ABSTRACT
We propose a new paradigm---named the Pervasive Trust Foundation (PTF) ---for computer security in Next Generation Networks, including the Future Internet. We start with a review of basic trust-related terms and concepts. We present motivation for using PTF as the basis for security in ISO OSI networks. The paper includes our five contributions. First, we define trust in the small (TIS) and trust in the large (TIL), where TIL is equivalent to PTF. Second, we list and contrast required and prohibited features of PTF-based systems. Third, we enumerate claims of benefits derived from using PTF. Fourth, we identify two major obstacles to PTF realization, and discuss multiple approaches to overcoming these obstacles. The more important of the two obstacles can be eliminated by showing an efficient implementation of PTF-based security. Fifth, we present an outline for the Basic Reference Model for PTF for Next Generation Networks. Summary and discussion of future work concludes the paper.
- 2010. Trust. American Heritage Dictionary of the English Language, Houghton Mifflin. Online at: http://education.yahoo.com/reference/dictionary/entry/trustGoogle Scholar
- Bhargava, B., Lilien, L., Rosenthal, A., and Winslett, M. 2004. Pervasive Trust. IEEE Intelligent Systems 19, 5 (Sept.-Oct. 2004), 74--77.Google Scholar
- Artz, D., and Gil, Y. 2007. A Survey of Trust in Computer Science and the Semantic Web. Web Semantics: Science, Services and Agents on the World Wide Web 5, 2 (Jun. 2007), 58--71. Google ScholarDigital Library
- Bhargava, B., Farkas, C., Lilien, L., and Makedon, F. 2003. Trust, Privacy, and Security: Summary of a Workshop Breakout Session, the National Science Foundation Information and Data Management (IDM) Workshop held in Seattle, Washington. Sep. 14-16, 2003. Technical Report 2003--34. Center for Education and Research in Information Assurance and Security (CERIAS), Purdue University. Online at: http://www.cerias.purdue.edu/tools_and_resources /bibtex_archive/archive/2003--34.pdfGoogle Scholar
- 2009. Verbal communication with participants. NSF Future Internet Architecture Summit (Washington, D.C., Oct. 2009).Google Scholar
- ISO/IEC, 1991. ISO/IEC DIS 10181-2, May 1991, Information Technology - Open Systems Interconnection - Security Frameworks in Open Systems - Part 2: Authentication Framework. ISO. Used to be online at: http// www.iso.org/iso/catalogue_detail.htm?csnumber=14256Google Scholar
- Pfleeger, C.P., and Pfleeger, S.L. 2007. Security in Computing. Fourth Edition, Prentice Hall. Upper Saddle River, NJ. Google ScholarDigital Library
- Fischer-Hübner, S., and Hedbom, H. 2008. Benefits of Privacy-Enhancing Identity Management. Asia-Pacific Business Review IV, 4 (Oct.-Dec. 2008), 36--52.Google Scholar
- Grandison, T., and Sloman, M. 2000. A Survey of Trust in Internet Applications. IEEE Communications Surveys and Tutorials 3, 4 (Fourth quarter 2000), 2--16. Google ScholarDigital Library
- Cho, J.-H., and Swami, A. 2009. Towards Trust-based Cognitive Networks: A Survey of Trust Management for Mobile Ad Hoc Networks. In Proceedings of 14th International Command and Control Research and Technology Symposium (ICCRTS) (Washington, DC, June 2009). Online at: http://www.dodccrp.org/events/papers/191.pdfGoogle Scholar
- Ruohomaa, S., Viljanen, L., and Kutvonen, L. 2006. Guarding Enterprise Collaborations with Trust Decisions -- the TuBE Approach. In Proceedings of the Workshops and the Doctoral Symposium of the Second IFAC/IFIP I-ESA International Conference: EI2N, WSI, IS-TSPQ (Bordeaux, France, Mar. 2006), 237--248.Google Scholar
- Jøsang, A., Ismail, R., and Boyd, C. 2006. A Survey of Trust and Reputation Systems for Online Service Provision. Decision Support Systems 43, 2 (Mar. 2007), 618--644. DOI= http://doi.acm.org/10.1016/j.dss.2005.05.019 Google ScholarDigital Library
- Sun, Y.(L.), Han, Z., and Liu, K.J.R. 2008. Defense of Trust Management Vulnerabilities in Distributed Networks. IEEE Communications 46, 2 (Feb. 2008), 112--119. DOI= http://doi.acm.org/10.1109/MCOM.2008.4473092. Google ScholarDigital Library
- Rasmusson, L., and Janssen, S. 1996. Simulated Social Control for Secure Internet Commerce. In Proceedings of New Security Paradigms Workshop (Lake Arrowhead, CA, Sep. 1996), 18--25. DOI= http://doi.acm.org/10.1145/304851.304860 Google ScholarDigital Library
- Yan, Z. 2007. Trust Management for Mobile Computing Platforms. Doctoral Thesis, Helsinki University of Technology, Helsinki, Finland.Google Scholar
- Solhaug, B., Elgesem, D., and Stolen, K. 2007. Why Trust is not Proportional to Risk? In Proceedings of 2nd International Conference on Availability, Reliability, and Security (Vienna, Austria, Apr. 2007), 11--18. Google ScholarDigital Library
- Ruohomaa, S., and Kutvonen, L. 2005. Trust Management Survey. In Proceedings of Third International Conference on Trust Management (Paris, France, May 2005). LNCS 3477, Springer-Verlag, 2005. 77--92. Google ScholarDigital Library
- Blaze, M., Feigenbaum, J., and Lacy, J. 1996. Decentralized Trust Management. In Proceedings of IEEE Symposium on Security and Privacy, (Oakland, CA, May 1996) Online at: http://www.crypto.com/papers/policymaker.pdf. Google ScholarDigital Library
- Jøsang, A., Keser, C., and Dimitrakos, T. 2005. Can We Manage Trust?" In Proceedings of the Third International Conference on Trust Management (iTrust) (Versailles, France, May 2005), 93--107. Google ScholarDigital Library
- Conner, W., Iyengar, A., Mikalsen, T., Rouvellou, I., and Nahrstedt, K. 2009. A Trust Management Framework for Service-Oriented Environments. In Proceedings of World Wide Web Conference (Madrid, Spain, Apr. 2009), 891--900. DOI= http://doi.acm.org/10.1145/1526709.1526829 Google ScholarDigital Library
- Winsborough, W.H., Seamons, K.E., and Jones, V.E. 2000. Automated trust negotiation. In Proceedings of DARPA Information Survivability Conference and Exposition (Hilton Head, SC, Jan. 2000), 88--102. DOI= http://doi.acm.org/10.1109/DISCEX.2000.824965Google Scholar
- Chu, Y.H., Feigenbaum, J., LaMacchia, B., Resnick, P., and Strauss, M. 1997. REFEREE: Trust Management for Web Applications. Computer Networks and ISDN Systems 29, 8--13 (Sep. 1997), 953--964. DOI= http://doi.acm.org/10.1016/S0169-7552(97)00009-3 Google ScholarDigital Library
- Blaze, M., Feigenbaum, J. and Keromytis, A.D. 1998. KeyNote: Trust management for public-key infrastructures (position paper). In Proceedings of 6th International Workshop on Security Protocols (Cambridge, UK, Apr. 15-17, 1998). LNCS 1550, Springer-Verlag, 1998. 59--63. Google ScholarDigital Library
Index Terms
- The pervasive trust foundation for security in next generation networks
Recommendations
The Role of Trust and Technology Acceptance ModelTAM on Customer Acceptance of Mobile Banking: An Integrated Model to Improve Mobile Banking in Banking Sector-A Conceptual Paper
This paper studies the need to integrate trust and Technology acceptance model TAM to understand the behaviour intention of the customer to use mobile banking. The present study focuses through literature review on trust related antecedents and ...
Security and privacy threats in IoT architectures
BodyNets '12: Proceedings of the 7th International Conference on Body Area NetworksIn this paper, we describe developments towards the Internet of Things (IoT) and discuss architecture visions for the IoT. Our emphasis is to analyze the known and new threats for the security, privacy and trust (SPT) at different levels of ...
Security, privacy and trust in Internet of Things
Internet of Things (IoT) is characterized by heterogeneous technologies, which concur to the provisioning of innovative services in various application domains. In this scenario, the satisfaction of security and privacy requirements plays a fundamental ...
Comments