Advertisement

Trust Management Model and Architecture for Context-Aware Service Platforms

  • Ricardo Neisse
  • Maarten Wegdam
  • Marten van Sinderen
  • Gabriele Lenzini
Part of the Lecture Notes in Computer Science book series (LNCS, volume 4804)

Abstract

The entities participating in a context-aware service platform need to establish and manage trust relationships in order to assert different trust aspects including identity provisioning, privacy enforcement, and context information provisioning. Current trust management models address these trust aspects individually when in fact they are dependent on each other. In this paper we identify and analyze the trust relationships in a context-aware service platform and propose an integrated trust management model that supports quantification of trust for different trust aspects. Our model addresses a set of trust aspects that is relevant for our target context-aware service platform and is extensible with other trust aspects. We propose to calculate a resulting trust value for context-aware services, which considers the dependencies between the different trust aspects, and aims to support the users in the selection of the more trustworthy services. In this calculation we target two types of user goals: one with high priority in privacy enforcement (privacy concerned) and one with high priority in the service adaptation (service concerned). Based on our trust model we have designed a distributed trust management architecture and implemented a proof of concept prototype.

Keywords

Context Information Trust Relationship Trust Management Privacy Enforcement Direct Trust 
These keywords were added by machine and not by the authors. This process is experimental and the keywords may be updated as the learning algorithm improves.

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Lahlou, S., Langheinrich, M., Röcker, C.: Privacy and Trust Issues with Invisible Computers. Communications of ACM 48(3), 59–60 (2005)CrossRefGoogle Scholar
  2. 2.
    Sheikh, K., Wegdam, M., van Sinderen, M.J.: Middleware Support for Quality of Context in Pervasive Context-Aware Systems. In: Workshop Proc. of the Fifth IEEE Percom (2007)Google Scholar
  3. 3.
    Grandinson, T., Sloman, M.: A Survey of Trust in Internet Applications. IEEE Communications Surveys (2000)Google Scholar
  4. 4.
    Jøsang, A., Keser, C., Dimitrakos, T.: Can We Manage Trust? In: iTrust. the Proceedings of the Third International Conference on Trust Management (2005)Google Scholar
  5. 5.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust management. In: Blaze, M., Feigenbaum, J., Lacy, J. (eds.) IEEE Conference on Security and Privacy, Oakland, CA (May 1996)Google Scholar
  6. 6.
    Jøsang, A., Fabre, J., Hay, B., Dalziel, J., Pope, S.: Trust Requirements in Identity Management. In: Australasian Information Security Workshop 2005, Newcastle, Australia (January-February 2005)Google Scholar
  7. 7.
    Kolari, P., et al.: Enhancing P3P Framework through Policies and Trust. UMBC Technical Report, TR-CS-04-13 (September 2004), Available at http://ebiquity.umbc.edu/get/a/publication/118.pdf
  8. 8.
    Trust and Safety in eBay, Available at: http://pages.ebay.com/help/newtoebay/resolving-concerns.html
  9. 9.
    van Sinderen, M.J., van Halteren, A.T., Wegdam, M., Meeuwissen, H.B., Eertink, E.H.: Supporting Context-aware Mobile Applications: an Infrastructure Approach. IEEE Communication Magazine (September 2006)Google Scholar
  10. 10.
    Berendt, B., Günther, O., Spiekermann, S.: Privacy in E-Commerce: Stated Preferences vs. Actual Behavior. Communication of the ACM (CACM) 48(3) (2005)Google Scholar
  11. 11.
    JXTA Java peer-to-peer API. Available at: http://www.jxta.org
  12. 12.
    Jøsang, A.: A Logic for Uncertain Probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 9(3), 279–311 (2001)zbMATHMathSciNetGoogle Scholar
  13. 13.
    Neisse, R., Wegdam, M., van Sinderen, M.J.: Context-Aware Trust Domains. In: Havinga, P., Lijding, M., Meratnia, N., Wegdam, M. (eds.) EuroSSC 2006. LNCS, vol. 4272, pp. 234–237. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  14. 14.
    Daskapan, S., Ali Eldin, A., Wagenaar, R.: Trust in Mobile Context Aware Systems. In: 5th IBIMA. International Business Information Management Conference, Cairo, Egypt (2005)Google Scholar
  15. 15.
    Pons, A.: Biometric marketing: targeting the online consumer. Communications of ACM Magazine 49(8), 61–65 (2006)Google Scholar
  16. 16.
    Abdul-Rahman, A., Hailes, S.: Supporting trust in virtual communities. In: HICSS33. Proceedings of the 33rd Hawaii International Conference on System Sciences, Hawaii (2000)Google Scholar
  17. 17.
    Nielsen, M., Krukow, M.: Towards a Formal Notion of Trust. In: PPDP 2003. Proceedings of the 5th ACM SIGPLAN international conference on Principles and Practice of Declarative Programming, ACM Press, New York (2003)Google Scholar
  18. 18.
    Quinn, K., O’Sullivan, D., Lewis, D., Wade, V.P.: Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management. In: POLICY 2006, Canada (June 2006)Google Scholar
  19. 19.
    Almenárez, F., Marín, A., Campo, C., García, C.R.: A Pervasive Trust Management Model for Dynamic Open Environments. In: First Workshop on Pervasive Security and Trust in MobiQuitous, Boston, USA (2004)Google Scholar
  20. 20.
    Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware Trustworthiness Evaluation with Indirect Knowledge. In: SWPW 2006. proc. 2nd International Semantic Web Policy Workshop, Athens, USA (2006)Google Scholar
  21. 21.
    Mayer, R.C, Davis, J.H, Schoorman, D.F.: An Integrative Model of Organizational Trust. The Academy of Management Review 20(3), 709–734 (1995)CrossRefGoogle Scholar
  22. 22.
    Grandinson, T., Sloman, M.: Trust Management Tools for Internet Applications. In: Nixon, P., Terzis, S. (eds.) iTrust 2003. LNCS, vol. 2692, Springer, Heidelberg (2003)Google Scholar
  23. 23.
    Liberty Identity Federation Framework Architecture Overview, Version 1.2, Liberty Alliance Project. Available at: https://www.projectliberty.org/resources/
  24. 24.
    Toivonen, S., Denker, G.: The Impact of Context on the Trustworthiness of Communication: An Ontological Approach. In: Workshop on Trust, Security, and Reputation on the Semantic Web at the 3rdISWC, Japan (November 2004)Google Scholar
  25. 25.
    Toivonen, S., Lenzini, G., Uusitalo, I.: Context-aware Trust Evaluation Functions for Dynamic Reconfigurable Systems. In: MTW 2006. Workshop on Models of Trust for the Web MTW 2006, Edinburgh, Scotland (2006)Google Scholar
  26. 26.
    Hulsebosch, R.J., Salden, A.H., Bargh, M.S., Ebben, P.W., Reitsma, J.: Context sensitive access control. In: SACMAT 2005, Stockholm, Sweden (June 2005)Google Scholar
  27. 27.
    Jøsang, A., Hayward, R., Pope, S.: Trust Network Analysis with Subjective Logic. In: ACSC 2006. Proceedings of the Australasian Computer Science Conference, Hobart (January 2006)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2007

Authors and Affiliations

  • Ricardo Neisse
    • 1
  • Maarten Wegdam
    • 1
  • Marten van Sinderen
    • 1
  • Gabriele Lenzini
    • 2
  1. 1.CTIT, University of TwenteThe Netherlands
  2. 2.Telematica Instituut, EnschedeThe Netherlands

Personalised recommendations