A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Slides:



Advertisements
Similar presentations
Doc.: IEEE /0046r0 Submission July 2009 Ari Ahtiainen, NokiaSlide 1 A Cooperation Mechanism for Coexistence between Secondary User Networks on.
Advertisements

The Role of Trust Management in Distributed Systems Authors Matt Blaze, John Feigenbaum, John Ioannidis, Angelos D. Keromytis Presented By Akshay Gupte.
Research Issues in Web Services CS 4244 Lecture Zaki Malik Department of Computer Science Virginia Tech
June 4, 2004 A Robust Reputation System for P2P and Mobile Ad-hoc Networks Sonja Buchegger 1 A Robust Reputation System for P2P and Mobile Ad-hoc Networks.
Conceptual Framework for Dynamic Trust Monitoring and Prediction Olufunmilola Onolaja Rami Bahsoon Georgios Theodoropoulos School of Computer Science The.
EPFL, Lausanne, Switzerland Márk Félegyházi Equilibrium Analysis of Packet Forwarding Strategies in Wireless Ad Hoc Networks – the Static Case Márk Félegyházi.
Risk Aware Decision Framework for Trusted Mobile Interactions September 2005 Daniele Quercia and Stephen Hailes CS department University College London.
Different methods and Conclusions Liqin Zhang. Different methods Basic models Reputation models in peer-to-peer networks Reputation models in social networks.
Identity Management Based on P3P Authors: Oliver Berthold and Marit Kohntopp P3P = Platform for Privacy Preferences Project.
Lecture 23 Internet Authentication Applications
Sogang University ICC Lab Using Game Theory to Analyze Wireless Ad Hoc networks.
Using Game Theory to Analyze Wireless Ad Hoc networks Vivek Srivastava March 24 th 2004 Qualifier presentation.
Interpersonal Trust Model Ing. Arnoštka Netrvalová DSS - seminar,
Trust Establishment in Pervasive Grid Environments Syed Naqvi, Michel Riguidel TÉLÉCOM PARIS ÉNST É cole N ationale S upérieur des T élécommunications.
Identity Federation in Healthcare Networks Xiaohui Chen Department of Computer Science University of Virginia.
Secure communication in cellular and ad hoc environments Bharat Bhargava Department of Computer Sciences, Purdue University This is supported.
An Authentication Service Based on Trust and Clustering in Wireless Ad Hoc Networks: Description and Security Evaluation Edith C.H. Ngai and Michael R.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Services in Mobile Ad Hoc Networks Edith Ngai and Michael R.
Trust CS 239 Advanced Topics in Computer Security Bernie Perez Vahab Pournaghshband November 9th, 2010.
A Reputation Based Scheme for Stimulating Cooperation Aruna Balasubramanian, Joy Ghosh and Xin Wang University at Buffalo (SUNY), Buffalo, NY {ab42, joyghosh,
By Onolaja Olufunmilola. Overview Introduction Motivation Trust, reputation and misbehaivour Literature review DDDAS Model description Applications Evaluation.
An Architecture for Dynamic Trust Monitoring in Mobile Networks Onolaja Olufunmilola, Rami Bahsoon, Georgios Theodoropoulos School of Computer Science.
Motivating Corporation in Mobile Ad Hoc Networks: A Step Forward
An Authentication Service Against Dishonest Users in Mobile Ad Hoc Networks Edith Ngai, Michael R. Lyu, and Roland T. Chin IEEE Aerospace Conference, Big.
Kemal AkkayaWireless & Network Security 1 Department of Computer Science Southern Illinois University Carbondale CS 591 – Wireless & Network Security Lecture.
Security Models for Trusting Network Appliances From : IEEE ( 2002 ) Author : Colin English, Paddy Nixon Sotirios Terzis, Andrew McGettrick Helen Lowe.
What is an Information System? Input of DataResourcesProcessing Data Data Control of System Performance Storage of Data Resources Output of InformationProducts.
Pervasive Computing and Communication Security (PerSec 2006) March 13th, 2006 Florina Almenárez, Andrés Marín, Daniel Díaz, Juan Sánchez
1 APPLICATION OF DDDAS FOR TRUSTED COMMUNICATION IN MOBILE NETWORKS. Onolaja Olufunmilola Supervisors: Dr Rami Bahsoon, Dr Georgios Theodoropoulos.
Building a Strong Foundation for a Future Internet Jennifer Rexford ’91 Computer Science Department (and Electrical Engineering and the Center for IT Policy)
Data and Applications Security Developments and Directions Dr. Bhavani Thuraisingham The University of Texas at Dallas Secure Knowledge Management: and.
Scientific Computing Department Faculty of Computer and Information Sciences Ain Shams University Supervised By: Mohammad F. Tolba Mohammad S. Abdel-Wahab.
Nodes Bearing Grudges: Towards Routing Security, Fairness, and Robustness in Mobile Ad Hoc Networks Sonja Buchegger Jean-Yves Le Boudec.
1 / 18 Fariba alamshahi Secure Routing and Intrusion Detection in Ad Hoc Networks Supervisor: Mr.zaker Translator: fariba alamshahi.
1 Role-Based Cascaded Delegation: A Decentralized Delegation Model for Roles Roberto Tamassia Danfeng Yao William H. Winsborough Brown University Brown.
Fuzzy Trust Recommendation Based on Collaborative Filtering for Mobile Ad-hoc Networks Junhai Luo 1,2, Xue Liu 1, Yi Zhang 3,Danxia Ye 2,Zhong Xu 1 1 McGill.
Lecture 23 Internet Authentication Applications modified from slides of Lawrie Brown.
Network Security Lecture 26 Presented by: Dr. Munam Ali Shah.
Computer Science 725 – Software Security Presentation “Decentralized Trust Management” Decentralized Trust ManagementDecentralized Trust Management M.
Grid Security Issues Shelestov Andrii Space Research Institute NASU-NSAU, Ukraine.
Chapter 23 Internet Authentication Applications Kerberos Overview Initially developed at MIT Software utility available in both the public domain and.
Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai 28 October 2003.
By Swetha Namburi.  Trust  Trust Model ◦ Reputation-based Systems ◦ Architectural Approach to Decentralized Trust Management.
1 Objective and Secure Reputation-Based Incentive Scheme for Ad-Hoc Networks Dapeng Oliver Wu Electrical and Computer Engineering University of Florida.
Adapted from the original presentation made by the authors Reputation-based Framework for High Integrity Sensor Networks.
Combining Theory and Systems Building Experiences and Challenges Sotirios Terzis University of Strathclyde.
Cerberus: A Context-Aware Security Scheme for Smart Spaces presented by L.X.Hung u-Security Research Group The First IEEE International Conference.
Security in Ad Hoc Networks. What is an Ad hoc network? “…a collection of wireless mobile hosts forming a temporary network without the aid of any established.
CSIIR Workshop March 14-15, Privilege and Policy Management for Cyber Infrastructures Dennis Kafura Markus Lorch Support provided by: Commonwealth.
1 Service Sharing with Trust in Pervasive Environment: Now it’s Time to Break the Jinx Sheikh I. Ahamed, Munirul M. Haque and Nilothpal Talukder Ubicomp.
M. Blaze, J. Feigenbaum, and J. Lacy. Decentralized Trust Management. In Proc. of the 17 th Symposium on Security and Privacy, pages IEEE Computer.
National Research Council - Pisa - Italy Marco Conti Italian National Research Council (CNR) IIT Institute MobileMAN MobileMAN: II year expected results.
Dynamic Trust Models for Ubiquitous Computing Environments Colin English, Paddy Nixon, Sotirios Terzis, Andrew McGettrick, Helen Lowe Department of Computer.
Security Issues in Distributed Sensor Networks Yi Sun Department of Computer Science and Electrical Engineering University of Maryland, Baltimore County.
Time-Space Trust in Networks Shunan Ma, Jingsha He and Yuqiang Zhang 1 College of Computer Science and Technology 2 School of Software Engineering.
Computer Science and Engineering 1 Mobile Computing and Security.
Mobile Systems Availability Integrity and Confidentiality MoSAIC M.O.Killijian, D.Powell, M.Banâtre, P.Couderc, Y.Roudier LAAS-CNRS - IRISA- Eurécom.
GRID ANATOMY Advanced Computing Concepts – Dr. Emmanuel Pilli.
STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions April 2006 Daniele Quercia, Manish Lad, Stephen Hailes, Licia Capra, and Saleem.
Dept. of Computer Science & Engineering, CUHK1 Trust- and Clustering-Based Authentication Service in Mobile Ad Hoc Networks Presented by Edith Ngai Supervised.
Trust Meta-Policies for Flexible and Dynamic Policy Based Trust Management Knowledge & Data Engineering Group, School of Computer Science & Statistics,
Enforce Collaboration in Mobile Ad Hoc Network Ning Jiang School of EECS University of Central Florida
Context-aware Adaptive Routing for Delay Tolerant Networking
Presented by Edith Ngai MPhil Term 3 Presentation
Giannis F. Marias, Vassileios Tsetsos,
يك مدل اعتماد توزيع‍شده براي محيطهاي محاسبات فراگير
Wenjia Li Anupam Joshi Tim Finin May 18th, 2010
AAA: A Survey and a Policy- Based Architecture and Framework
A Survey of Trust Management Systems
Cross-layer Analysis for detecting Wireless Misbehavior
Presentation transcript:

A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU

Outline What is Trust? What is Trust Management? Types of Models Main Problem Domains Trust Management Approaches Genealogy of Models Covered Description of Models Conclusion ◦ Evolution of Trust Management Models

What is Trust? Sociologist Diego Gambetta: ◦ Trust is a particular level of the subjective prob. with which an agent will perform a particular action, before [we] can monitor such action and in a context in which it affects [our] own action.

What is Trust? Cont. Trust is context-dependent, dynamic & non- monotonic. Types of Trust ◦ Interpersonal (agent & context specific) ◦ Structural (system within which trust exists) ◦ Dispositional (independent of agent & context)

What is Trust Management ? “Trust Management” was first coined by Blaze et. al 1996 ◦ a coherent framework for the study of security policies, security credentials and trust relationships. ◦ Two of the first TM systems PolicyMaker and KeyNote.

Two Types of Models Trust Management models ◦ Certificate-based ◦ Reputation-based (behavior observed directly or indirectly)  Recommendations: trust information shared among peers

Main Problem Domains Service Provision ◦ Blaze et.al (1996, 1998)- PolicyMaker & Keynote ◦ Abdul-Rahman & Hailes (2000) ◦ Aberer & Despotovic (2001) ◦ Capra (2004)- hTRUST ◦ McNamara et al.(2006) ◦ Quercia & Hailes (2006)-MATE Routing ◦ Buchegger et al. (2002)-CONFIDANT ◦ Cahill et al. (2003)-SECURE ◦ Quercia et al. (2006)-STRUDEL

Trust Management Approaches Individual Initiative (Anarchist) ◦ each agent is responsible for his own fate. Global Trust ◦ each peer in the system has a unique global trust value that other peers can access. Federated Trust ◦ management of trust-related activities across multiple and heterogeneous security domains and autonomous systems. ◦ deals with strategies for managing inter-domain behaviors

Genealogy of Models Anarchist Trust Global TrustFederated Trust AT&T Labs- Policy Maker (1996) KeyNote(1998) Abdul-Rahman & Hailes (2000) Aberer & Despotovic (2001) EigenTrust (2003) CONFIDANT (2002) SECURE (2003) UCL- hTRUST (2004) McNamara et al. (2006) STRUDEL (2006) MATE (2006) Donato et al. (2007) Chun & Bavier(2004) Bhargav et al.(2007)

Genealogy of Models Term: “Trust Management” PKI environments Certificate-based Trust Model Binds keys to actions AT&T Labs- Policy Maker (1996) KeyNote(1998) Abdul-Rahman & Hailes (2000) Aberer & Despotovic (2001) EigenTrust (2003) CONFIDANT (2002) SECURE (2003) UCL- hTRUST (2004) McNamara et al. (2006) STRUDEL (2006) MATE (2006) Donato et al. (2007) Chun & Bavier(2004) Bhargav et al.(2007)

PolicyMaker & Keynote (1996, 1998) Appears like a db query engine to the application. do not directly enforce policy; they only provide advice to the applications that call it. yes/no or additional requirements for request to be acceptable PolicyMakerApplication INPUT Local policies, authenticated credentials, action string OUTPUT

Genealogy of Models Reputation-based Trust Model Agents Autonomously reason about Trust Each Agent- Db of recorded experience. Recommendations exchanged AT&T Labs- Policy Maker (1996) KeyNote(1998) Abdul-Rahman & Hailes (2000) Aberer & Despotovic (2001) EigenTrust (2003) CONFIDANT (2002) SECURE (2003) UCL- hTRUST (2004) McNamara et al. (2006) STRUDEL (2006) MATE (2006) Donato et al. (2007) Chun & Bavier(2004) Bhargav et al.(2007)

Genealogy of Models Reputation-based Trust Model Stored & shared data is exclusively negative(complaints) Distributed Storage AT&T Labs- Policy Maker (1996) KeyNote(1998) Abdul-Rahman & Hailes (2000) Aberer & Despotovic (2001) EigenTrust (2003) CONFIDANT (2002) SECURE (2003) UCL- hTRUST ( 2004 ) McNamara et al. (2006) STRUDEL (2006) MATE (2006) Donato et al. (2007) Chun & Bavier(2004) Bhargav et al.(2007)

Genealogy of Models AT&T Labs- Policy Maker (1996) KeyNote(1998) Abdul-Rahman & Hailes (2000) Aberer & Despotovic (2001) EigenTrust (2003) CONFIDANT (2002) SECURE (2003) UCL- hTRUST (2004) McNamara et al. (2006) STRUDEL (2006) MATE (2006) Donato et al. (2007) Chun & Bavier(2004) Bhargav et al.(2007) Detection & isolation of misbehaved nodes Neighborhood watch shared data is exclusively negative (warnings) Local storage of trust values

CONFIDANT (2002) -EPFL

Genealogy of Models AT&T Labs- Policy Maker (1996) KeyNote(1998) Abdul-Rahman & Hailes (2000) Aberer & Despotovic (2001) EigenTrust (2003) CONFIDANT (2002) SECURE (2003) UCL- hTRUST (2004) McNamara et al. (2006) STRUDEL (2006) MATE (2006) Donato et al. (2007) Chun & Bavier(2004) Bhargav et al.(2007) Incorporates trust model & risk model Distinguishes between unknown and distrusted entities Enables delegation of trust evaluation Local storage of trust values

SECURE Project(2003)-EU

Genealogy of Models AT&T Labs- Policy Maker (1996) KeyNote(1998) Abdul-Rahman & Hailes (2000) Aberer & Despotovic (2001) EigenTrust (2003) CONFIDANT (2002) SECURE (2003) UCL- hTRUST (2004) McNamara et al. (2006) STRUDEL (2006) MATE (2006) Donato et al. (2007) Chun & Bavier(2004) Bhargav et al.(2007) Distributed trust models (Anarchist) Local storage of trust values

hTRUST (2004)-UCL Trust Model that facilitates trust formation, dissemination and evolution. Human Trust- customizing functions capture user’s trust disposition. Detect & isolate malicious recommenders

hTrust(2004)-Locally Stored Data AgentTrustKnowledgetimeStamp RecommenderTrustKnowledgetimeStamp RecommendedRecommenderTrustt ( ) SK recommender Portfolio of Credentials Tacit Tuples Aggregate Trust Tuple

hTRUST (2004)

McNamara et al. (2006)- UCL Trustworthiness – enables predictions about actual QoS given promised QoS Mobility introduced as parameter for decision making ◦ service requester and provider co-located for sufficient time to complete service delivery ◦ Mobility pattern: based on past journeys.

McNamara et al. (2006)- UCL Agent makes request for service Co-located agents respond ◦ Promised QoS ◦ Mobility Pattern Selection to maximize Requestor’s Utility

STRUDEL (2006)- UCL Coalition Peering Domain Tragedy of the commons STRUDEL: distributed framework ◦ Approach for detecting malicious nodes based on the 2-ACK scheme ◦ Trust Model ◦ Forwarding mechanism (decision model).

STRUDEL(2006)- 2 ACK Scheme If X does not receive ack from Y, Y is marked as unresponsive. If X does not receive ack from Z, Y is marked as suspicious ◦ Y did not send the packet to Z ◦ or Y relied on an untrustworthy peer Z. XYZ

MATE (2006)- UCL Attempts integrated mgt of trust & risk for decision making Expected utility theory incorporates trust info of sources, risk attitude of user, & context (location type) Risk restricted to timeliness of delivery.

MATE (2006)- Limitations risks scenario if component suppliers do not provide software within the agreed time ranges. Do not examine the potential risks from the way a software component actually operates. This situation might arise if the software component is signed with the author's key, thus guaranteeing the software integrity, and author is highly trusts.

Evolution of Trust Models Target Environ. Idea AT&T labs(1996, 1998) PKIA lot like Access Control Abdul- Rahman & Hailes (2000) Virtual comm. Intro to Reputation-based Trust Models & agents autonomy Aberer & Despotovic (2001) P2PAttempts distributed Storage of Trust info. CONFIDANT (2002) Mobile Ad- hoc Attempts incorporation of Detection & isolation of misbehavior SECURE (2003) Ubiquitous roaming entities Attempts Incorporation of risk model with Trust

Evolution of Trust Models- Cont. Target Environ. Idea hTrust(2004)Mobile ad- hoc Trust Management & dispositional trust. Detection & isolation of malicious recommenders. The HOW question is answered. McNamara et al. (2006) Mobile ad- hoc Mobility introduced as a factor STRUDEL (2006) CPD Combat Tragedy of the commons (Selfishness of Nodes) MATE (2006)Mobile ad- hoc Attempts integrated management of trust and risk (an element of dispositional trust).

Questions?

References Abdul-Rahman, A. and Hailes, S. “Supporting Trust in Virtual Communities”. In Proceedings of the 33rd Hawaii International Conference on System Sciences, Aberer, K. and Despotovic, Z. “Managing Trust in a Peer-2-Peer Information System”. In Proceedings of the 10th ACM International Conference on Information and Knowledge Management, Atlanta, USA, November Bhargav-Spantzel, A., Squicciarini, A. and Bertino, E. “Trust Negotiation in Identity Management”. In IEEE Security and Privacy, volume 5, issue 2, pages 55—63, March Blaze, M., Feigenbaum, J. and Lacy, J. “Decentralized Trust Management”. In Proceedings of IEEE Symposium on Security and Privacy, pages , Oakland, CA, May Blaze, M., Feigenbaum, J. and Keromytis, A. “KeyNote: Trust Management for Public-Key Infrastructures”. In Proceedings of the 6th International Workshop on Security Protocols, volume 1550 of Lecture Notes in Computer Science, pages , Cambridge, UK, April Springer-Verlag. Blaze, M., Feigenbaum, J., Ioannidis, J. and Keromytis, A. “The KeyNote Trust Management System, Version 2. RFC-2704”. IETF, September Blaze, M., Feigenbaum, J., Ioannidis, J. and Keromytis, A. “The Role of Trust Management in Distributed Systems Security”. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pages , Buchegger, S. and Le Boudec, J. “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes — Fairness in Dynamic Ad-hoc Networks”. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002.

References- Cont. Cahill, V., Gray, E., Seigneur, J., Jensen, C., Chen, Y., Shand, B., Dimmock, N., Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon,P., Serugendo, G., Bryce,C., Carbone, M., Krukow, K.and Nielsen, M. “Using Trust for Secure Collaboration in Uncertain Environments”. In IEEE Pervasive Computing Mobile and Ubiquitous Computing, volume 2, issue 3, pages 52-61, July-Sept Capra, L. “Engineering human trust in mobile system collaborations”. In Proceedings of the 12th International Symposium on Foundations of Software Engineering, pages , Newport Beach, CA, USA, November ACM Press. Chun, B. and Bavier, A. “Decentralized Trust Management and Accountability in Federated Systems”. In Proceedings of the 37 th Hawaii International Conference of System Sciences, Jan Donato,D., Paniccia, M., Selis, M., Castillo, C., Cortese, G. and Leonardi, S. “New metrics for reputation Management in P2P networks”. In Proceedings of the 3 rd International Workshop on Adversarial Information retrieval on the web, May ACM. Kamvar, S., Schlosser, M., Garcia-Molina, H. “The Eigentrust Algorithm for Reputation Management in P2P Networks.” In Proceedings of the 12th International Conference on WWW, New York, USA, ACM Press, pages , Mcnamara, L., Mascolo, C. and Capra, L. "Trust and Mobility aware Service Provision for Pervasive Computing". In Int. Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, May Quercia, D., Lad, M., Hailes, S., Capra, L. and Bhatti, S. “STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions”. In Proceedings of the 21st ACM Symposium on Applied Computing, Dijon, France, April Quercia, D. and Hailes, S. “MATE: Mobility and Adaptation with Trust and Expected-utility”. International Journal Internet Technology and Secured Transactions (IJITST), volume 1, 2007.