Tool Support for Incorporating Trust Models into Decentralized Applications
نویسندگان
چکیده
The role of decentralized trust and reputation management in the establishment of trust relationships between peers in decentralized applications has been well-recognized. Several reputation-based trust models exist in the literature. PACE is an architectural style for decentralized trust management. PACE provides specific principles that guide the incorporation of trust and reputation models within the architecture of each decentralized peer. However, a software architect using PACE to build a trust-enabled decentralized application must study the trust model being incorporated, then design and build the relevant trust components corresponding to the trust model, and finally integrate them within the PACE architecture. This design process is long and tedious but essential. In order to address this, in this paper, we present an approach that facilitates the automation of several parts of this design process in order to ease the burden on the architect. Specifically, we first use the 4C reputation framework to generate an XML-based description of a reputation model. This description is used by a tool called the PACE Support Generator to automatically generate and modify relevant trust components and utilities as well as to modify the existing architectural description that can be instantiated to build a trust-enabled decentralized application. In this paper, we also present an in depth evaluation of the PACE Support Generator in the context of the Distributed Trust model. Tool Support for Incorporating Trust Models into Decentralized Applications Institute for Software Research University of California, Irvine Irvine, CA 92697-3425 {mdiallo,sgirish,taylor}@ics.uci.edu ISR Technical Report # UCI-ISR-06-04 April 2006 Mamadou H. Diallo, Girish Suryanarayana, Richard N. Taylor
منابع مشابه
A Generic Framework for Modeling Decentralized Reputation-based Trust Models
Decentralized applications do not have a single centralized authority that can safeguard peers in the system from malicious attacks. Each peer is autonomous and must adopt measures to protect itself. Reputation-based trust management systems enable peers to develop trust relationships with each other based on their reputations. These trust relationships help a peer determine the trustworthiness...
متن کاملThe Challenges and Trends of Deploying Blockchain in the Real World for the Users’ Need
Blockchain technology is a decentralized and open database maintained by a peer-to-peer network, offering a “trustless trust” for untrusted parties. Despite the fact that some researchers consider blockchain as a bubble, blockchain technology has the genuine potential to solve problems across industries. In this article, we provide an overview of the development that Blockchain technology has h...
متن کاملProgram Partitioning Using Dynamic Trust Models
Developing distributed applications is a difficult task. It is further complicated if system-wide security policies shall be specified and enforced, or if both data and hosts are owned by principals that do not fully trust each other, as is typically the case in service-oriented or gridbased scenarios. Language-based technologies have been suggested to support developers of those applications—t...
متن کاملSIFT: A Simulation Framework for Analyzing Decentralized Reputation-based Trust Models
Open decentralized applications are susceptible to the attacks of malicious entities. In such applications, each autonomous entity must adopt protective measures to safeguard itself. One set of such countermeasures are reputation-based trust management systems. However, designing these systems is arduous because the impact of factors introduced by decentralization on such systems is largely unk...
متن کاملSpecification of Parameters Relevant for Trust Evaluation in an Adhoc Grid Environment
The purpose of security in ad hoc grid environments is to support secure execution of tasks on shared resources and to protect the resources from malicious user actions. The mechanisms of authentication and authorization commonly used in traditional grid environments are not sufficient to cover all security requirements arising from the decentralized nature of the ad hoc grid. However, the conc...
متن کامل