Modeling interaction using trust and recommendation in ubiquitous computing enivornment
نویسندگان
چکیده
To secure computing in pervasive environment, an adaptive trust and recommendation based access control model (based on human notion of trust) is proposed. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. X-bar control chart is used to handle malicious recommendation. The defense mechanisms incorporated by proposed model against attacks such as bad mouthing attack, oscillating behavior attack and conflicting behavior attack are also demonstrated.
منابع مشابه
GTrust: a group based trust model
Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...
متن کاملA Novel Trust Computation Method Based on User Ratings to Improve the Recommendation
Today, the trust has turned into one of the most beneficial solutions to improve recommender systems, especially in the collaborative filtering method. However, trust statements suffer from a number of shortcomings, including the trust statements sparsity, users' inability to express explicit trust for other users in most of the existing applications, etc. Thus to overcome these problems, this ...
متن کاملOn Trust for Ubiquitous Computing
As we move into a world of ubiquitous and pervasive computing, there is an increased interaction between people and smart devices, which have computing power. In such a world, computing power is moving from big desktops to very small and miniature devices and there is a seamless integration of computing power and day-to-day life. For such a world of computing, we believe that there is a need fo...
متن کاملA General Risk Assessment of Security in Pervasive Computing
There is currently much research into using trustbased mechanisms to secure computing in ubiquitous environments, which are typified by unforeseen circumstances, unexpected interactions, and unknown entities. Risk evaluation becomes essential to the trust-based decision-making process in these security mechanisms, especially when the trustworthiness of some entity is unknown and no recommendati...
متن کاملModeling Trust for Users and Agents in Ubiquitous Computing
A b s t r a c t Finding reliable partners for interactions is one of the challenges in ubiquitous computing and P2P systems. We believe, that this problem can be solved by assigning trust values to entities and allowing them to state opinions about the trustworthiness of others. In this paper, we introduce our vision of trust-aided computing, and we present a trust model, called CertainTrust, w...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- EURASIP J. Wireless Comm. and Networking
دوره 2012 شماره
صفحات -
تاریخ انتشار 2012