Reputation Systems for Trust Management in the Web PKI

نویسندگان

  • Jiska Classen
  • Johannes Buchmann
  • Johannes Braun
چکیده

This thesis’ goal is to reduce the attack surface of the existing Web Public Key Infrastructure (PKI) by applying user trust as in real world scenarios of human trust establishment. Reputation systems can be used to exchange Certification Authority (CA) trust information and lower the risk on relying on malicious CAs. The matter in question is connection trust, determining whether a SSL/TLS connection between a client and a server is secure because all involved certificates were issued by trustworthy CAs. A secure connection prevents attackers from reading and manipulating data during a transmission over this connection. Connection trust is no assurance for the trustworthiness of a server, for example the server could run an online shop selling poor quality products. In this thesis, it is discussed how existing reputation system approaches fit into the current Web PKI scenario or how they have to be adapted. The reputation system has to be secure against attacks, since it is an attack vector for connection trust as CAs themselves. Therefore an analysis framework fitting CA reputation system attacks is proposed in this thesis. Within the evaluation, all presented reputation system approaches are compared and evaluated by the attack analysis framework. Both, centralized and distributed CA reputation systems, are discussed. More details about the centralized solution called CA-TMS can be found in ”CA Trust Management for the Web PKI”[4], of which portions of this thesis consist and which contribution was part of this thesis work.

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

ثبت نام

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A collusion mitigation scheme for reputation systems

Reputation management systems are in wide-spread use to regulate collaborations in cooperative systems. Collusion is one of the most destructive malicious behaviors in which colluders seek to affect a reputation management system in an unfair manner. Many reputation systems are vulnerable to collusion, and some model-specific mitigation methods are proposed to combat collusion. Detection of col...

متن کامل

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

AHP Techniques for Trust Evaluation in Semantic Web

The increasing reliance on information gathered from the web and other internet technologies raise the issue of trust. Through the development of semantic Web, One major difficulty is that, by its very nature, the semantic web is a large, uncensored system to which anyone may contribute. This raises the question of how much credence to give each resource. Each user knows the trustworthiness of ...

متن کامل

Trust and Reputation Policy-Based Mechanisms for Self-protection in Autonomic Communications

Currently, there is an increasing tendency to migrate the management of communications and information systems onto the Web. This is making many traditional service support models obsolete. In addition, current security mechanisms are not sufficiently robust to protect each management system and/or subsystem from web-based intrusions, malware, and hacking attacks. This paper presents research c...

متن کامل

Combining Trust and Reputation Management for Web-Based Services

Services offered and provided through the Web have varying quality, and it is often difficult to assess the quality of a services before accessing and using it. Trust and reputation systems can be used in order to assist users in predicting and selecting the best quality services. This paper describes how Bayesian reputation systems can be combined with trust modeling based on subjective logic ...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

عنوان ژورنال:

دوره   شماره 

صفحات  -

تاریخ انتشار 2014