Multi-dimensional evidence-based trust management with multi-trusted paths
نویسندگان
چکیده
Trust management is an extensively investigated topic. A lot of trust models and systems have been proposed in the literature. However, a universally agreed trust model is rarely seen due to the fact that trust is essentially subjective and different people may have different views on it. We focus on the personalization of trust in order to catch this subjective nature of trust. We propose a multi-dimensional evidence-based trust management system with multi-trusted paths (MeTrust for short) to conduct trust computation on any arbitrarily complex trusted graph. The trust computation in MeTrust is conducted at three tiers, namely, the node tier, the path tier, and the graph tier. At the node tier, we consider multi-dimensional trust. Users can define a primary dimension and alternative dimensions on their own and users can make their own privileged strategies and setup weights for different dimensions for trust computation. At the path tier, we propose to use the Frank t-norm for users to control the decay rate for trust combination, which can be tuned in between the minimum trust combination (there is no decay in terms of the path length) and the product trust combination (the decay is too fast when the path length is relatively large). At the graph tier, we proposeGraphReduce,GraphAdjust, andWeightedAverage algorithms to simplify any arbitrarily complex trusted graph. We employ trust truncation and trust equivalence to guarantee that every link in the graphwill be used exactly once for trust computation.We evaluated trust truncation ratio and trust success ratio through extensive experiments, which can serve as a guide for users to select from a wide spectrum of trust parameters for trust computation. © 2010 Elsevier B.V. All rights reserved.
منابع مشابه
Trust-based on-demand multipath routing in mobile ad hoc networks
A Mobile Ad hoc NETwork (MANET) is a self-organized system comprised of mobile wireless nodes with peer relationships. Due to multi-hop routing and absence of any trusted third party in open environment, MANETs are vulnerable to attacks by malicious nodes. In order to decrease the hazards from malicious nodes, we introduce the concept of trust to MANETs and build a simple trust model to evaluat...
متن کاملA novel trust management framework for multi-cloud environments based on trust service providers
In this paper, we address the problem of trust management in multi-cloud environments using a trust management architecture based on a group of distributed Trust Service Providers (TSPs). These are independent third-party providers, trusted by Cloud Providers (CPs), Cloud Service Providers (CSPs) and Cloud Service Users (CSUs), that provide trust related services to cloud participants. TSPs are...
متن کاملIdentifying Factors for Managing Trust in Multi Agent Systems
Trust management is becoming crucial in open systems because they may contain malicious and untrustworthy service providers. Trust management in multi-agent systems (used to model open systems) has gained a huge amount of attention from researchers in recent years. In our previous work, we proposed a generic agent trust management framework, called ScubAA, which is based on the theory of Human ...
متن کاملTrust Based and Energy-Aware Routing Protocol for Heterogeneous Multihop Wireless Networks
In multihop wireless networks, when a mobile node wants to communicate with a destination, it relies on the other nodes to forward the packets. This multihop packet transmission can extend the network coverage area using limited power and improve area distance efficiency. In the proposed multihop wireless network E-STAR integrates the payment and trust systems with the routing protocol with the...
متن کاملTrust Managementfor Pervasive Computing Environments
Trust is essential for further and wider acceptance of contemporary e-services. It was first addressed almost thirty years ago in Trusted Computer System Evaluation Criteria standard by the US DoD. But this and other proposed approaches of that period were actually solving security. Roughly some ten years ago, methodologies followed that addressed trust phenomenon at its core, and they were bas...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید
ثبت ناماگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید
ورودعنوان ژورنال:
- Future Generation Comp. Syst.
دوره 27 شماره
صفحات -
تاریخ انتشار 2011