Advertisement

Cluster Computing

, Volume 22, Supplement 1, pp 565–571 | Cite as

Assessment of recommendation trust for access control in open networks

  • Bin Zhao
  • Chuangbai Xiao
  • Yu Zhang
  • Peng Zhai
  • Zhi WangEmail author
Article

Abstract

Access control is an important means of ensuring information security, and trust-based access control has been considered as an effective mechanism for access control in open networks. To make access control mechanisms more effective, the assessment of trust has become a key issue. Among the different components of trust, recommendation trust plays a key role in environments and applications in which there are not enough direct interactions between entities, making direct trust less reliable. In this paper, we propose a method for the assessment of recommendation trust in which we try to solve the problem of weight assignment to decision attributes by using relevant theories in expert investigation, fuzzy analysis and gray correlation analysis. We also perform some experiment to show that the results of the proposed assessment method are in line with the actual ones to demonstrate the effectiveness of the proposed method as well as its advantages over some other comparable methods.

Keywords

Open networks Access control Trust assessment Recommendation 

Notes

Acknowledgements

The work in this paper has been supported by National Natural Science Foundation of China (61501008), National High-Tech R&D Program (863 Program) (2015AA017204), Beijing Natural Science Foundation (4162007) and Shandong Natural Science Foundation (ZR2013FQ024).

References

  1. 1.
    Han, H., Jung, H., Yeom, H.Y.: Aspect-oriented development of cluster computing software. Clust. Comput. 14(4), 357–375 (2011)CrossRefGoogle Scholar
  2. 2.
    Jia, X., Zhang, Y., Du, D.: Guest editorial on cluster computing in the internet. Clust. Comput. 7(1), 5 (2004)CrossRefGoogle Scholar
  3. 3.
    Kim, M., Sang, O.P.: Trust management on user behavioral patterns for a mobile cloud computing. Clust. Comput. 16(4), 725–731 (2013)CrossRefGoogle Scholar
  4. 4.
    Phoomvuthissarn, S.: Trust and role based access control for secure interoperation. In: Proceedings of the International Symposium on Communications and Information Technologies, Sydney, Australia, October, pp. 1458–1463 (2007)Google Scholar
  5. 5.
    Anakath, A.S., Rajakumar, S., Ambika, S.: Privacy preserving multi factor authentication using trust management. Clust. Comput. 9, 1–7 (2017)Google Scholar
  6. 6.
    Li, R., Tang, Z., Lu, Z., Hu, J.: Request-driven role mapping framework for secure interoperation in multi-domain environment. Int. J. Comput. Syst. Sci. Eng. 23(3), 193–206 (2008)Google Scholar
  7. 7.
    Sarrouh, N.: Formal modeling of trust-based access control in dynamic coalitions. In: IEEE 37th Annual Computer Software and Applications Conference (COMPSAC), Kyoto, Japan, pp. 224–229 (2013)Google Scholar
  8. 8.
    Zhang, Y.X., He, J.S., Zhao, B., Huang, Z.Q., Liu, R.H.: Towards more pro-active access control in computer systems and networks. Comput. Secur. 49, 132–146 (2015)CrossRefGoogle Scholar
  9. 9.
    Zhao, B., He, J.S., Huang, N., Zhang, Y.X., Liu, R.H.: Dynamic global trust evaluation based on balance weight. J. Beijing Univ. Posts Telecommun. 38(2), 113–117 (2015)Google Scholar
  10. 10.
    Ma, S.N., He, J.S., Shuai, X.B.: An access control method based on scenario trust. Int. J. Comput. Intell. Syst. 5(5), 942–952 (2012)CrossRefGoogle Scholar
  11. 11.
    Daniel, T., Nicola, Z., Sandro, E.: A distributed goal evaluation algorithm for trust management. Theory Pract. Log. Program. 14, 293–337 (2014)MathSciNetCrossRefGoogle Scholar
  12. 12.
    Smari, W.W., Clemente, P., Lalande, J.F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future generation computer systems. Int. J. Grid Comput. Sci. 31(2), 147–168 (2014)Google Scholar
  13. 13.
    Li, M., Sun, X.X., Wang, H.: Multi-level delegations with trust management in access control systems. J. Intell. Inf. Syst. 39(3), 611–626 (2012)CrossRefGoogle Scholar

Copyright information

© Springer Science+Business Media, LLC, part of Springer Nature 2018

Authors and Affiliations

  1. 1.College of Computer ScienceBeijing University of TechnologyBeijingChina
  2. 2.Department of Computer ScienceJining UniversityQufuChina
  3. 3.College of Computer and Control EngineeringNankai UniversityTianjinChina

Personalised recommendations