Runtime Processes and Trust Management Model in MANET and GRID
نویسنده
چکیده
Service-oriented Architectures (SOA) facilitate the dynamic and seamless integration of services offered by different service providers which in addition can be located in different trust domains. Especially for business integration scenarios, Federated Identity Management emerged as a possibility to propagate identity information as security assertions across company borders in order to secure the interaction between different services. Although this approach guarantees scalability regarding the integration of identity-based services, it exposes a service provider to new security risks. These security risks result from the complex trust relationships within a federation. In a federation the authentication of a user is not necessarily performed within the service provider’s domain, but can be performed in the user’s local domain. Consequently, the service provider has to rely on authentication results received from a federation partner to enforce access control. This implies that the quality of the authentication process is out of control by the service provider and therefore becomes a factor which needs to be considered in the access control step. In order to guarantee a designated level of security, the quality of the authentication process should be part of the access control decision. To ease this process, we propose in this paper a method to rate authentication information by a level of trust which describes the strength of an authentication method. Additionally, in order to support the concept of a two-factor authentication, we also present a mathematical model to calculate the trust level when combining two authentication methods. Quantitative Trust Management (QTM) provides a dynamic interpretation of authorization policies for access control decisions based on upon evolving reputations of the entities involved. QuanTM, a QTM system, selectively combines elements from trust management and reputation management to create a novel method for policy evaluation. Trust management, while effective in managing access with delegated credentials (as in PolicyMaker and KeyNote), needs greater flexibility in handling situations of partial trust. Reputation management provides a means to quantify trust, but lacks delegation and policy enforcement. This paper reports on QuanTM’s design decisions and novel policy Evaluation procedure. A representation of quantified trust relationships, the trust dependency graph, and a sample QuanTM application specific to the KeyNote trust management language, are also proposed. KeywordsTrust management, Trust levels, Authentication and Access Control, Web Service Federation, Federated Identity Management
منابع مشابه
MANET: Security Issues and Behavior Analysis of Routing Protocol Using NS-2
A mobile ad hoc network (MANET) is formed with wireless mobile devices (nodes) without the need for existing network infrastructure. Security design in MANET (Mobile advoc network) is complicated because of its features including lack of infrastructure, mobility of nodes; dynamic topology and open wireless medium .Due to this MANET suffer from many security vulnerability. To enhance the securit...
متن کاملAccess Aware Routing Protocol (AARP) Towards Trust Management for Mobile Ad Hoc Networks
In this paper, Access Aware Routing Protocol (AARP) towards Trust Management problem for Mobile Ad hoc Network (MANET) is proposed. In MANET, nodes periodically move over the terrain space with transmission range. In this research work a scheme to handle trust establishment and aggregation issues are proposed. Unlike trust management in previous schemes, trust management in MANET involves neigh...
متن کاملDisTriB: Distributed Trust Management Model Based on Gossip Learning and Bayesian Networks in Collaborative Computing Systems
The interactions among peers in Peer-to-Peer systems as a distributed collaborative system are based on asynchronous and unreliable communications. Trust is an essential and facilitating component in these interactions specially in such uncertain environments. Various attacks are possible due to large-scale nature and openness of these systems that affects the trust. Peers has not enough inform...
متن کاملA Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملA Survey of Trust related Routing Protocols for Mobile Ad Hoc Networks
Collaboration and cooperation is critical and challenging in managing trust in a distributed Mobile Ad Hoc Network (MANET). This is also critical in achieving mission and system aims like reliability, availability, scalability, or reconfigurability. Defining and managing trust in a MANET requires consideration of interactions between composite social, information and communication networks and ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
عنوان ژورنال:
دوره شماره
صفحات -
تاریخ انتشار 2012