Advertisement

Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications

  • Martin Serrano
  • Sven van der Meer
  • John Strassner
  • Stefano De Paoli
  • Aphra Kerr
  • Cristiano Storni
Part of the Lecture Notes in Computer Science book series (LNCS, volume 5586)

Abstract

Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research challenges in autonomic management to provide self-protection mechanisms and tools by using trust and reputation concepts based on policy-based management to decentralize management decisions. This work also uses user-based reputation mechanisms to help enforce trust management in pervasive and communications services. The scope of this research is founded in social models, where the application of trust and reputation applied in communication systems helps detect potential users as well as hackers attempting to corrupt management operations and services. These so-called “cheating services” act as “attacks”, altering the performance and the security in communication systems by consumption of computing or network resources unnecessarily.

Keywords

Trust Management Pervasive Services Policy-Based Management Autonomic Communications Pervasive Computing Reputation Mechanisms Systems Management Social Networks Information Systems 

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. 1.
    Ruohomaa, S., Kutvonen, L.: Trust Management Survey. In: Herrmann, P., Issarny, V., Shiu, S.C.K. (eds.) iTrust 2005. LNCS, vol. 3477, pp. 77–92. Springer, Heidelberg (2005)CrossRefGoogle Scholar
  2. 2.
    Khare, R., Rifkin, A.: Trust management on the World Wide Web. Computer Networks and ISDN Systems Archive 30, 651–653 (1998)CrossRefGoogle Scholar
  3. 3.
    The NGOSS Technology Neutral Architecture, TMF 053, Version 5.7 (November 2006)Google Scholar
  4. 4.
    Strassner, J.: Policy Based Network Management. Morgan Kaufmann, San Francisco (2004)Google Scholar
  5. 5.
    Serrano, J.M., Serrat, J., Strassner, J., Foghlú, M.Ó.: Facilitating Autonomic Management for Service Provisioning using Ontology-Based Functions & Semantic Control. In: 3rd IEEE International Workshop on Broadband Convergence Networks (BCN) 2008 in IEEE/IFIP NOMS 2008, Salvador de Bahia, Brazil, April 07-11 (2008)Google Scholar
  6. 6.
    Strassner, J.: Introduction to DEN-ng., Tutorial for FP7 PanLab II Project (January 21, 2009)Google Scholar
  7. 7.
    Dressler, F., Carreras, I.: Advances in Biologically Inspired Information Systems: Models, Methods, and Tools. Springer, Heidelberg (2007)CrossRefzbMATHGoogle Scholar
  8. 8.
    Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized Trust Management. In: Proceedings of the 1996 IEEE Symposium on Security and Privacy, Los Alamitos, California, USA, pp. 164–173. IEEE Computer Society Press, Los Alamitos (1966)Google Scholar
  9. 9.
    Blaze, M., Feigenbaum, J., Resnick, P., Strauss, M.: Managing Trust in an Information-Labeling System. European Transactions on Telecommunications (1997)Google Scholar
  10. 10.
    Camp, J., Genkina, A., Friedman, A.: Social and Network Trust, DIMACS, April 14-15, 2005. DIMACS Center, CoRE Building, Rutgers University, Piscataway, NJ (2005)Google Scholar
  11. 11.
    Camp, J.: Trust and Risk in Internet Commerce, p. 293. MIT Press, Cambridge (2000)Google Scholar
  12. 12.
    Mumford, E.: Participative Systems Design: Practice and Theory. Journal of Occupational Behaviour 4(1), 47–57 (1983)Google Scholar
  13. 13.
    Abowd, G.D., Dey, A.K., Orr, R., Brotherton, J.: Context-awareness in wearable and ubiquitous computing. In: Intl. Symposium on Wearable Computers, pp. 179–180 (1997)Google Scholar
  14. 14.
    Brown, P.J., Bovey, J.D., Chen, X.: Context-Aware Applications: From the laboratory to the Marketplace. IEEE Personal Communications, 58–64 (1997)Google Scholar
  15. 15.
    Chen, G., Kotz, D.: A survey of context-aware mobile computing research, Technical Report, TR2000-381, Department of Computer Science, Dartmouth College (November 2000)Google Scholar
  16. 16.
    Brabham, D.C.: Crowdsourcing as a Model for Problem Solving. An Introduction and Cases. Intl. Journal of Research into New Media Technologies 14(1) (2008)Google Scholar
  17. 17.
    MacLean, et al.: User-Tailorable Systems: Pressing the Issues with Buttons. In: Proceedings of CHI, Conference on Human Factors in Computer Systems (1990)Google Scholar
  18. 18.
    Li, H., Zhang, X., Wu, H., Qu, Y.: Design and Application of Rule Based Access Control Policies. In: Proceedings of the 10th International Conference on Information and Knowledge Management, Atlanta, GA, USA, November 5-10 (2001)Google Scholar
  19. 19.
    Grandison, T., Sloman, M.: Specifying and Analysing Trust for internet Applications. In: Towards the knowledge Society: eCommerce,eBusiness and eGoverment. The Second IFIP International Conference on E-Commerce, E-Business, E-Government, Lisbon, Portugal (October 2002)Google Scholar
  20. 20.
  21. 21.
    Lamparter, S., Agarwal, S.: Specification of Policies for Automatic Negotiations of Web Services. In: Proceedings of the 4th International Semantic Web Policy Workshop, Galway, Ireland, November 7 (2005)Google Scholar
  22. 22.
    Aberer, K., Despotovic, Z.: Managing Trust in a Peer-2-peer Information System. In: Proceedings of the 10th International Conference on Information and Knowledge Management, Atlanta, GA, USA, November 5-10 (2001)Google Scholar
  23. 23.
    Bonatti, P., Duma, C., Olmedilla, D., Shahmehri, N.: An integration of Reputation-based and policy Trust Management. In: Proceedings of the 4th International Semantic Web Policy Workshop, Galway, Ireland, November 7 (2005)Google Scholar
  24. 24.
    Damianou, N., Bandara, A., Sloman, M., Lupu, E.: A Survey of Policy Specification Approaches, Dept. of Computing, Imperial College of Science Technology and Medicine, London, UK (2002)Google Scholar
  25. 25.
    Moore, E., Elleson, J., Strassner, J.: Policy Core Information Model-Version 1 Specification. IETF Request for comments (RFC 3060) (February 2001), http://www.ietf.org/rfc/rfc3060.txt
  26. 26.
    Moore, E.: Policy Core Information Model-Extensions. IETF Request for comments (RFC 3460) (January 2003), http://www.ietf.org/rfc/rfc3460.txt
  27. 27.
    DMTF, CIM schema, can be downloaded from, http://www.dmtf.org/standards/cim/cim_schema_v220/
  28. 28.
    TMF SID schema, members only, can be downloaded from http://www.tmforum.org/page35501.aspx
  29. 29.
    Strassner, J., Neuman de Souza, J., Raymer, D., Samudrala, S., Davy, S., Barrett, K.: The Design of a New Policy Model to Support Ontology-Driven Reasoning for Autonomic Networking. In: 5th Latino-America Netowrk and Operations Management Symposium (LANOMS), Salvador Bahia, Brazil (2007)Google Scholar
  30. 30.
    Strassner, J., Fu, Z.: Policy Based Enforcement of Ubiquitous Role Based Access Control. In: 4th International IEEE Workshop on Managing Ubiquitous Communications and Services (MUCS), Munich, Germany, May 25 (2007)Google Scholar
  31. 31.
    Davy, S., Jennings, B., Strassner, J.: The Policy Continuum – A Formal Model. In: Jennings, B., Serrat, J., Strassner, J. (eds.) Proc. of the 2nd IEEE International Workshop MACE, Multicon, Berlin. Multlicon Lecture Notes, No. 6, pp. 65–78 (2007)Google Scholar
  32. 32.
    Dasgupta, P.: Trust as a Commodity. In: Trust: Making and Breaking Cooperative Relations. Blackwell, Oxford (1988)Google Scholar
  33. 33.
    Resnick, P., Zeckhauser, R., Friedman, E., Kuwabara, K.: Reputation Systems. Communications of the ACM 43(12), 45–48 (2000)CrossRefGoogle Scholar
  34. 34.
    Sztompka, P.: Trust: A sociological Theory. Cambridge University Press, Cambridge (1999)Google Scholar
  35. 35.
    Schneier, B.: Applied Cryptography: Protocols, Algorithms, and Source Code in C, 2nd edn. John Wiley and Sons, New York (1996)zbMATHGoogle Scholar
  36. 36.
    Lampson, B., Rivest, R.: SDSI - A Simple Distributed Security Infrastructure. In: DIMACS Workshop on Trust Management in Networks, South Plainfield, NJ (1996)Google Scholar
  37. 37.
    De Paoli, S., Kerr, A.: Conceptualizing Trust. NIRSA Working Paper N. 40, National University of Ireland Maynooth (2008)Google Scholar
  38. 38.
    Meyerson, D., Weick, K.E., Kramer, R.M.: Swift Trust and Temporary Group. Trust in Organisations. Sage, Thousand Oaks (1996)CrossRefGoogle Scholar
  39. 39.
    Sloman, M.: Policy Driven Management for Distributed Systems. Journal of Network and Systems Management, 215–333 (1994)Google Scholar
  40. 40.
    Strassner, J., Samudrala, S., Cox, G., Liu, Y., Jiang, M., Zhang, J., van der Meer, S., Foghlú, M.Ó., Donnelly, W.: The Design of a New Context-Aware Policy Model for Autonomic Networking. In: 5th IEEE ICAC, Chicago, Illinois, June 2-6 (2008)Google Scholar
  41. 41.
    De Bruijn, J., Fensel, D., Lara, R., Polleres, A.: OWL DL vs. OWL Flight: Conceptual Modelling and Reasoning for the Semantic Web (November 2004)Google Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2009

Authors and Affiliations

  • Martin Serrano
    • 1
  • Sven van der Meer
    • 1
  • John Strassner
    • 1
  • Stefano De Paoli
    • 2
  • Aphra Kerr
    • 2
  • Cristiano Storni
    • 3
  1. 1.Waterford Institute of TechnologyTelecommunications Software and Systems Group, ArcLabs IrelandWaterford Co.Ireland
  2. 2.Maynooth, Sociology DepartmentNational University of IrelandMaynoothIreland
  3. 3.Department of Computer Science and Information Systems Interaction Design CentreUniversity of LimerickLimerickIreland

Personalised recommendations