SlideShare ist ein Scribd-Unternehmen logo
1 von 9
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
Abstract—Development of authorization mechanisms for secure information
access by a large community of users in an open environment is an important
problem in the ever-growing Internet world. In this paper we propose a
computational dynamic trust model for user authorization, rooted in findings from
social science. Unlike most existing computational trust models, this model
distinguishes trusting belief in integrity from that in competence in different
contexts and accounts for subjectivity in the evaluation of a particular trustee by
different trusters. Simulation studies were conducted to compare the performance
of the proposed integrity belief model with other trust models from the literature
for different user behavior patterns. Experiments show that the proposed model
achieves higher performance than other models especially in predicting the
behavior of unstable users.
EXISTING SYSTEM:
The social trust model, which guides the design of the computational model in this
paper, was proposed by McKnight and Chervany after surveying more than 60
papers across a wide range of disciplines. It has been validated via empirical study.
This model defines five conceptual trust types: trusting behavior, trusting intention,
trusting belief, institution-based trust, and disposition to trust. Trusting behavior is
an action that increases a truster’s risk or makes the truster vulnerable to the
trustee. Trusting intention indicates that a truster is willing to engage in trusting
behaviors with the trustee. A trusting intention implies a trust decision and leads to
a trusting behavior. Two subtypes of trusting intention are: 1) Willingness to
depend: the volitional preparedness to make oneself vulnerable to the trustee. 2)
Subjective probability of depending: the likelihood that a truster will depend on a
trustee. Trusting belief is a truster’s subjective belief in the fact that a trustee has
attributes beneficial to the truster. The following are the four attributes used most
often: 1) Competence: a trustee has the ability or expertise to perform certain tasks.
2) Benevolence: a trustee cares about a truster’s interests. 3) Integrity: a trustee is
honest and keeps commitments. 4) Predictability: a trustee’s actions are
sufficiently consistent. Institution-based trust is the belief that proper structural
conditions are in place to enhance the probability of achieving a successful
outcome. Two subtypes of institution-based trust are: 1) Structural assurance: the
belief that structures deployed promote positive outcomes. Structures include
guarantees, regulations, promises etc. 2) Situational normality: the belief that the
properly ordered environments facilitate success outcomes.
PROPOSED SYSTEM:
In this work, we propose a computational dynamic trust model for user
authorization. Mechanisms for building trusting belief using the first-hand (direct
experience) as well as second-hand information (recommendation and reputation)
are integrated into the model. The contributions of the model to computational trust
literature are:
_ The model is rooted in findings from social science, i.e., it provides automated
trust management that mimics trusting behaviors in the society, bringing trust
computation for the digital world closer to the evaluation of trust in the real world.
_ Unlike other trust models in the literature, the proposed model accounts for
different types of trust. Specifically, it distinguishes trusting belief in integrity from
that in competence.
_ The model takes into account the subjectivity of trust ratings by different entities,
and introduces a mechanism to eliminate the impact of subjectivity in reputation
aggregation.
Module1
Trust model
The trust model we propose in this paper distinguishes integrity trust from
competence trust. Competence trust is the trusting belief in a trustee’s ability or
expertise to perform certain tasks in a specific situation. Integrity trust is the belief
that a trustee is honest and acts in favor of the truster. Integrity and benevolence in
social trust models are combined together. Predictability is attached to a
competence or integrity belief as a secondary measure. The elements of the model
environment, as seen in Fig. 1, include two main types of actors, namely trusters
and trustees, a database of trust information, and different contexts, which depend
on the concerns of a truster and the competence of a trustee. For the online auction
site example in Section 1, let us assume that buyer B needs to decide whether to
authorize seller S to charge his credit card for an item I (authorize access to his
credit card/contactinformation). The elements of the model in this case are:
_ Trusters are the buyers registered to the auction site.
_ Trustees are the sellers registered to the auction site.
_ The context states how important for B the shipping, packaging and item quality
competences of S for item I are. It also states how important for B the integrity of
S is for this transaction.
_ B can gather trust information about S from a database maintained by the site or
a trusted third party. This information includes the ratings that S received from
buyers (including B’s previous ratings, if any) for competence in shipping,
packaging and quality of I as well as S’s integrity. It also includes the ratings of
buyers (including B) for sellers other than S in different contexts and ratings of S
for different items. Trust evaluation is recorded in the database when a buyer rates
a transaction with a seller on the site.
Module 2
Trusting belief
Beliefs in two attributes, competence and integrity, are separated. Context
identifier is included for competence belief. Values of both beliefs are real
numbers ranging from 0 to 1. The higher the value, the more a truster believes in a
trustee. Predictability is a positive real number. It characterizes the goodness of
belief formed. The smaller the predictability or uncertainty, the more confident a
truster is about the associated belief value. Both the variability of a trustee’s
behaviors and lack of observations negatively impact the goodness of belief
formed. iNumber in competence belief records the number of observations
accumulated. Trusting beliefs can be classified into initial and continuous trust.
Initial trust is the belief established before a truster t1 interacts with a trustee u1.
Continuous trust is the belief after t1 has had appropriate direct experience with u1.
Module 3
Global and Local Profiles
Each truster t1 has one global profile. The profile contains: (1) t1’s priori integrity
and competence trusting belief; (2) method preference policies; (3) imprecision
handling policies; (4) uncertainty handling policies; (5) parameters needed by
trust-building methods. t1 can have one local profile for each context. Local
profiles have a similar structure as global profiles. The content in a local profile
overrides that in the global one. Fig. 4 shows the definition of global and local
profiles. As aforementioned, method preference policies, defined as Preference
Policy, are to extend the partial order _ to a total order. Therefore, no two methods
have the same priority. iCompetence and cCompetence are used when building
initial and continuous competence trust respectively. iCompetence consists of four
parts corresponding to the four scenarios to build initial competence trust.
iIntegrity and cIntegrity are for establishing integrity trusting belief. Relationships
are separately defined on each ambiguous priority set.
Module 4
Integrity belief
Integrity may change fast with time. Furthermore, it possesses a meaningful trend.
Evaluation of integrity belief is based on two assumptions:
_ We assume integrity of a trustee is consistent in all contexts.
_ Integrity belief may vary largely with time. An example is a user behaving well
until he reaches a high trust value and then starts committing fraud. We used mean
as an estimator for competence belief as it is relatively steady with time. For
integrity belief, this assumption is excluded. When behavior patterns are present,
the mean is no more a good estimator. The similarity between a rating sequence
and a time series inspires us to adopt the method of double exponential moothing
[7] to predict the next rating based on a previous rating sequence. Let ri denote the
ith rating and fiþ1 denote the forecast value of riþ1 after observing the rating
sequence r1; . . . ; ri.
CONCLUSION
In this paper we presented a dynamic computational trust model for user
authorization. This model is rooted in findings from social science, and is not
limited to trusting belief as most computational methods are. We presented a
representation of context and functions that relate different contexts, enabling
building of trusting belief using crosscontext information. The proposed dynamic
trust model enables automated trust management that mimics trusting behaviors in
society, such as selecting a corporate partner, forming a coalition, or choosing
negotiation protocols or strategies in e-commerce. The formalization of trust helps
in designing algorithms to choose reliable resources in peer-to-peer systems,
developing secure protocols for ad hoc networks and detecting deceptive agents in
a virtual community. Experiments in a simulated trust environment show that the
proposed integrity trust model performs better than other major trust models in
predicting the behavior of users whose actions change based on certain patterns
over time.
REFERENCES
[1] G.R. Barnes and P.B. Cerrito, “A Mathematical Model for Interpersonal
Relationships in Social Networks,” Social Networks, vol. 20, no. 2, pp. 179-196,
1998.
[2] R. Brent, Algorithms for Minimization without Derivatives. Prentice- Hall,
1973.
[3] A. Das and M.M. Islam, “SecuredTrust: A Dynamic Trust Computation Model
for Secured Communication in Multiagent Systems,” IEEE Trans. Dependable and
Secure Computing, vol. 9, no. 2, pp. 261- 274, Mar./Apr. 2012.
[4] C. Dellarocas, “Immunizing Online Reputation Reporting Systems against
Unfair Ratings and Discriminatory Behavior,” Proc. Second ACM Conf.
Electronic Commerce, pp. 150-157, 2000.
[5] L. Fan, “A Grid Authorization Mechanism with Dynamic Role Based on Trust
Model,” J. Computational Information Systems, vol. 8, no. 12, pp. 5077-5084,
2012.
[6] T. Grandison and M. Sloman, “A Survey of Trust in Internet Applications,”
IEEE Comm. Surveys, vol. 3, no. 4, pp. 2-16, Fourth Quarter 2000.
[7] J.D.Hamilton, TimeSeriesAnalysis. PrincetonUniversity Press, 1994.
[8] J. Hu, Q. Wu, and B. Zhou, “FCTrust: A Robust and Efficient Feedback
Credibility-Based Distributed P2P Trust Model,” Proc. IEEE Ninth Int’l Conf.
Young Computer Scientists (ICYCS ‘08), pp. 1963- 1968, 2008.
[9] B. Lang, “A Computational Trust Model for Access Control in P2P,” Science
China Information Sciences, vol. 53, no. 5, pp. 896-910, May 2010.
[10] C. Liu and L. Liu, “A Trust Evaluation Model for Dynamic Authorization,”
Proc. Int’l Conf. Computational Intelligence and Software Eng. (CiSE), pp. 1-4,
2010.

Weitere ähnliche Inhalte

Andere mochten auch

Noticia nº de marzo
Noticia nº de marzoNoticia nº de marzo
Noticia nº de marzopao itze
 
3 Minit Terakhir dalam PdP (3MT)
3 Minit Terakhir dalam PdP (3MT)3 Minit Terakhir dalam PdP (3MT)
3 Minit Terakhir dalam PdP (3MT)Noraini Hasbollah
 
Проблема
ПроблемаПроблема
ПроблемаHelen Pisna
 
Vigilancia epidemiologica power point
Vigilancia epidemiologica power pointVigilancia epidemiologica power point
Vigilancia epidemiologica power pointImer Quiñones Rizzo
 
ешмагамбет жумкен+школа+дети
ешмагамбет жумкен+школа+детиешмагамбет жумкен+школа+дети
ешмагамбет жумкен+школа+детиZhumken Eshmagambet
 
Precision Marketing for when you need more Marketing Horsepower.
Precision Marketing for when you need more Marketing Horsepower. Precision Marketing for when you need more Marketing Horsepower.
Precision Marketing for when you need more Marketing Horsepower. 3degreeZ Marketing
 
Private and public goods ashley m
Private and public goods ashley mPrivate and public goods ashley m
Private and public goods ashley mamylh2525
 
Proyecto pedagógico sustentado en las TIC´s
Proyecto pedagógico sustentado en las TIC´sProyecto pedagógico sustentado en las TIC´s
Proyecto pedagógico sustentado en las TIC´smarrufo24c
 

Andere mochten auch (13)

Brandtzaeg master
Brandtzaeg masterBrandtzaeg master
Brandtzaeg master
 
Noticia nº de marzo
Noticia nº de marzoNoticia nº de marzo
Noticia nº de marzo
 
3 Minit Terakhir dalam PdP (3MT)
3 Minit Terakhir dalam PdP (3MT)3 Minit Terakhir dalam PdP (3MT)
3 Minit Terakhir dalam PdP (3MT)
 
Проблема
ПроблемаПроблема
Проблема
 
Vigilancia epidemiologica power point
Vigilancia epidemiologica power pointVigilancia epidemiologica power point
Vigilancia epidemiologica power point
 
Exploración de cuello!
Exploración de cuello!Exploración de cuello!
Exploración de cuello!
 
ешмагамбет жумкен+школа+дети
ешмагамбет жумкен+школа+детиешмагамбет жумкен+школа+дети
ешмагамбет жумкен+школа+дети
 
complex number
complex numbercomplex number
complex number
 
Precision Marketing for when you need more Marketing Horsepower.
Precision Marketing for when you need more Marketing Horsepower. Precision Marketing for when you need more Marketing Horsepower.
Precision Marketing for when you need more Marketing Horsepower.
 
Private and public goods ashley m
Private and public goods ashley mPrivate and public goods ashley m
Private and public goods ashley m
 
Kachkarda 2
Kachkarda 2Kachkarda 2
Kachkarda 2
 
Proyecto pedagógico sustentado en las TIC´s
Proyecto pedagógico sustentado en las TIC´sProyecto pedagógico sustentado en las TIC´s
Proyecto pedagógico sustentado en las TIC´s
 
Marketing Digital
Marketing DigitalMarketing Digital
Marketing Digital
 

Ähnlich wie A computational dynamic trust model

AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKijwscjournal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...graphhoc
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...IJECEIAES
 
TUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management SystemTUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management SystemCSCJournals
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDijngnjournal
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputationguestc12d53
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligencemahaveermalhi1
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingIRJET Journal
 
How Psychological Factors Shape DeFi Trustworthiness
How Psychological Factors Shape DeFi TrustworthinessHow Psychological Factors Shape DeFi Trustworthiness
How Psychological Factors Shape DeFi TrustworthinessThe Connecter
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...i_scienceEU
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Soudé Fazeli
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationAlejandro Bellogin
 
Trust Enabled Ecosystems
Trust Enabled EcosystemsTrust Enabled Ecosystems
Trust Enabled EcosystemsAlex Todd
 
Identifying_Factors_for_Managing_Trust_i
Identifying_Factors_for_Managing_Trust_iIdentifying_Factors_for_Managing_Trust_i
Identifying_Factors_for_Managing_Trust_iSamira Sadaoui
 
Trust Enabled Supply Networks - whitepaper
Trust Enabled Supply Networks - whitepaperTrust Enabled Supply Networks - whitepaper
Trust Enabled Supply Networks - whitepaperAlex Todd
 
Trust_Measures_and_Indicators_for_Investors[1]
Trust_Measures_and_Indicators_for_Investors[1]Trust_Measures_and_Indicators_for_Investors[1]
Trust_Measures_and_Indicators_for_Investors[1]Alex Todd
 
A Real Dynamic Cyber Trust Model
A Real Dynamic Cyber Trust ModelA Real Dynamic Cyber Trust Model
A Real Dynamic Cyber Trust Modelijtsrd
 
Iri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust FrameworkIri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust FrameworkLassonde School of Engineering
 

Ähnlich wie A computational dynamic trust model (20)

AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
TUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management SystemTUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management System
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
How Psychological Factors Shape DeFi Trustworthiness
How Psychological Factors Shape DeFi TrustworthinessHow Psychological Factors Shape DeFi Trustworthiness
How Psychological Factors Shape DeFi Trustworthiness
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix Factorization
 
Research Paper
Research Paper Research Paper
Research Paper
 
Trust Enabled Ecosystems
Trust Enabled EcosystemsTrust Enabled Ecosystems
Trust Enabled Ecosystems
 
Identifying_Factors_for_Managing_Trust_i
Identifying_Factors_for_Managing_Trust_iIdentifying_Factors_for_Managing_Trust_i
Identifying_Factors_for_Managing_Trust_i
 
Trust Enabled Supply Networks - whitepaper
Trust Enabled Supply Networks - whitepaperTrust Enabled Supply Networks - whitepaper
Trust Enabled Supply Networks - whitepaper
 
Trust_Measures_and_Indicators_for_Investors[1]
Trust_Measures_and_Indicators_for_Investors[1]Trust_Measures_and_Indicators_for_Investors[1]
Trust_Measures_and_Indicators_for_Investors[1]
 
A Real Dynamic Cyber Trust Model
A Real Dynamic Cyber Trust ModelA Real Dynamic Cyber Trust Model
A Real Dynamic Cyber Trust Model
 
Iri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust FrameworkIri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust Framework
 

Mehr von nexgentech15

Subgraph matching with set similarity in a
Subgraph matching with set similarity in aSubgraph matching with set similarity in a
Subgraph matching with set similarity in anexgentech15
 
Rule based method for entity resolution
Rule based method for entity resolutionRule based method for entity resolution
Rule based method for entity resolutionnexgentech15
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploadednexgentech15
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsnexgentech15
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudnexgentech15
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possessionnexgentech15
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers acrossnexgentech15
 
New algorithms for secure outsourcing of
New algorithms for secure outsourcing ofNew algorithms for secure outsourcing of
New algorithms for secure outsourcing ofnexgentech15
 
Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourcednexgentech15
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymousnexgentech15
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege andnexgentech15
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environmentnexgentech15
 
A profit maximization scheme with guaranteed
A profit maximization scheme with guaranteedA profit maximization scheme with guaranteed
A profit maximization scheme with guaranteednexgentech15
 
User defined privacy grid system
User defined privacy grid system User defined privacy grid system
User defined privacy grid system nexgentech15
 
Learning to rank image tags with limited
Learning to rank image tags with limitedLearning to rank image tags with limited
Learning to rank image tags with limitednexgentech15
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applicationsnexgentech15
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumnexgentech15
 
Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminativenexgentech15
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharingnexgentech15
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertainnexgentech15
 

Mehr von nexgentech15 (20)

Subgraph matching with set similarity in a
Subgraph matching with set similarity in aSubgraph matching with set similarity in a
Subgraph matching with set similarity in a
 
Rule based method for entity resolution
Rule based method for entity resolutionRule based method for entity resolution
Rule based method for entity resolution
 
Privacy policy inference of user uploaded
Privacy policy inference of user uploadedPrivacy policy inference of user uploaded
Privacy policy inference of user uploaded
 
Discovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile appsDiscovery of ranking fraud for mobile apps
Discovery of ranking fraud for mobile apps
 
Secure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloudSecure auditing and deduplicating data in cloud
Secure auditing and deduplicating data in cloud
 
Provable multicopy dynamic data possession
Provable multicopy dynamic data possessionProvable multicopy dynamic data possession
Provable multicopy dynamic data possession
 
Orchestrating bulk data transfers across
Orchestrating bulk data transfers acrossOrchestrating bulk data transfers across
Orchestrating bulk data transfers across
 
New algorithms for secure outsourcing of
New algorithms for secure outsourcing ofNew algorithms for secure outsourcing of
New algorithms for secure outsourcing of
 
Identity based encryption with outsourced
Identity based encryption with outsourcedIdentity based encryption with outsourced
Identity based encryption with outsourced
 
Cost effective authentic and anonymous
Cost effective authentic and anonymousCost effective authentic and anonymous
Cost effective authentic and anonymous
 
Control cloud data access privilege and
Control cloud data access privilege andControl cloud data access privilege and
Control cloud data access privilege and
 
A trusted iaa s environment
A trusted iaa s environmentA trusted iaa s environment
A trusted iaa s environment
 
A profit maximization scheme with guaranteed
A profit maximization scheme with guaranteedA profit maximization scheme with guaranteed
A profit maximization scheme with guaranteed
 
User defined privacy grid system
User defined privacy grid system User defined privacy grid system
User defined privacy grid system
 
Learning to rank image tags with limited
Learning to rank image tags with limitedLearning to rank image tags with limited
Learning to rank image tags with limited
 
Detecting malicious facebook applications
Detecting malicious facebook applicationsDetecting malicious facebook applications
Detecting malicious facebook applications
 
Collusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sumCollusion tolerable privacy-preserving sum
Collusion tolerable privacy-preserving sum
 
Automatic face naming by learning discriminative
Automatic face naming by learning discriminativeAutomatic face naming by learning discriminative
Automatic face naming by learning discriminative
 
Space efficient verifiable secret sharing
Space efficient verifiable secret sharingSpace efficient verifiable secret sharing
Space efficient verifiable secret sharing
 
Query aware determinization of uncertain
Query aware determinization of uncertainQuery aware determinization of uncertain
Query aware determinization of uncertain
 

Kürzlich hochgeladen

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxheathfieldcps1
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsTechSoup
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpinRaunakKeshri1
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...fonyou31
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxiammrhaywood
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhikauryashika82
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...christianmathematics
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Celine George
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajanpragatimahajan3
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAssociation for Project Management
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactPECB
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13Steve Thomason
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDThiyagu K
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024Janet Corral
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Sapana Sha
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationnomboosow
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Disha Kariya
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingTeacherCyreneCayanan
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdfSoniaTolstoy
 

Kürzlich hochgeladen (20)

The basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptxThe basics of sentences session 2pptx copy.pptx
The basics of sentences session 2pptx copy.pptx
 
Introduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The BasicsIntroduction to Nonprofit Accounting: The Basics
Introduction to Nonprofit Accounting: The Basics
 
Student login on Anyboli platform.helpin
Student login on Anyboli platform.helpinStudent login on Anyboli platform.helpin
Student login on Anyboli platform.helpin
 
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
Ecosystem Interactions Class Discussion Presentation in Blue Green Lined Styl...
 
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptxSOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
SOCIAL AND HISTORICAL CONTEXT - LFTVD.pptx
 
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in DelhiRussian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
Russian Escort Service in Delhi 11k Hotel Foreigner Russian Call Girls in Delhi
 
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
Explore beautiful and ugly buildings. Mathematics helps us create beautiful d...
 
Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17Advanced Views - Calendar View in Odoo 17
Advanced Views - Calendar View in Odoo 17
 
social pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajansocial pharmacy d-pharm 1st year by Pragati K. Mahajan
social pharmacy d-pharm 1st year by Pragati K. Mahajan
 
APM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across SectorsAPM Welcome, APM North West Network Conference, Synergies Across Sectors
APM Welcome, APM North West Network Conference, Synergies Across Sectors
 
Beyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global ImpactBeyond the EU: DORA and NIS 2 Directive's Global Impact
Beyond the EU: DORA and NIS 2 Directive's Global Impact
 
The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13The Most Excellent Way | 1 Corinthians 13
The Most Excellent Way | 1 Corinthians 13
 
Measures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SDMeasures of Dispersion and Variability: Range, QD, AD and SD
Measures of Dispersion and Variability: Range, QD, AD and SD
 
General AI for Medical Educators April 2024
General AI for Medical Educators April 2024General AI for Medical Educators April 2024
General AI for Medical Educators April 2024
 
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111Call Girls in Dwarka Mor Delhi Contact Us 9654467111
Call Girls in Dwarka Mor Delhi Contact Us 9654467111
 
Interactive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communicationInteractive Powerpoint_How to Master effective communication
Interactive Powerpoint_How to Master effective communication
 
Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..Sports & Fitness Value Added Course FY..
Sports & Fitness Value Added Course FY..
 
Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1Código Creativo y Arte de Software | Unidad 1
Código Creativo y Arte de Software | Unidad 1
 
fourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writingfourth grading exam for kindergarten in writing
fourth grading exam for kindergarten in writing
 
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdfBASLIQ CURRENT LOOKBOOK  LOOKBOOK(1) (1).pdf
BASLIQ CURRENT LOOKBOOK LOOKBOOK(1) (1).pdf
 

A computational dynamic trust model

  • 1. A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION Abstract—Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for user authorization, rooted in findings from social science. Unlike most existing computational trust models, this model distinguishes trusting belief in integrity from that in competence in different contexts and accounts for subjectivity in the evaluation of a particular trustee by different trusters. Simulation studies were conducted to compare the performance of the proposed integrity belief model with other trust models from the literature for different user behavior patterns. Experiments show that the proposed model achieves higher performance than other models especially in predicting the behavior of unstable users. EXISTING SYSTEM: The social trust model, which guides the design of the computational model in this paper, was proposed by McKnight and Chervany after surveying more than 60 papers across a wide range of disciplines. It has been validated via empirical study. This model defines five conceptual trust types: trusting behavior, trusting intention,
  • 2. trusting belief, institution-based trust, and disposition to trust. Trusting behavior is an action that increases a truster’s risk or makes the truster vulnerable to the trustee. Trusting intention indicates that a truster is willing to engage in trusting behaviors with the trustee. A trusting intention implies a trust decision and leads to a trusting behavior. Two subtypes of trusting intention are: 1) Willingness to depend: the volitional preparedness to make oneself vulnerable to the trustee. 2) Subjective probability of depending: the likelihood that a truster will depend on a trustee. Trusting belief is a truster’s subjective belief in the fact that a trustee has attributes beneficial to the truster. The following are the four attributes used most often: 1) Competence: a trustee has the ability or expertise to perform certain tasks. 2) Benevolence: a trustee cares about a truster’s interests. 3) Integrity: a trustee is honest and keeps commitments. 4) Predictability: a trustee’s actions are sufficiently consistent. Institution-based trust is the belief that proper structural conditions are in place to enhance the probability of achieving a successful outcome. Two subtypes of institution-based trust are: 1) Structural assurance: the belief that structures deployed promote positive outcomes. Structures include guarantees, regulations, promises etc. 2) Situational normality: the belief that the properly ordered environments facilitate success outcomes. PROPOSED SYSTEM:
  • 3. In this work, we propose a computational dynamic trust model for user authorization. Mechanisms for building trusting belief using the first-hand (direct experience) as well as second-hand information (recommendation and reputation) are integrated into the model. The contributions of the model to computational trust literature are: _ The model is rooted in findings from social science, i.e., it provides automated trust management that mimics trusting behaviors in the society, bringing trust computation for the digital world closer to the evaluation of trust in the real world. _ Unlike other trust models in the literature, the proposed model accounts for different types of trust. Specifically, it distinguishes trusting belief in integrity from that in competence. _ The model takes into account the subjectivity of trust ratings by different entities, and introduces a mechanism to eliminate the impact of subjectivity in reputation aggregation. Module1 Trust model The trust model we propose in this paper distinguishes integrity trust from competence trust. Competence trust is the trusting belief in a trustee’s ability or
  • 4. expertise to perform certain tasks in a specific situation. Integrity trust is the belief that a trustee is honest and acts in favor of the truster. Integrity and benevolence in social trust models are combined together. Predictability is attached to a competence or integrity belief as a secondary measure. The elements of the model environment, as seen in Fig. 1, include two main types of actors, namely trusters and trustees, a database of trust information, and different contexts, which depend on the concerns of a truster and the competence of a trustee. For the online auction site example in Section 1, let us assume that buyer B needs to decide whether to authorize seller S to charge his credit card for an item I (authorize access to his credit card/contactinformation). The elements of the model in this case are: _ Trusters are the buyers registered to the auction site. _ Trustees are the sellers registered to the auction site. _ The context states how important for B the shipping, packaging and item quality competences of S for item I are. It also states how important for B the integrity of S is for this transaction. _ B can gather trust information about S from a database maintained by the site or a trusted third party. This information includes the ratings that S received from buyers (including B’s previous ratings, if any) for competence in shipping, packaging and quality of I as well as S’s integrity. It also includes the ratings of buyers (including B) for sellers other than S in different contexts and ratings of S
  • 5. for different items. Trust evaluation is recorded in the database when a buyer rates a transaction with a seller on the site. Module 2 Trusting belief Beliefs in two attributes, competence and integrity, are separated. Context identifier is included for competence belief. Values of both beliefs are real numbers ranging from 0 to 1. The higher the value, the more a truster believes in a trustee. Predictability is a positive real number. It characterizes the goodness of belief formed. The smaller the predictability or uncertainty, the more confident a truster is about the associated belief value. Both the variability of a trustee’s behaviors and lack of observations negatively impact the goodness of belief formed. iNumber in competence belief records the number of observations accumulated. Trusting beliefs can be classified into initial and continuous trust. Initial trust is the belief established before a truster t1 interacts with a trustee u1. Continuous trust is the belief after t1 has had appropriate direct experience with u1. Module 3 Global and Local Profiles Each truster t1 has one global profile. The profile contains: (1) t1’s priori integrity and competence trusting belief; (2) method preference policies; (3) imprecision
  • 6. handling policies; (4) uncertainty handling policies; (5) parameters needed by trust-building methods. t1 can have one local profile for each context. Local profiles have a similar structure as global profiles. The content in a local profile overrides that in the global one. Fig. 4 shows the definition of global and local profiles. As aforementioned, method preference policies, defined as Preference Policy, are to extend the partial order _ to a total order. Therefore, no two methods have the same priority. iCompetence and cCompetence are used when building initial and continuous competence trust respectively. iCompetence consists of four parts corresponding to the four scenarios to build initial competence trust. iIntegrity and cIntegrity are for establishing integrity trusting belief. Relationships are separately defined on each ambiguous priority set. Module 4 Integrity belief Integrity may change fast with time. Furthermore, it possesses a meaningful trend. Evaluation of integrity belief is based on two assumptions: _ We assume integrity of a trustee is consistent in all contexts. _ Integrity belief may vary largely with time. An example is a user behaving well until he reaches a high trust value and then starts committing fraud. We used mean as an estimator for competence belief as it is relatively steady with time. For integrity belief, this assumption is excluded. When behavior patterns are present,
  • 7. the mean is no more a good estimator. The similarity between a rating sequence and a time series inspires us to adopt the method of double exponential moothing [7] to predict the next rating based on a previous rating sequence. Let ri denote the ith rating and fiþ1 denote the forecast value of riþ1 after observing the rating sequence r1; . . . ; ri. CONCLUSION In this paper we presented a dynamic computational trust model for user authorization. This model is rooted in findings from social science, and is not limited to trusting belief as most computational methods are. We presented a representation of context and functions that relate different contexts, enabling building of trusting belief using crosscontext information. The proposed dynamic trust model enables automated trust management that mimics trusting behaviors in society, such as selecting a corporate partner, forming a coalition, or choosing negotiation protocols or strategies in e-commerce. The formalization of trust helps in designing algorithms to choose reliable resources in peer-to-peer systems, developing secure protocols for ad hoc networks and detecting deceptive agents in a virtual community. Experiments in a simulated trust environment show that the proposed integrity trust model performs better than other major trust models in predicting the behavior of users whose actions change based on certain patterns over time.
  • 8. REFERENCES [1] G.R. Barnes and P.B. Cerrito, “A Mathematical Model for Interpersonal Relationships in Social Networks,” Social Networks, vol. 20, no. 2, pp. 179-196, 1998. [2] R. Brent, Algorithms for Minimization without Derivatives. Prentice- Hall, 1973. [3] A. Das and M.M. Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems,” IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 261- 274, Mar./Apr. 2012. [4] C. Dellarocas, “Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior,” Proc. Second ACM Conf. Electronic Commerce, pp. 150-157, 2000. [5] L. Fan, “A Grid Authorization Mechanism with Dynamic Role Based on Trust Model,” J. Computational Information Systems, vol. 8, no. 12, pp. 5077-5084, 2012. [6] T. Grandison and M. Sloman, “A Survey of Trust in Internet Applications,” IEEE Comm. Surveys, vol. 3, no. 4, pp. 2-16, Fourth Quarter 2000. [7] J.D.Hamilton, TimeSeriesAnalysis. PrincetonUniversity Press, 1994.
  • 9. [8] J. Hu, Q. Wu, and B. Zhou, “FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model,” Proc. IEEE Ninth Int’l Conf. Young Computer Scientists (ICYCS ‘08), pp. 1963- 1968, 2008. [9] B. Lang, “A Computational Trust Model for Access Control in P2P,” Science China Information Sciences, vol. 53, no. 5, pp. 896-910, May 2010. [10] C. Liu and L. Liu, “A Trust Evaluation Model for Dynamic Authorization,” Proc. Int’l Conf. Computational Intelligence and Software Eng. (CiSE), pp. 1-4, 2010.