Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1852666.1852748acmotherconferencesArticle/Chapter ViewAbstractPublication PagescsiirwConference Proceedingsconference-collections
research-article

Augmenting trust establishment in dynamic systems with social networks

Published: 21 April 2010 Publication History

Abstract

Social networking has recently flourished in popularity through the use of social websites. Pervasive computing resources have allowed people stay well-connected to each other through access to social networking resources. We take the position that utilizing information produced by relationships within social networks can assist in the establishment of trust for other pervasive computing applications. Furthermore, we describe how such a system can augment a sensor infrastructure used for event observation with information from mobile sensors (ie, mobile phones with cameras) controlled by potentially untrusted third parties.

References

[1]
Blogger, July 2009. http://www.blogger.com.
[2]
Facebook, July 2009. http://www.facebook.com.
[3]
Linkedin, July 2009. http://www.linkedin.com.
[4]
Twitter, July 2009. http://www.twitter.com.
[5]
Massimo Bartoletti, Pierpaolo Degano, and Gian Luigi Ferrari. Enforcing secure service composition. In CSFW '05: Proceedings of the 18th IEEE workshop on Computer Security Foundations, pages 211--223, Washington, DC, USA, 2005. IEEE Computer Society.
[6]
John Buford, Rakesh Kumar, and Greg Perkins. Composition trust bindings in pervasive computing service composition. In Proceedings of the Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshops. IEEE Computer Society, 2006.
[7]
James Caverlee, Ling Liu, and Steve Webb. Socialtrust: tamper-resilient trust establishment in online communities. In Ronald L. Larsen, Andreas Paepcke, José Luis Borbinha, and Mor Naaman, editors, ACM IEEE Joint Conference on Digital Libraries, pages 104--114. ACM, 2008.
[8]
Dipanjan Chakraborty, Filip Perich, Anupam Joshi, Timothy W. Finin, and Yelena Yesha. A reactive service composition architecture for pervasive computing environments. In PWC '02: Proceedings of the IFIP TC6/WG6.8 Working Conference on Personal Wireless Communications, pages 53--62, Deventer, The Netherlands, The Netherlands, 2002. Kluwer, B.V.
[9]
Catherine Dwyer, Starr R. Hiltz, and Katia Passerini. Trust and privacy concern within social networking sites: A comparison of Facebook and MySpace. In Proceedings of the Thirteenth Americas Conference on Information Systems, August 2007.
[10]
J. Fogel and E. Nehmad. Internet social network communities: Risk taking, trust, and privacy concerns. Computers in Human Behavior, 25(1):153--160, January 2009.
[11]
Stewart Greenhill and Svetha Venkatesh. Virtual observers in a mobile surveillance system. In ACM Multimedia 2006, 23-27 October, Santa Barbara, USA, 2006.
[12]
Xiaohui Gu, Klara Nahrstedt, and Bin Yu. Spidernet: An integrated peer-to-peer service composition framework. In HPDC '04: Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing, pages 110--119, Washington, DC, USA, 2004. IEEE Computer Society.
[13]
Lalana Kagal, Jeffrey Undercoffer, Filip Perich, Anupam Joshi, and Tim Finin. A security architecture based on trust management for pervasive computing systems. In Grace Hopper Celebration of Women in Computing, October 2002.
[14]
Swaroop Kalasapur, Mohan Kumar, and Behrooz Shirazi. Dynamic service composition in pervasive computing. IEEE Transactions on Parallel and Distributed Systems, 18(7):907--917, 2007.
[15]
Sepandar D. Kamvar, Mario T. Schlosser, and Hector Garcia-Molina. The Eigentrust algorithm for reputation management in P2P networks. In WWW, pages 640--651, 2003.
[16]
Brent Lagesse, Mohan Kumar, Justin Mazzola Paluska, and Matthew Wright. Dtt: A distributed trust toolkit for pervasive systems. Pervasive Computing and Communications, IEEE International Conference on, 0:1--8, 2009.
[17]
Brent Lagesse, Mohan Kumar, and Matthew Wright. AREX: An adaptive system for secure resource access in mobile P2P systems. In Eighth International Conference on Peer-to-Peer Computing, pages 43--52. IEEE Computer Society, 2008.
[18]
Bhaskaran Raman, Sharad Agarwal, Yan Chen, Matthew Caesar, Weidong Cui, Per Johansson, Kevin Lai, Tal Lavian, Sridhar Machiraju, Zhuoqing Morley Mao, George Porter, Timothy Roscoe, Mukund Seshadri, Jimmy S. Shih, Keith Sklower, Lakshminarayanan Subramanian, Takashi Suzuki, Shelley Zhuang, Anthony D. Joseph, Randy H. Katz, and Ion Stoica. The SAHARA model for service composition across multiple providers. In Pervasive '02: Proceedings of the First International Conference on Pervasive Computing, pages 1--14, London, UK, 2002. Springer-Verlag.
[19]
Geetanjali Sampemane, Prasad Naldurg, and Roy H. Campbell. Access control for active spaces. In ACSAC, pages 343--352. IEEE Computer Society, 2002.
[20]
Giovanna Di Marzo Serugendo. Trust as an interaction mechanism for self-organising systems. In ICCS, 2004.
[21]
Kevin Walsh and Emin Gün Sirer. Experience with an object reputation system for peer-to-peer filesharing. In NSDI. USENIX, 2006.
[22]
Li Xiong and Ling Liu. Building trust in decentralized peer-to-peer electronic communitties. In International Conference on Electronic Commerce Research, 2002.
[23]
Li Xiong and Ling Liu. Peertrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16(7):843--857, 2004.

Index Terms

  1. Augmenting trust establishment in dynamic systems with social networks

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image ACM Other conferences
    CSIIRW '10: Proceedings of the Sixth Annual Workshop on Cyber Security and Information Intelligence Research
    April 2010
    257 pages
    ISBN:9781450300179
    DOI:10.1145/1852666
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 21 April 2010

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Research-article

    Funding Sources

    Conference

    CSIIRW '10

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • 0
      Total Citations
    • 119
      Total Downloads
    • Downloads (Last 12 months)0
    • Downloads (Last 6 weeks)0
    Reflects downloads up to 14 Jan 2025

    Other Metrics

    Citations

    View Options

    Login options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media