ABSTRACT
Trust is a necessary component in cybersecurity. It is a common task for a system to make a decision about whether or not to trust the credential of an entity from another domain, issued by a third party. Generally, in the cyberspace, connected and interacting systems largely rely on each other with respect to security, privacy, and performance. In their interactions, one entity or system needs to trust others, and this "trust" frequently becomes a vulnerability of that system. Aiming at mitigating the vulnerability, we are developing a computational theory of trust, as a part of our efforts towards Science of Security. Previously, we developed a formal-semantics-based calculus of trust [3, 2], in which trust can be calculated based on a trustor's direct observation on the performance of the trustee, or based on a trust network. In this paper, we construct a framework for making trust reasoning based on the observed evidence. We take privacy in cloud computing as a driving application case [5].
- K. Blomqvist. The Many Faces of Trust. Scandinavian Journal of Management, 13(3):271--286, 1997.Google ScholarCross Ref
- J. Huang and D. Nicol. A Calculus of Trust and Its Application to PKI and Identity Management. In Proceedings of IDTrust'09. ACM, April 2009. Google ScholarDigital Library
- J. Huang and D. Nicol. A formal-semantics-based calculus of trust. IEEE Internet Computing, 14(5):38--46, Sept. 2010. Google ScholarDigital Library
- J. Huang and D. M. Nicol. Trust mechanisms for cloud computing. Journal of Cloud Computing, 2(1), 2013.Google Scholar
- J. Huang and D. M. Nicol. Evidence-based trust on privacy protection in cloud computing, 2014. Research Report of ITI, UIUC.Google Scholar
- R. Mayer, J. Davis, and F. Schoorman. An Integrative Model of Organizational Trust: Past, Present, and Future. Academic of Management Review, 20(3):709--734, 1995.Google ScholarCross Ref
- J. Pearl. Causality: Models, Reasoning, and Inference, 2nd Ed. Cambridge University Press, New York, NY, USA, 2009. Google ScholarDigital Library
- D. Solove. A taxonomy of privacy. University of Pennsylvania Law Review, 154(3):477--560, Jan. 2006.Google ScholarCross Ref
Index Terms
- Evidence-based trust reasoning
Recommendations
Research on Trust Evaluation Model Based on TPM
FCST '09: Proceedings of the 2009 Fourth International Conference on Frontier of Computer Science and TechnologyTrusted computing is an important research field in information security and trust evaluation for trust model is the key issue to be resolved. It is great significance for ensuring security of trust model for trusted computing to analyze normally and ...
A General Trust Model Based on Trust Algebra
MINES '09: Proceedings of the 2009 International Conference on Multimedia Information Networking and Security - Volume 01The growing importance of Trust in the realm of open network environment introduces further research on it, due to the special significance of trust to whole system. We view trust as a relation among entities that participate in an action meeting the ...
Evidence-based trust: A mathematical model geared for multiagent systems
An evidence-based account of trust is essential for an appropriate treatment of application-level interactions among autonomous and adaptive parties. Key examples include social networks and service-oriented computing. Existing approaches either ignore ...
Comments