Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1145/1568199.1568207acmconferencesArticle/Chapter ViewAbstractPublication PagesicpsConference Proceedingsconference-collections
research-article

Evaluation of the iterative multiplication strategy for trust propagation in pervasive environments

Published: 13 July 2009 Publication History

Abstract

There are a number of models for access control in pervasive environments that are based on trust propagation. Iterative multiplication of the trust values on a path from a source entity to a target entity is one of the common strategies for trust propagation. In this paper, we evaluate the effectiveness of iterative multiplication for trust propagation. The data set used for this evaluation is the real web of trust of Advogato.org that comprises of over 11,000 vertices (users) and over 50,000 directed weighted edges (trust relationships between users). We find that a significantly strong positive linear correlation exists between trust values based on direct experience and the corresponding propagated trust values derived through the iterative multiplication approach. This finding provides empirical support for the access control models for pervasive environments that employ the iterative multiplication strategy for trust propagation.

References

[1]
S.I. Ahamed, M.M. Haque, and N. Talukder. Service sharing with trust in pervasive environment: Now it's time to break the jinx. In Proc. of the 23rd Annual ACM Symposium on Applied Computing (SAC 2008), Fortaleza, Ceará, Brazil, March 2008.
[2]
D. Ferraiolo and R. Kuhn. Role based access control. In Proceedings of the 15th National Computer Security Conference, pages 554--563, October 13-16 1992.
[3]
O. Hasan, J.-M. Pierson, and L. Brunie. Access control for ubiquitous environments based on subjectivity eliminated trust propagation. In Proc. of the 3rd Intl. Symposium on TRUST, in conjunction with the 2008 IEEE/IFIP Intl. Conf. on Embedded and Ubiquitous Computing (EUC 2008), Shanghai, China, December 2008.
[4]
HP. Identity-based access control. Technical report, Hewlett-Packard, 2006. ProCurve Networking by HP.
[5]
L.X. Hung, P.D. Giang, Y. Zhung, T.V. Phuong, S. Lee, and Y.-K. Lee. A trust-based security architecture for ubiquitous computing systems. In Proc. of the IEEE Intl. Conf. on Intelligence and Security Informatics (ISI 2006), San Diego, CA, USA, May 2006.
[6]
L. Kagal, T. Finin, and A. Joshi. Trust-based security in pervasive computing environments. IEEE Computer, December 2001.
[7]
R. Levien. Attack resistant trust metrics. Manuscript, University of California - Berkeley. www.levien.com/thesis/compact.pdf, 2002.
[8]
R. Levien and A. Aiken. Attack-resistant trust metrics for public key certification. In Proceedings of the 7th USENIX Security Symposium, San Antonio, Texas, January 26-29 1998.
[9]
R. Saadi, J.-M. Pierson, and L. Brunie. Authentication and access control using trust collaboration in pervasive grid environment. In Proceedings of the International Conference on Grid and Pervasive Computing (GPC 2007), 2007.
[10]
K. Shin and H. Yasuda. Practical anonymous access control protocols for ubiquitous computing. Journal of Computers, 1(8), December 2006.

Cited By

View all
  • (2021)A propagation trust model in social networks based on the A* algorithm and multi-criteria decision makingComputing10.1007/s00607-021-00918-w103:5(827-867)Online publication date: 18-Feb-2021
  • (2016)Domain-aware trust network extraction for trust propagation in large-scale heterogeneous trust networksKnowledge-Based Systems10.1016/j.knosys.2016.08.019111:C(237-247)Online publication date: 1-Nov-2016
  • (2014)Privacy-Aware Trust-Based Recruitment in Social Participatory SensingMobile and Ubiquitous Systems: Computing, Networking, and Services10.1007/978-3-319-11569-6_21(262-275)Online publication date: 28-Sep-2014
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image ACM Conferences
ICPS '09: Proceedings of the 2009 international conference on Pervasive services
July 2009
216 pages
ISBN:9781605586441
DOI:10.1145/1568199
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 13 July 2009

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. access control
  2. pervasive
  3. trust
  4. trust propagation

Qualifiers

  • Research-article

Conference

ICPS '09
Sponsor:
ICPS '09: International Conference on Pervasive Services
July 13 - 17, 2009
London, United Kingdom

Acceptance Rates

ICPS '09 Paper Acceptance Rate 23 of 34 submissions, 68%;
Overall Acceptance Rate 23 of 34 submissions, 68%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)3
  • Downloads (Last 6 weeks)3
Reflects downloads up to 10 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2021)A propagation trust model in social networks based on the A* algorithm and multi-criteria decision makingComputing10.1007/s00607-021-00918-w103:5(827-867)Online publication date: 18-Feb-2021
  • (2016)Domain-aware trust network extraction for trust propagation in large-scale heterogeneous trust networksKnowledge-Based Systems10.1016/j.knosys.2016.08.019111:C(237-247)Online publication date: 1-Nov-2016
  • (2014)Privacy-Aware Trust-Based Recruitment in Social Participatory SensingMobile and Ubiquitous Systems: Computing, Networking, and Services10.1007/978-3-319-11569-6_21(262-275)Online publication date: 28-Sep-2014
  • (2013)A Trust-Based Recruitment Framework for Multi-hop Social Participatory SensingProceedings of the 2013 IEEE International Conference on Distributed Computing in Sensor Systems10.1109/DCOSS.2013.29(266-273)Online publication date: 20-May-2013
  • (2012)Alleviating controversiality problem in trust estimation6th International Symposium on Telecommunications (IST)10.1109/ISTEL.2012.6483151(1103-1108)Online publication date: Nov-2012
  • (2012)Designing Trust Propagation Algorithms based on Simple Multiplicative Strategy for Social NetworksProcedia Technology10.1016/j.protcy.2012.10.0646(534-539)Online publication date: 2012
  • (2011)RTBIMS: Accuracy enhancement in Iterative Multiplication Strategy for computing propagated trust2011 8th International ISC Conference on Information Security and Cryptology10.1109/ISCISC.2011.6062344(9-14)Online publication date: Sep-2011
  • (2011)Computing trust resultant using intervals2011 8th International ISC Conference on Information Security and Cryptology10.1109/ISCISC.2011.6062343(15-20)Online publication date: Sep-2011
  • (2010)PASMi: self-adaptive Photo Annotation and Sharing Middleware of Mobile Ad-hoc Networks2010 8th IEEE International Conference on Pervasive Computing and Communications Workshops (PERCOM Workshops)10.1109/PERCOMW.2010.5470616(135-140)Online publication date: Mar-2010
  • (undefined)A Fuzzy Reinforcement Learning Trust Propagation Algorithm for Inferring Local Trust in Social Networks Using Hypergraph StructureSSRN Electronic Journal10.2139/ssrn.4130134

View Options

Get Access

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media