Tool Support for Incorporating Trust Models into Decentralized Applications

نویسندگان

  • Mamadou H. Diallo
  • Girish Suryanarayana
  • Richard N. Taylor
چکیده

The role of decentralized trust and reputation management in the establishment of trust relationships between peers in decentralized applications has been well-recognized. Several reputation-based trust models exist in the literature. PACE is an architectural style for decentralized trust management. PACE provides specific principles that guide the incorporation of trust and reputation models within the architecture of each decentralized peer. However, a software architect using PACE to build a trust-enabled decentralized application must study the trust model being incorporated, then design and build the relevant trust components corresponding to the trust model, and finally integrate them within the PACE architecture. This design process is long and tedious but essential. In order to address this, in this paper, we present an approach that facilitates the automation of several parts of this design process in order to ease the burden on the architect. Specifically, we first use the 4C reputation framework to generate an XML-based description of a reputation model. This description is used by a tool called the PACE Support Generator to automatically generate and modify relevant trust components and utilities as well as to modify the existing architectural description that can be instantiated to build a trust-enabled decentralized application. In this paper, we also present an in depth evaluation of the PACE Support Generator in the context of the Distributed Trust model. Tool Support for Incorporating Trust Models into Decentralized Applications Institute for Software Research University of California, Irvine Irvine, CA 92697-3425 {mdiallo,sgirish,taylor}@ics.uci.edu ISR Technical Report # UCI-ISR-06-04 April 2006 Mamadou H. Diallo, Girish Suryanarayana, Richard N. Taylor

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Generic Framework for Modeling Decentralized Reputation-based Trust Models

Decentralized applications do not have a single centralized authority that can safeguard peers in the system from malicious attacks. Each peer is autonomous and must adopt measures to protect itself. Reputation-based trust management systems enable peers to develop trust relationships with each other based on their reputations. These trust relationships help a peer determine the trustworthiness...

متن کامل

The Challenges and Trends of Deploying Blockchain in the Real World for the Users’ Need

Blockchain technology is a decentralized and open database maintained by a peer-to-peer network, offering a “trustless trust” for untrusted parties. Despite the fact that some researchers consider blockchain as a bubble, blockchain technology has the genuine potential to solve problems across industries. In this article, we provide an overview of the development that Blockchain technology has h...

متن کامل

Program Partitioning Using Dynamic Trust Models

Developing distributed applications is a difficult task. It is further complicated if system-wide security policies shall be specified and enforced, or if both data and hosts are owned by principals that do not fully trust each other, as is typically the case in service-oriented or gridbased scenarios. Language-based technologies have been suggested to support developers of those applications—t...

متن کامل

SIFT: A Simulation Framework for Analyzing Decentralized Reputation-based Trust Models

Open decentralized applications are susceptible to the attacks of malicious entities. In such applications, each autonomous entity must adopt protective measures to safeguard itself. One set of such countermeasures are reputation-based trust management systems. However, designing these systems is arduous because the impact of factors introduced by decentralization on such systems is largely unk...

متن کامل

Specification of Parameters Relevant for Trust Evaluation in an Adhoc Grid Environment

The purpose of security in ad hoc grid environments is to support secure execution of tasks on shared resources and to protect the resources from malicious user actions. The mechanisms of authentication and authorization commonly used in traditional grid environments are not sufficient to cover all security requirements arising from the decentralized nature of the ad hoc grid. However, the conc...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2006