Chapter

Fusion Methodologies in Crisis Management

pp 389-420

Fusion Trust Service Assessment for Crisis Management Environments

  • Erik BlaschAffiliated withAir Force Research Laboratory, Information Directorate Email author 
  • , Youakim BadrAffiliated withCNRS, LIRIS, UMR5205, INSA-Lyon, Université de Lyon
  • , Salim HaririAffiliated withCenter for Cloud and Autonomic Computing, University of Arizona
  • , Youssif Al-NashifAffiliated withOld Dominion University

* Final gross prices may vary according to local VAT.

Get Access

Abstract

Future crisis management systems need resilient and trustworthy infrastructures to quickly develop reliable applications and processes, apply fusion techniques, and ensure end-to-end security, trust, and privacy. Due to the multiplicity and diversity of involved actors, volumes of data, and heterogeneity of shared information; crisis management systems tend to be highly vulnerable and subject to unforeseen incidents. As a result, the dependability of crisis management systems can be at risk. This chapter presents a cloud-based resilient and trustworthy infrastructure (known as rDaaS) to quickly develop secure crisis management systems. The rDaaS integrates the Dynamic Data-Driven Application Systems (DDDAS) paradigm into a service-oriented architecture over cloud technology and provides a set of resilient DDDAS-As-A Service (rDaaS) components to build secure and trusted adaptable crisis processes. One service presented includes the fusion of information from human observers and surveillance systems to assess the credibility (trust) of a crisis alert. The fusion trust service within the rDaaS also ensures resilience and security by obfuscating the execution environment and applying Behavior Software Encryption and Moving Technique Defense over the users, machines, and communication network. A simulation environment for a nuclear plant crisis management case study is illustrated to build resilient and trusted crisis response processes.

Keywords

rDaaS Information fusion Proportional conflict redistribution Resilience Cloud computing Service-oriented computing Trust Security