORS.

[21]  P. R. Kumar,et al.  Critical power for asymptotic connectivity , 1998, Proceedings of the 37th IEEE Conference on Decision and Control (Cat. No.98CH36171).

[22]  Jean-Pierre Hubaux,et al.  The quest for security in mobile ad hoc networks , 2001, MobiHoc '01.

[23]  Joan Feigenbaum,et al.  Decentralized trust management , 1996, Proceedings 1996 IEEE Symposium on Security and Privacy.

[24]  Paul G. Spirakis,et al.  The Existence and Efficient Construction of Large Independent Sets in General Random Intersection Graphs , 2004, ICALP.