Abstract

Abstract To secure computing in pervasive environment, an adaptive trust and recommendation based access control model (based on human notion of trust) is proposed. The proposed model provides support to calculate direct as well as indirect trust based on recommendations. It handles situations (by itself) both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any past interaction with the service. It encompasses the ability to reason human cognitive behavior and has the capability to adjust in accordance with behavioral pattern changes. X-bar control chart is used to handle malicious recommendation. The defense mechanisms incorporated by proposed model against attacks such as bad mouthing attack, oscillating behavior attack and conflicting behavior attack are also demonstrated.

Highlights

  • The technological advances over last few years have revolutionized the world of computing

  • We have found that pervasive trust management model (PTM) does not provide protection against paradoxical behavior as claimed in [22]

  • The proposed model handles by itself situations both in which the requesting entity has a past experience with the service and a stranger entity requesting to access the service without any identity and past interaction with the service

Read more

Summary

Introduction

The technological advances over last few years have revolutionized the world of computing. Indirect trust computation (Algorithm 1) is carried out by Reputation evaluator module It seeks recommendation for further information when the amount of observation is insufficient for the service to define the trustworthiness of the entity requesting the service. The reputation evaluator module computes the recommended trust value of entity Ei for service Si and service interface SIi at time t as Trecom(Ei, Si, SIi, t) based on peer services recommended trust value and other services in other autonomous pervasive environment’s recommended trust value given as Trecome(Ei, Si, SIi, t) = αTp(Ei, Si, SIi, t) + (1 − α)To(Ei, Si, SIi, t). 5.2 Direct trust computation Performance interpretation module is responsible for the direct trust computation (Algorithm 2) It evaluates the behavior pattern of the entity involved in an interaction according to its actions, as additional evidence becomes available.

2: Broadcast Recommendation Request
Bad mouthing attack
Findings
Conclusion
Full Text
Published version (Free)

Talk to us

Join us for a 30 min session where you can share your feedback and ask us any queries you have

Schedule a call