Assessment of recommendation trust for access control in open networks
- 103 Downloads
Access control is an important means of ensuring information security, and trust-based access control has been considered as an effective mechanism for access control in open networks. To make access control mechanisms more effective, the assessment of trust has become a key issue. Among the different components of trust, recommendation trust plays a key role in environments and applications in which there are not enough direct interactions between entities, making direct trust less reliable. In this paper, we propose a method for the assessment of recommendation trust in which we try to solve the problem of weight assignment to decision attributes by using relevant theories in expert investigation, fuzzy analysis and gray correlation analysis. We also perform some experiment to show that the results of the proposed assessment method are in line with the actual ones to demonstrate the effectiveness of the proposed method as well as its advantages over some other comparable methods.
KeywordsOpen networks Access control Trust assessment Recommendation
The work in this paper has been supported by National Natural Science Foundation of China (61501008), National High-Tech R&D Program (863 Program) (2015AA017204), Beijing Natural Science Foundation (4162007) and Shandong Natural Science Foundation (ZR2013FQ024).
- 4.Phoomvuthissarn, S.: Trust and role based access control for secure interoperation. In: Proceedings of the International Symposium on Communications and Information Technologies, Sydney, Australia, October, pp. 1458–1463 (2007)Google Scholar
- 5.Anakath, A.S., Rajakumar, S., Ambika, S.: Privacy preserving multi factor authentication using trust management. Clust. Comput. 9, 1–7 (2017)Google Scholar
- 6.Li, R., Tang, Z., Lu, Z., Hu, J.: Request-driven role mapping framework for secure interoperation in multi-domain environment. Int. J. Comput. Syst. Sci. Eng. 23(3), 193–206 (2008)Google Scholar
- 7.Sarrouh, N.: Formal modeling of trust-based access control in dynamic coalitions. In: IEEE 37th Annual Computer Software and Applications Conference (COMPSAC), Kyoto, Japan, pp. 224–229 (2013)Google Scholar
- 9.Zhao, B., He, J.S., Huang, N., Zhang, Y.X., Liu, R.H.: Dynamic global trust evaluation based on balance weight. J. Beijing Univ. Posts Telecommun. 38(2), 113–117 (2015)Google Scholar
- 12.Smari, W.W., Clemente, P., Lalande, J.F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future generation computer systems. Int. J. Grid Comput. Sci. 31(2), 147–168 (2014)Google Scholar