SlideShare a Scribd company logo
A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION
Abstract—Development of authorization mechanisms for secure information
access by a large community of users in an open environment is an important
problem in the ever-growing Internet world. In this paper we propose a
computational dynamic trust model for user authorization, rooted in findings from
social science. Unlike most existing computational trust models, this model
distinguishes trusting belief in integrity from that in competence in different
contexts and accounts for subjectivity in the evaluation of a particular trustee by
different trusters. Simulation studies were conducted to compare the performance
of the proposed integrity belief model with other trust models from the literature
for different user behavior patterns. Experiments show that the proposed model
achieves higher performance than other models especially in predicting the
behavior of unstable users.
EXISTING SYSTEM:
The social trust model, which guides the design of the computational model in this
paper, was proposed by McKnight and Chervany after surveying more than 60
papers across a wide range of disciplines. It has been validated via empirical study.
This model defines five conceptual trust types: trusting behavior, trusting intention,
trusting belief, institution-based trust, and disposition to trust. Trusting behavior is
an action that increases a truster’s risk or makes the truster vulnerable to the
trustee. Trusting intention indicates that a truster is willing to engage in trusting
behaviors with the trustee. A trusting intention implies a trust decision and leads to
a trusting behavior. Two subtypes of trusting intention are: 1) Willingness to
depend: the volitional preparedness to make oneself vulnerable to the trustee. 2)
Subjective probability of depending: the likelihood that a truster will depend on a
trustee. Trusting belief is a truster’s subjective belief in the fact that a trustee has
attributes beneficial to the truster. The following are the four attributes used most
often: 1) Competence: a trustee has the ability or expertise to perform certain tasks.
2) Benevolence: a trustee cares about a truster’s interests. 3) Integrity: a trustee is
honest and keeps commitments. 4) Predictability: a trustee’s actions are
sufficiently consistent. Institution-based trust is the belief that proper structural
conditions are in place to enhance the probability of achieving a successful
outcome. Two subtypes of institution-based trust are: 1) Structural assurance: the
belief that structures deployed promote positive outcomes. Structures include
guarantees, regulations, promises etc. 2) Situational normality: the belief that the
properly ordered environments facilitate success outcomes.
PROPOSED SYSTEM:
In this work, we propose a computational dynamic trust model for user
authorization. Mechanisms for building trusting belief using the first-hand (direct
experience) as well as second-hand information (recommendation and reputation)
are integrated into the model. The contributions of the model to computational trust
literature are:
_ The model is rooted in findings from social science, i.e., it provides automated
trust management that mimics trusting behaviors in the society, bringing trust
computation for the digital world closer to the evaluation of trust in the real world.
_ Unlike other trust models in the literature, the proposed model accounts for
different types of trust. Specifically, it distinguishes trusting belief in integrity from
that in competence.
_ The model takes into account the subjectivity of trust ratings by different entities,
and introduces a mechanism to eliminate the impact of subjectivity in reputation
aggregation.
Module1
Trust model
The trust model we propose in this paper distinguishes integrity trust from
competence trust. Competence trust is the trusting belief in a trustee’s ability or
expertise to perform certain tasks in a specific situation. Integrity trust is the belief
that a trustee is honest and acts in favor of the truster. Integrity and benevolence in
social trust models are combined together. Predictability is attached to a
competence or integrity belief as a secondary measure. The elements of the model
environment, as seen in Fig. 1, include two main types of actors, namely trusters
and trustees, a database of trust information, and different contexts, which depend
on the concerns of a truster and the competence of a trustee. For the online auction
site example in Section 1, let us assume that buyer B needs to decide whether to
authorize seller S to charge his credit card for an item I (authorize access to his
credit card/contactinformation). The elements of the model in this case are:
_ Trusters are the buyers registered to the auction site.
_ Trustees are the sellers registered to the auction site.
_ The context states how important for B the shipping, packaging and item quality
competences of S for item I are. It also states how important for B the integrity of
S is for this transaction.
_ B can gather trust information about S from a database maintained by the site or
a trusted third party. This information includes the ratings that S received from
buyers (including B’s previous ratings, if any) for competence in shipping,
packaging and quality of I as well as S’s integrity. It also includes the ratings of
buyers (including B) for sellers other than S in different contexts and ratings of S
for different items. Trust evaluation is recorded in the database when a buyer rates
a transaction with a seller on the site.
Module 2
Trusting belief
Beliefs in two attributes, competence and integrity, are separated. Context
identifier is included for competence belief. Values of both beliefs are real
numbers ranging from 0 to 1. The higher the value, the more a truster believes in a
trustee. Predictability is a positive real number. It characterizes the goodness of
belief formed. The smaller the predictability or uncertainty, the more confident a
truster is about the associated belief value. Both the variability of a trustee’s
behaviors and lack of observations negatively impact the goodness of belief
formed. iNumber in competence belief records the number of observations
accumulated. Trusting beliefs can be classified into initial and continuous trust.
Initial trust is the belief established before a truster t1 interacts with a trustee u1.
Continuous trust is the belief after t1 has had appropriate direct experience with u1.
Module 3
Global and Local Profiles
Each truster t1 has one global profile. The profile contains: (1) t1’s priori integrity
and competence trusting belief; (2) method preference policies; (3) imprecision
handling policies; (4) uncertainty handling policies; (5) parameters needed by
trust-building methods. t1 can have one local profile for each context. Local
profiles have a similar structure as global profiles. The content in a local profile
overrides that in the global one. Fig. 4 shows the definition of global and local
profiles. As aforementioned, method preference policies, defined as Preference
Policy, are to extend the partial order _ to a total order. Therefore, no two methods
have the same priority. iCompetence and cCompetence are used when building
initial and continuous competence trust respectively. iCompetence consists of four
parts corresponding to the four scenarios to build initial competence trust.
iIntegrity and cIntegrity are for establishing integrity trusting belief. Relationships
are separately defined on each ambiguous priority set.
Module 4
Integrity belief
Integrity may change fast with time. Furthermore, it possesses a meaningful trend.
Evaluation of integrity belief is based on two assumptions:
_ We assume integrity of a trustee is consistent in all contexts.
_ Integrity belief may vary largely with time. An example is a user behaving well
until he reaches a high trust value and then starts committing fraud. We used mean
as an estimator for competence belief as it is relatively steady with time. For
integrity belief, this assumption is excluded. When behavior patterns are present,
the mean is no more a good estimator. The similarity between a rating sequence
and a time series inspires us to adopt the method of double exponential moothing
[7] to predict the next rating based on a previous rating sequence. Let ri denote the
ith rating and fiþ1 denote the forecast value of riþ1 after observing the rating
sequence r1; . . . ; ri.
CONCLUSION
In this paper we presented a dynamic computational trust model for user
authorization. This model is rooted in findings from social science, and is not
limited to trusting belief as most computational methods are. We presented a
representation of context and functions that relate different contexts, enabling
building of trusting belief using crosscontext information. The proposed dynamic
trust model enables automated trust management that mimics trusting behaviors in
society, such as selecting a corporate partner, forming a coalition, or choosing
negotiation protocols or strategies in e-commerce. The formalization of trust helps
in designing algorithms to choose reliable resources in peer-to-peer systems,
developing secure protocols for ad hoc networks and detecting deceptive agents in
a virtual community. Experiments in a simulated trust environment show that the
proposed integrity trust model performs better than other major trust models in
predicting the behavior of users whose actions change based on certain patterns
over time.
REFERENCES
[1] G.R. Barnes and P.B. Cerrito, “A Mathematical Model for Interpersonal
Relationships in Social Networks,” Social Networks, vol. 20, no. 2, pp. 179-196,
1998.
[2] R. Brent, Algorithms for Minimization without Derivatives. Prentice- Hall,
1973.
[3] A. Das and M.M. Islam, “SecuredTrust: A Dynamic Trust Computation Model
for Secured Communication in Multiagent Systems,” IEEE Trans. Dependable and
Secure Computing, vol. 9, no. 2, pp. 261- 274, Mar./Apr. 2012.
[4] C. Dellarocas, “Immunizing Online Reputation Reporting Systems against
Unfair Ratings and Discriminatory Behavior,” Proc. Second ACM Conf.
Electronic Commerce, pp. 150-157, 2000.
[5] L. Fan, “A Grid Authorization Mechanism with Dynamic Role Based on Trust
Model,” J. Computational Information Systems, vol. 8, no. 12, pp. 5077-5084,
2012.
[6] T. Grandison and M. Sloman, “A Survey of Trust in Internet Applications,”
IEEE Comm. Surveys, vol. 3, no. 4, pp. 2-16, Fourth Quarter 2000.
[7] J.D.Hamilton, TimeSeriesAnalysis. PrincetonUniversity Press, 1994.
[8] J. Hu, Q. Wu, and B. Zhou, “FCTrust: A Robust and Efficient Feedback
Credibility-Based Distributed P2P Trust Model,” Proc. IEEE Ninth Int’l Conf.
Young Computer Scientists (ICYCS ‘08), pp. 1963- 1968, 2008.
[9] B. Lang, “A Computational Trust Model for Access Control in P2P,” Science
China Information Sciences, vol. 53, no. 5, pp. 896-910, May 2010.
[10] C. Liu and L. Liu, “A Trust Evaluation Model for Dynamic Authorization,”
Proc. Int’l Conf. Computational Intelligence and Software Eng. (CiSE), pp. 1-4,
2010.

More Related Content

Viewers also liked

Saxen van coller on wild photography
Saxen van coller on wild photographySaxen van coller on wild photography
Saxen van coller on wild photography
Saxen Van Coller
 
Litigation clerk performance appraisal
Litigation clerk performance appraisalLitigation clerk performance appraisal
Litigation clerk performance appraisal
kyleannie435
 
Dstu b v.2 7-181-2009
Dstu b v.2 7-181-2009Dstu b v.2 7-181-2009
Dstu b v.2 7-181-2009
braga william
 
Dstu b v.2 7-66-98
Dstu b v.2 7-66-98Dstu b v.2 7-66-98
Dstu b v.2 7-66-98
braga william
 
ITA A1.1 07
ITA  A1.1  07ITA  A1.1  07
ITA A1.1 07
FernandoIdiomas
 
CERTIFICATE-DOCUMENT CONTROLLER
CERTIFICATE-DOCUMENT CONTROLLERCERTIFICATE-DOCUMENT CONTROLLER
CERTIFICATE-DOCUMENT CONTROLLERANTHONY ANTIGULAS
 
CoolHunter
CoolHunterCoolHunter
CoolHunter
Erik Sandybaev
 
JosephManriquezDiscAssessment
JosephManriquezDiscAssessmentJosephManriquezDiscAssessment
JosephManriquezDiscAssessmentJoseph Manriquez
 
Gost 17.2.4.02 81 2
Gost 17.2.4.02 81 2Gost 17.2.4.02 81 2
Gost 17.2.4.02 81 2
braga william
 
Top 8 accounts receivable coordinator resume samples
Top 8 accounts receivable coordinator resume samplesTop 8 accounts receivable coordinator resume samples
Top 8 accounts receivable coordinator resume samplestonychoper505
 
Top 8 counter manager resume samples
Top 8 counter manager resume samplesTop 8 counter manager resume samples
Top 8 counter manager resume samplesjomwri
 

Viewers also liked (14)

Saxen van coller on wild photography
Saxen van coller on wild photographySaxen van coller on wild photography
Saxen van coller on wild photography
 
Litigation clerk performance appraisal
Litigation clerk performance appraisalLitigation clerk performance appraisal
Litigation clerk performance appraisal
 
wri brochure
wri brochurewri brochure
wri brochure
 
Dstu b v.2 7-181-2009
Dstu b v.2 7-181-2009Dstu b v.2 7-181-2009
Dstu b v.2 7-181-2009
 
Dstu b v.2 7-66-98
Dstu b v.2 7-66-98Dstu b v.2 7-66-98
Dstu b v.2 7-66-98
 
ITA A1.1 07
ITA  A1.1  07ITA  A1.1  07
ITA A1.1 07
 
CERTIFICATE-DOCUMENT CONTROLLER
CERTIFICATE-DOCUMENT CONTROLLERCERTIFICATE-DOCUMENT CONTROLLER
CERTIFICATE-DOCUMENT CONTROLLER
 
CoolHunter
CoolHunterCoolHunter
CoolHunter
 
JosephManriquezDiscAssessment
JosephManriquezDiscAssessmentJosephManriquezDiscAssessment
JosephManriquezDiscAssessment
 
Gost 17.2.4.02 81 2
Gost 17.2.4.02 81 2Gost 17.2.4.02 81 2
Gost 17.2.4.02 81 2
 
Top 8 accounts receivable coordinator resume samples
Top 8 accounts receivable coordinator resume samplesTop 8 accounts receivable coordinator resume samples
Top 8 accounts receivable coordinator resume samples
 
JBJCV0315
JBJCV0315JBJCV0315
JBJCV0315
 
Top 8 counter manager resume samples
Top 8 counter manager resume samplesTop 8 counter manager resume samples
Top 8 counter manager resume samples
 
ADEROHUNMU EMMANUEL A
ADEROHUNMU EMMANUEL AADEROHUNMU EMMANUEL A
ADEROHUNMU EMMANUEL A
 

Similar to A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION

AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
ijwscjournal
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
graphhoc
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
IJECEIAES
 
TUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management SystemTUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management System
CSCJournals
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
ijngnjournal
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputationguestc12d53
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
mahaveermalhi1
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
IRJET Journal
 
How Psychological Factors Shape DeFi Trustworthiness
How Psychological Factors Shape DeFi TrustworthinessHow Psychological Factors Shape DeFi Trustworthiness
How Psychological Factors Shape DeFi Trustworthiness
The Connecter
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
i_scienceEU
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix Factorization
Alejandro Bellogin
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization
Soudé Fazeli
 
Research Paper
Research Paper Research Paper
Research Paper
Sankar Ponnusamy
 
Trust Enabled Ecosystems
Trust Enabled EcosystemsTrust Enabled Ecosystems
Trust Enabled Ecosystems
Alex Todd
 
Identifying_Factors_for_Managing_Trust_i
Identifying_Factors_for_Managing_Trust_iIdentifying_Factors_for_Managing_Trust_i
Identifying_Factors_for_Managing_Trust_iSamira Sadaoui
 
Trust Enabled Supply Networks - whitepaper
Trust Enabled Supply Networks - whitepaperTrust Enabled Supply Networks - whitepaper
Trust Enabled Supply Networks - whitepaper
Alex Todd
 
Trust_Measures_and_Indicators_for_Investors[1]
Trust_Measures_and_Indicators_for_Investors[1]Trust_Measures_and_Indicators_for_Investors[1]
Trust_Measures_and_Indicators_for_Investors[1]Alex Todd
 
A Real Dynamic Cyber Trust Model
A Real Dynamic Cyber Trust ModelA Real Dynamic Cyber Trust Model
A Real Dynamic Cyber Trust Model
ijtsrd
 
Iri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust FrameworkIri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust Framework
Lassonde School of Engineering
 

Similar to A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION (20)

AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORKAN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
AN EXAUSTIVE SURVEY OF TRUST MODELS IN P2P NETWORK
 
In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...In this paper we present a necessary and sufficient condition for Hamiltonian...
In this paper we present a necessary and sufficient condition for Hamiltonian...
 
Developing a trust model using graph and ranking trust of social messaging s...
Developing a trust model using graph and ranking trust of  social messaging s...Developing a trust model using graph and ranking trust of  social messaging s...
Developing a trust model using graph and ranking trust of social messaging s...
 
TUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management SystemTUX-TMS: Thapar University Extensible-Trust Management System
TUX-TMS: Thapar University Extensible-Trust Management System
 
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRIDPURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
PURGING OF UNTRUSTWORTHY RECOMMENDATIONS FROM A GRID
 
===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation===A Survey Of Trust And Reputation
===A Survey Of Trust And Reputation
 
Building Trust in Artificial Intelligence
Building Trust in Artificial IntelligenceBuilding Trust in Artificial Intelligence
Building Trust in Artificial Intelligence
 
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data RatingA Survey on Trust Inference Network for Personalized Use from Online Data Rating
A Survey on Trust Inference Network for Personalized Use from Online Data Rating
 
How Psychological Factors Shape DeFi Trustworthiness
How Psychological Factors Shape DeFi TrustworthinessHow Psychological Factors Shape DeFi Trustworthiness
How Psychological Factors Shape DeFi Trustworthiness
 
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
Social life in digital societies: Trust, Reputation and Privacy EINS summer s...
 
Implicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix FactorizationImplicit vs Explicit trust in Social Matrix Factorization
Implicit vs Explicit trust in Social Matrix Factorization
 
Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization Implicit vs. Explicit Trust in Social Matrix Factorization
Implicit vs. Explicit Trust in Social Matrix Factorization
 
Research Paper
Research Paper Research Paper
Research Paper
 
Trust Enabled Ecosystems
Trust Enabled EcosystemsTrust Enabled Ecosystems
Trust Enabled Ecosystems
 
Identifying_Factors_for_Managing_Trust_i
Identifying_Factors_for_Managing_Trust_iIdentifying_Factors_for_Managing_Trust_i
Identifying_Factors_for_Managing_Trust_i
 
Trust Enabled Supply Networks - whitepaper
Trust Enabled Supply Networks - whitepaperTrust Enabled Supply Networks - whitepaper
Trust Enabled Supply Networks - whitepaper
 
Trust_Measures_and_Indicators_for_Investors[1]
Trust_Measures_and_Indicators_for_Investors[1]Trust_Measures_and_Indicators_for_Investors[1]
Trust_Measures_and_Indicators_for_Investors[1]
 
A Real Dynamic Cyber Trust Model
A Real Dynamic Cyber Trust ModelA Real Dynamic Cyber Trust Model
A Real Dynamic Cyber Trust Model
 
Iri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust FrameworkIri workshop oct 19 Introucing Behavioural Trust Framework
Iri workshop oct 19 Introucing Behavioural Trust Framework
 

Recently uploaded

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
EugeneSaldivar
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
Levi Shapiro
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
Special education needs
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
MIRIAMSALINAS13
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
Celine George
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
Atul Kumar Singh
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
Nguyen Thanh Tu Collection
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
Celine George
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
EverAndrsGuerraGuerr
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
BhavyaRajput3
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
camakaiclarkmusic
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
siemaillard
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
Jheel Barad
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
kaushalkr1407
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
EduSkills OECD
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
joachimlavalley1
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Thiyagu K
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
GeoBlogs
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
Anna Sz.
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
JosvitaDsouza2
 

Recently uploaded (20)

TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...TESDA TM1 REVIEWER  FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
TESDA TM1 REVIEWER FOR NATIONAL ASSESSMENT WRITTEN AND ORAL QUESTIONS WITH A...
 
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
June 3, 2024 Anti-Semitism Letter Sent to MIT President Kornbluth and MIT Cor...
 
special B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdfspecial B.ed 2nd year old paper_20240531.pdf
special B.ed 2nd year old paper_20240531.pdf
 
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXXPhrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
Phrasal Verbs.XXXXXXXXXXXXXXXXXXXXXXXXXX
 
Model Attribute Check Company Auto Property
Model Attribute  Check Company Auto PropertyModel Attribute  Check Company Auto Property
Model Attribute Check Company Auto Property
 
Language Across the Curriculm LAC B.Ed.
Language Across the  Curriculm LAC B.Ed.Language Across the  Curriculm LAC B.Ed.
Language Across the Curriculm LAC B.Ed.
 
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
BÀI TẬP BỔ TRỢ TIẾNG ANH GLOBAL SUCCESS LỚP 3 - CẢ NĂM (CÓ FILE NGHE VÀ ĐÁP Á...
 
How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17How to Make a Field invisible in Odoo 17
How to Make a Field invisible in Odoo 17
 
Thesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.pptThesis Statement for students diagnonsed withADHD.ppt
Thesis Statement for students diagnonsed withADHD.ppt
 
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCECLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
CLASS 11 CBSE B.St Project AIDS TO TRADE - INSURANCE
 
CACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdfCACJapan - GROUP Presentation 1- Wk 4.pdf
CACJapan - GROUP Presentation 1- Wk 4.pdf
 
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
aaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaaa
 
Instructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptxInstructions for Submissions thorugh G- Classroom.pptx
Instructions for Submissions thorugh G- Classroom.pptx
 
The Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdfThe Roman Empire A Historical Colossus.pdf
The Roman Empire A Historical Colossus.pdf
 
Francesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptxFrancesca Gottschalk - How can education support child empowerment.pptx
Francesca Gottschalk - How can education support child empowerment.pptx
 
Additional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdfAdditional Benefits for Employee Website.pdf
Additional Benefits for Employee Website.pdf
 
Unit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdfUnit 2- Research Aptitude (UGC NET Paper I).pdf
Unit 2- Research Aptitude (UGC NET Paper I).pdf
 
The geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideasThe geography of Taylor Swift - some ideas
The geography of Taylor Swift - some ideas
 
Polish students' mobility in the Czech Republic
Polish students' mobility in the Czech RepublicPolish students' mobility in the Czech Republic
Polish students' mobility in the Czech Republic
 
1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx1.4 modern child centered education - mahatma gandhi-2.pptx
1.4 modern child centered education - mahatma gandhi-2.pptx
 

A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION

  • 1. A COMPUTATIONAL DYNAMIC TRUST MODEL FOR USER AUTHORIZATION Abstract—Development of authorization mechanisms for secure information access by a large community of users in an open environment is an important problem in the ever-growing Internet world. In this paper we propose a computational dynamic trust model for user authorization, rooted in findings from social science. Unlike most existing computational trust models, this model distinguishes trusting belief in integrity from that in competence in different contexts and accounts for subjectivity in the evaluation of a particular trustee by different trusters. Simulation studies were conducted to compare the performance of the proposed integrity belief model with other trust models from the literature for different user behavior patterns. Experiments show that the proposed model achieves higher performance than other models especially in predicting the behavior of unstable users. EXISTING SYSTEM: The social trust model, which guides the design of the computational model in this paper, was proposed by McKnight and Chervany after surveying more than 60 papers across a wide range of disciplines. It has been validated via empirical study. This model defines five conceptual trust types: trusting behavior, trusting intention,
  • 2. trusting belief, institution-based trust, and disposition to trust. Trusting behavior is an action that increases a truster’s risk or makes the truster vulnerable to the trustee. Trusting intention indicates that a truster is willing to engage in trusting behaviors with the trustee. A trusting intention implies a trust decision and leads to a trusting behavior. Two subtypes of trusting intention are: 1) Willingness to depend: the volitional preparedness to make oneself vulnerable to the trustee. 2) Subjective probability of depending: the likelihood that a truster will depend on a trustee. Trusting belief is a truster’s subjective belief in the fact that a trustee has attributes beneficial to the truster. The following are the four attributes used most often: 1) Competence: a trustee has the ability or expertise to perform certain tasks. 2) Benevolence: a trustee cares about a truster’s interests. 3) Integrity: a trustee is honest and keeps commitments. 4) Predictability: a trustee’s actions are sufficiently consistent. Institution-based trust is the belief that proper structural conditions are in place to enhance the probability of achieving a successful outcome. Two subtypes of institution-based trust are: 1) Structural assurance: the belief that structures deployed promote positive outcomes. Structures include guarantees, regulations, promises etc. 2) Situational normality: the belief that the properly ordered environments facilitate success outcomes. PROPOSED SYSTEM:
  • 3. In this work, we propose a computational dynamic trust model for user authorization. Mechanisms for building trusting belief using the first-hand (direct experience) as well as second-hand information (recommendation and reputation) are integrated into the model. The contributions of the model to computational trust literature are: _ The model is rooted in findings from social science, i.e., it provides automated trust management that mimics trusting behaviors in the society, bringing trust computation for the digital world closer to the evaluation of trust in the real world. _ Unlike other trust models in the literature, the proposed model accounts for different types of trust. Specifically, it distinguishes trusting belief in integrity from that in competence. _ The model takes into account the subjectivity of trust ratings by different entities, and introduces a mechanism to eliminate the impact of subjectivity in reputation aggregation. Module1 Trust model The trust model we propose in this paper distinguishes integrity trust from competence trust. Competence trust is the trusting belief in a trustee’s ability or
  • 4. expertise to perform certain tasks in a specific situation. Integrity trust is the belief that a trustee is honest and acts in favor of the truster. Integrity and benevolence in social trust models are combined together. Predictability is attached to a competence or integrity belief as a secondary measure. The elements of the model environment, as seen in Fig. 1, include two main types of actors, namely trusters and trustees, a database of trust information, and different contexts, which depend on the concerns of a truster and the competence of a trustee. For the online auction site example in Section 1, let us assume that buyer B needs to decide whether to authorize seller S to charge his credit card for an item I (authorize access to his credit card/contactinformation). The elements of the model in this case are: _ Trusters are the buyers registered to the auction site. _ Trustees are the sellers registered to the auction site. _ The context states how important for B the shipping, packaging and item quality competences of S for item I are. It also states how important for B the integrity of S is for this transaction. _ B can gather trust information about S from a database maintained by the site or a trusted third party. This information includes the ratings that S received from buyers (including B’s previous ratings, if any) for competence in shipping, packaging and quality of I as well as S’s integrity. It also includes the ratings of buyers (including B) for sellers other than S in different contexts and ratings of S
  • 5. for different items. Trust evaluation is recorded in the database when a buyer rates a transaction with a seller on the site. Module 2 Trusting belief Beliefs in two attributes, competence and integrity, are separated. Context identifier is included for competence belief. Values of both beliefs are real numbers ranging from 0 to 1. The higher the value, the more a truster believes in a trustee. Predictability is a positive real number. It characterizes the goodness of belief formed. The smaller the predictability or uncertainty, the more confident a truster is about the associated belief value. Both the variability of a trustee’s behaviors and lack of observations negatively impact the goodness of belief formed. iNumber in competence belief records the number of observations accumulated. Trusting beliefs can be classified into initial and continuous trust. Initial trust is the belief established before a truster t1 interacts with a trustee u1. Continuous trust is the belief after t1 has had appropriate direct experience with u1. Module 3 Global and Local Profiles Each truster t1 has one global profile. The profile contains: (1) t1’s priori integrity and competence trusting belief; (2) method preference policies; (3) imprecision
  • 6. handling policies; (4) uncertainty handling policies; (5) parameters needed by trust-building methods. t1 can have one local profile for each context. Local profiles have a similar structure as global profiles. The content in a local profile overrides that in the global one. Fig. 4 shows the definition of global and local profiles. As aforementioned, method preference policies, defined as Preference Policy, are to extend the partial order _ to a total order. Therefore, no two methods have the same priority. iCompetence and cCompetence are used when building initial and continuous competence trust respectively. iCompetence consists of four parts corresponding to the four scenarios to build initial competence trust. iIntegrity and cIntegrity are for establishing integrity trusting belief. Relationships are separately defined on each ambiguous priority set. Module 4 Integrity belief Integrity may change fast with time. Furthermore, it possesses a meaningful trend. Evaluation of integrity belief is based on two assumptions: _ We assume integrity of a trustee is consistent in all contexts. _ Integrity belief may vary largely with time. An example is a user behaving well until he reaches a high trust value and then starts committing fraud. We used mean as an estimator for competence belief as it is relatively steady with time. For integrity belief, this assumption is excluded. When behavior patterns are present,
  • 7. the mean is no more a good estimator. The similarity between a rating sequence and a time series inspires us to adopt the method of double exponential moothing [7] to predict the next rating based on a previous rating sequence. Let ri denote the ith rating and fiþ1 denote the forecast value of riþ1 after observing the rating sequence r1; . . . ; ri. CONCLUSION In this paper we presented a dynamic computational trust model for user authorization. This model is rooted in findings from social science, and is not limited to trusting belief as most computational methods are. We presented a representation of context and functions that relate different contexts, enabling building of trusting belief using crosscontext information. The proposed dynamic trust model enables automated trust management that mimics trusting behaviors in society, such as selecting a corporate partner, forming a coalition, or choosing negotiation protocols or strategies in e-commerce. The formalization of trust helps in designing algorithms to choose reliable resources in peer-to-peer systems, developing secure protocols for ad hoc networks and detecting deceptive agents in a virtual community. Experiments in a simulated trust environment show that the proposed integrity trust model performs better than other major trust models in predicting the behavior of users whose actions change based on certain patterns over time.
  • 8. REFERENCES [1] G.R. Barnes and P.B. Cerrito, “A Mathematical Model for Interpersonal Relationships in Social Networks,” Social Networks, vol. 20, no. 2, pp. 179-196, 1998. [2] R. Brent, Algorithms for Minimization without Derivatives. Prentice- Hall, 1973. [3] A. Das and M.M. Islam, “SecuredTrust: A Dynamic Trust Computation Model for Secured Communication in Multiagent Systems,” IEEE Trans. Dependable and Secure Computing, vol. 9, no. 2, pp. 261- 274, Mar./Apr. 2012. [4] C. Dellarocas, “Immunizing Online Reputation Reporting Systems against Unfair Ratings and Discriminatory Behavior,” Proc. Second ACM Conf. Electronic Commerce, pp. 150-157, 2000. [5] L. Fan, “A Grid Authorization Mechanism with Dynamic Role Based on Trust Model,” J. Computational Information Systems, vol. 8, no. 12, pp. 5077-5084, 2012. [6] T. Grandison and M. Sloman, “A Survey of Trust in Internet Applications,” IEEE Comm. Surveys, vol. 3, no. 4, pp. 2-16, Fourth Quarter 2000. [7] J.D.Hamilton, TimeSeriesAnalysis. PrincetonUniversity Press, 1994.
  • 9. [8] J. Hu, Q. Wu, and B. Zhou, “FCTrust: A Robust and Efficient Feedback Credibility-Based Distributed P2P Trust Model,” Proc. IEEE Ninth Int’l Conf. Young Computer Scientists (ICYCS ‘08), pp. 1963- 1968, 2008. [9] B. Lang, “A Computational Trust Model for Access Control in P2P,” Science China Information Sciences, vol. 53, no. 5, pp. 896-910, May 2010. [10] C. Liu and L. Liu, “A Trust Evaluation Model for Dynamic Authorization,” Proc. Int’l Conf. Computational Intelligence and Software Eng. (CiSE), pp. 1-4, 2010.