Reputation Enhancement in a Trust Management System

  • Shashi Bhanwar
  • Seema Bawa
Part of the Communications in Computer and Information Science book series (CCIS, volume 89)


In this paper, an extended TUX-TMS: A reputation based Trust Management System is presented for enhancing reputation for enabling transaction between unknown users in grid environments. TUX-TMS evaluates trustworthiness and reputation of a domain on the basis of user feedback which is further computed using trust context factor, risk assessment, trust inheritance and trust & reputation decay. TUX-TMS is further extended by including user zones and phylogenetic tree for the users. The parameters are enhanced and redefined to secure transactions and make the information provided more trustworthy. The reputation information is also aggravated hierarchically which enables new entities to inherit domain’s reputation information.


Trust Trust Management System Grid Computing Reputation Feedback 


Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.


  1. 1.
    Assuncao, M.D.D.: Provisioning Techniques and Policies for Resource Sharing between Grids. Ph.D. Thesis. The University of Melbourne, Australia (2009)Google Scholar
  2. 2.
    Silaghi, G.C., Arenas, A.E., Silva, L.M.: Reputation-based trust management systems and their applicability to grids. Technical Report Number TR-0064. CoreGRID (2007)Google Scholar
  3. 3.
    Sabater, J., Sierra, C.: Review on computational trust and reputation models. Kluwer Academic Publishers 10(34), 1–28 (2005)Google Scholar
  4. 4.
    Jøsang, A., Ismail, R., Boyd, C.: A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43(2), 618–644 (2007)CrossRefGoogle Scholar
  5. 5.
    Chakrabarti, A.: Grid Computing Security. Springer, Heidelberg (2007)MATHGoogle Scholar
  6. 6.
    Song, S., Hwang, K., Macwan, M.: Fuzzy Trust Integration for Security Enforcement in Grid Computing. In: Jin, H., Gao, G.R., Xu, Z., Chen, H. (eds.) NPC 2004. LNCS, vol. 3222, pp. 9–21. Springer, Heidelberg (2004)Google Scholar
  7. 7.
    Song, S., Hwang, K., Kwok, Y.K.: Trusted Grid Computing with Security Binding and Trust Integration. Journal of Grid Computing 3(1), 24–34 (2005)CrossRefGoogle Scholar
  8. 8.
    Rahman, A.A., Hailes, S.: Supporting trust in virtual communities. In: Proc. of Hawaii Intl Conference on System Sciences, pp. 6007–6016. IEEE Computer Society Press, Los Alamitos (2000)Google Scholar
  9. 9.
    Azzedin, F., Maheswaran, M.: Evolving and Managing Trust in Grid Computing Systems. In: Proc. of the 2002 IEEE Canadian Conference on Electrical & Computer Engineering, pp. 1424–1429. IEEE Press, Los Alamitos (2002)Google Scholar
  10. 10.
    Damianou, N., Dulay, N., Lupu, E., Sloman, M.: The Ponder Policy Specification Language. In: Sloman, M., Lobo, J., Lupu, E.C. (eds.) POLICY 2001. LNCS, vol. 1995, pp. 18–38. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  11. 11.
    Azzedin, F., Maheswaran, M.: Trust Modeling for Peer-to- Peer based Computing Systems. In: Proceedings of the International Parallel and Distributed Processing Symposium, IPDPS 2003, p. 99a (2003)Google Scholar
  12. 12.
    Lin, C., Varadharajan, V., Wang, Y., Pruthi, V.: Enhancing Grid Security with Trust Management. In: Proc. of the 2004 IEEE International Conference on Services Computing (SCC 2004), pp. 303–310. IEEE Press, Los Alamitos (2004)Google Scholar
  13. 13.
    Shafer, G.: Perspectives on the theory and practice of belief functions. International Journal of Approximate Reasoning 6(3), 445–480 (1992)MATHCrossRefGoogle Scholar
  14. 14.
    Laszewski, G.V., Alunkal, B.E., Veljkovic, I.: Towards reputable grids. Scalable Computing: Practice and Experience 6(3), 95–106 (2005)Google Scholar
  15. 15.
    Kerschbaum, F., Haller, J., Karabulut, Y., Robinson, P.: Pathtrust: A trust-based reputation service for virtual organization formation. In: Stølen, K., Winsborough, W.H., Martinelli, F., Massacci, F. (eds.) iTrust 2006. LNCS, vol. 3986, pp. 193–205. Springer, Heidelberg (2006)CrossRefGoogle Scholar
  16. 16.
    Shashi, B., Bawa, S.: TUX-TMS: Thapar University Extensible-Trust Management System. International Journal of Security, CSC Journals 4(1), 1–16 (2010)Google Scholar
  17. 17.
    Marmol, F.L., Perez, G.M.: Security threats scenarios in trust and reputation models for distributed systems. Computers and Security 28(7), 545–556 (2009)CrossRefGoogle Scholar
  18. 18.
    Almenarez, F., Marın, A., Campo, C., Garcıa, C.: PTM: a pervasive trust management model for dynamic open environments. In: Privacy and Trust. First Workshop on Pervasive Security and Trust (2004)Google Scholar
  19. 19.
    Boukerche, A., Xu, L., El-Khatib, K.: Trust-based security for wireless ad hoc and sensor networks. Computer Communications 30(11-12), 2413–2427 (2007)CrossRefGoogle Scholar
  20. 20.
    Carbo, J., Molina, J., Davila, J.: Trust management through fuzzy reputation. International Journal of Cooperative Information Systems 12, 135–155 (2003)CrossRefGoogle Scholar
  21. 21.
    Chen, H., Wu, H., Zhou, X., Gao, C.: Agent-based trust model in wireless sensor networks. In: Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing, SNPD 2003, pp. 119–124 (2007)Google Scholar
  22. 22.
    Aberer, K.: P-Grid: A Self-Organizing Access Structure for P2P Information Systems. In: Batini, C., Giunchiglia, F., Giorgini, P., Mecella, M. (eds.) CoopIS 2001. LNCS, vol. 2172, pp. 179–194. Springer, Heidelberg (2001)CrossRefGoogle Scholar
  23. 23.
    Zhou, R., Hwang, K.: PowerTrust: A Robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems 18(4), 621–636 (2007)CrossRefGoogle Scholar
  24. 24.
    Marmol, F.G., Perez, G.P., Skarmeta, A.F.: TACS, A Trust Model for P2P Networks. Wireless Personal Communications 51(1), 153–164 (2008)CrossRefGoogle Scholar
  25. 25.
    Abrams, Z., Mcgrew, R., Plotkin, S.: A non-manipulable trust system based on Eigentrust. ACM SIGecom Exchanges 5(4), 21–30 (2005)CrossRefGoogle Scholar

Copyright information

© Springer-Verlag Berlin Heidelberg 2010

Authors and Affiliations

  • Shashi Bhanwar
    • 1
  • Seema Bawa
    • 1
  1. 1.Centre of Excellence in Grid Computing, Computer Science and Engineering DepartmentThapar UniversityPatialaIndia

Personalised recommendations