Computing of Trust in Distributed Networks

نویسندگان

  • Huafei Zhu
  • Feng Bao
  • Robert H. Deng
چکیده

In distributed networks, a target party T could be a person never meet with a source party S, therefore S may not hold any prior evaluation of trustworthiness of T . To get permit to access S, T should be somewhat trusted by S. Consequently, we should study the approach to evaluate trustworthiness of T . To attack the problem, we view individual participant in distributed networks as a node of a delegation graph G and map a delegation path from target party T to source party S in networks into an edge in the correspondent transitive closure of graph G. Based on the transitive closure property of the graph G, we decompose the problem to three related questions below: -how to evaluate trustworthiness of participants in an edge? -how to compute trustworthiness of participants in a path? -how to evaluate the trustworthiness of a target participant in a transitive closure graph? We attack the above three questions by first computing trustworthiness of participants in distributed and authenticated channel. Then we present a practical approach to evaluate trustworthiness by removing the assumption of the authenticated channel in distributed networks.

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

DisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems

The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...

متن کامل

P2P Network Trust Management Survey

Peer-to-peer applications (P2P) are no longer limited to home users, and start being accepted in academic and corporate environments. While file sharing and instant messaging applications are the most traditional examples, they are no longer the only ones benefiting from the potential advantages of P2P networks. For example, network file storage, data transmission, distributed computing, and co...

متن کامل

GTrust: a group based trust model

Nowadays, the growth of virtual environments such as virtual organizations, social networks, and ubiquitous computing, has led to the adoption of trust concept. One of the methods of making trust in such environments is to use a long-term relationship with a trusted partner. The main problem of this kind of trust, which is based on personal experiences, is its limited domain. Moreover, both par...

متن کامل

Distributed Trust Management in Autonomic Networks

Title of dissertation: DISTRIBUTED TRUST MANAGEMENT IN AUTONOMIC NETWORKS Tao Jiang, Doctor of Philosophy, 2007 Dissertation directed by: Professor John S. Baras Department of Electrical and Computer Engineering The management of autonomic networks has gained more and more attentions because of their wide applications and control difficulties. Autonomic networks are decentralized and self-organ...

متن کامل

Interpersonal Trust in Online Scientific Social Networks: Causes and Results

Background and Aim: This study tends to investigate the reasons of interpersonal trust and the results of trust in online scientific social networks. Methods: The applied Research has been used cluster sampling to collect data. The study population consisted of Shiraz university and Persian Gulf university faculties. A sampling of 269 person was determined by Morgan table according to whole pop...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:
  • IACR Cryptology ePrint Archive

دوره 2003  شماره 

صفحات  -

تاریخ انتشار 2003