Top Banner
A Survey of Trust A Survey of Trust Management Systems Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU
32

A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Dec 30, 2015

Download

Documents

Lesley Bell
Welcome message from author
This document is posted to help you gain knowledge. Please leave a comment to let me know what you think about it! Share it to your friends and learn new things together.
Transcript
Page 1: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

A Survey of Trust A Survey of Trust Management SystemsManagement Systems

Speaker: Dalal Al-ArayedPhD-IT StudentSupervised by: João Pedro Sousa, PhDAssistant Professor, CS, GMU

Page 2: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

OutlineOutlineWhat is Trust?What is Trust Management?Types of ModelsMain Problem Domains Trust Management ApproachesGenealogy of Models CoveredDescription of ModelsConclusion

◦ Evolution of Trust Management Models

Page 3: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

What is Trust?What is Trust?

Sociologist Diego Gambetta:◦Trust is a particular level of the subjective prob. with which an agent will perform a particular action, before [we] can monitor such action and in a context in which it affects [our] own action.

Page 4: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

What is Trust? Cont.What is Trust? Cont.

Trust is context-dependent, dynamic & non-monotonic.

Types of Trust◦Interpersonal (agent & context specific)◦Structural (system within which trust exists)

◦Dispositional (independent of agent & context)

Page 5: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

What is Trust Management ?What is Trust Management ?

“Trust Management” was first coined by Blaze et. al 1996◦a coherent framework for the study of security policies, security credentials and trust relationships.

◦Two of the first TM systems PolicyMaker and KeyNote.

Page 6: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Two Types of ModelsTwo Types of Models

Trust Management models ◦Certificate-based ◦Reputation-based (behavior observed directly or indirectly) Recommendations: trust information

shared among peers

Page 7: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Main Problem Domains Main Problem Domains

Service Provision◦ Blaze et.al (1996, 1998)- PolicyMaker & Keynote◦ Abdul-Rahman & Hailes (2000)◦ Aberer & Despotovic (2001)◦ Capra (2004)- hTRUST◦ McNamara et al.(2006)◦ Quercia & Hailes (2006)-MATE

Routing◦ Buchegger et al. (2002)-CONFIDANT◦ Cahill et al. (2003)-SECURE◦ Quercia et al. (2006)-STRUDEL

Page 8: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Trust Management Trust Management ApproachesApproaches

Individual Initiative (Anarchist)◦each agent is responsible for his own fate.

Global Trust◦each peer in the system has a unique global

trust value that other peers can access.Federated Trust

◦management of trust-related activities across multiple and heterogeneous security domains and autonomous systems.

◦deals with strategies for managing inter-domain behaviors

Page 9: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Genealogy of ModelsGenealogy of Models

Anarchist Trust

Global Trust Federated Trust

AT&T Labs-Policy Maker (1996)KeyNote(1998)

Abdul-Rahman & Hailes (2000)

Aberer & Despotovic (2001)

EigenTrust (2003)

CONFIDANT (2002)

SECURE (2003)

UCL- hTRUST (2004)McNamara et al. (2006)

STRUDEL (2006)MATE (2006)

Donato et al. (2007)

Chun & Bavier(2004)

Bhargav et al.(2007)

Page 10: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Genealogy of ModelsGenealogy of Models•Term: “Trust Management” •PKI environments•Certificate-based Trust Model•Binds keys to actions

AT&T Labs-Policy Maker (1996)KeyNote(1998)

Abdul-Rahman & Hailes (2000)

Aberer & Despotovic (2001)

EigenTrust (2003)

CONFIDANT (2002)

SECURE (2003)

UCL- hTRUST (2004)McNamara et al. (2006)

STRUDEL (2006)MATE (2006)

Donato et al. (2007)

Chun & Bavier(2004)

Bhargav et al.(2007)

Page 11: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

PolicyMaker & Keynote (1996, PolicyMaker & Keynote (1996, 1998)1998)

Appears like a db query engine to the application.

do not directly enforce policy; they only provide advice to the applications that call it.

yes/no or additional requirements for request to be acceptable

PolicyMakerApplicationINPUT

Local policies, authenticated credentials, action string

OUTPUT

Page 12: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Genealogy of ModelsGenealogy of Models•Reputation-based Trust Model•Agents Autonomously reason about Trust• Each Agent- Db of recorded experience.•Recommendations exchanged

AT&T Labs-Policy Maker (1996)KeyNote(1998)

Abdul-Rahman & Hailes (2000)

Aberer & Despotovic (2001)

EigenTrust (2003)

CONFIDANT (2002)

SECURE (2003)

UCL- hTRUST (2004)McNamara et al. (2006)

STRUDEL (2006)MATE (2006)

Donato et al. (2007)

Chun & Bavier(2004)

Bhargav et al.(2007)

Page 13: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Genealogy of ModelsGenealogy of Models•Reputation-based Trust Model•Stored & shared data is exclusively negative(complaints)•Distributed Storage

AT&T Labs-Policy Maker (1996)KeyNote(1998)

Abdul-Rahman & Hailes (2000)

Aberer & Despotovic (2001)

EigenTrust (2003)

CONFIDANT (2002)

SECURE (2003)

UCL- hTRUST (2004)McNamara et al. (2006)

STRUDEL (2006)MATE (2006)

Donato et al. (2007)

Chun & Bavier(2004)

Bhargav et al.(2007)

Page 14: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Genealogy of ModelsGenealogy of ModelsAT&T Labs-Policy Maker (1996)KeyNote(1998)

Abdul-Rahman & Hailes (2000)

Aberer & Despotovic (2001)

EigenTrust (2003)

CONFIDANT (2002)

SECURE (2003)

UCL- hTRUST (2004)McNamara et al. (2006)

STRUDEL (2006)MATE (2006)

Donato et al. (2007)

Chun & Bavier(2004)

Bhargav et al.(2007)

•Detection & isolation of misbehaved nodes•Neighborhood watch•shared data is exclusively negative (warnings)•Local storage of trust values

Page 15: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

CONFIDANT (2002) -EPFLCONFIDANT (2002) -EPFL

Page 16: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Genealogy of ModelsGenealogy of ModelsAT&T Labs-Policy Maker (1996)KeyNote(1998)

Abdul-Rahman & Hailes (2000)

Aberer & Despotovic (2001)

EigenTrust (2003)

CONFIDANT (2002)

SECURE (2003)

UCL- hTRUST (2004)McNamara et al. (2006)

STRUDEL (2006)MATE (2006)

Donato et al. (2007)

Chun & Bavier(2004)

Bhargav et al.(2007)

•Incorporates trust model & risk model•Distinguishes between unknown and distrusted entities•Enables delegation of trust evaluation•Local storage of trust values

Page 17: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

SECURE Project(2003)-EUSECURE Project(2003)-EU

Page 18: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Genealogy of ModelsGenealogy of ModelsAT&T Labs-Policy Maker (1996)KeyNote(1998)

Abdul-Rahman & Hailes (2000)

Aberer & Despotovic (2001)

EigenTrust (2003)

CONFIDANT (2002)

SECURE (2003)

UCL- hTRUST (2004)McNamara et al. (2006)

STRUDEL (2006)MATE (2006)

Donato et al. (2007)

Chun & Bavier(2004)

Bhargav et al.(2007)

•Distributed trust models (Anarchist)•Local storage of trust values

Page 19: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

hTRUST (2004)-UCLhTRUST (2004)-UCL

Trust Model that facilitates trust formation, dissemination and evolution.

Human Trust- customizing functions capture user’s trust disposition.

Detect & isolate malicious recommenders

Page 20: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

hTrust(2004)-Locally Stored hTrust(2004)-Locally Stored DataData

Agent Trust Knowledge

timeStamp

Recommender

Trust Knowledge

timeStamp

Recommended

Recommender

Trust

t( )SK recommender

Portfolio of Credentials

Tacit Tuples

Aggregate Trust Tuple

Page 21: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

hTRUST (2004)hTRUST (2004)

Page 22: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

McNamara et al. (2006)- McNamara et al. (2006)- UCLUCL

Trustworthiness – enables predictions about actual QoS given promised QoS

Mobility introduced as parameter for decision making◦service requester and provider co-

located for sufficient time to complete service delivery

◦Mobility pattern: based on past journeys.

Page 23: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

McNamara et al. (2006)- McNamara et al. (2006)- UCLUCL

Agent makes request for service

Co-located agents respond◦ Promised QoS◦ Mobility Pattern

Selection to maximize Requestor’s Utility

Page 24: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

STRUDEL (2006)- UCLSTRUDEL (2006)- UCL

Coalition Peering DomainTragedy of the commonsSTRUDEL: distributed framework

◦Approach for detecting malicious nodes based on the 2-ACK scheme

◦Trust Model◦Forwarding mechanism (decision model).

Page 25: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

STRUDEL(2006)- 2 ACK STRUDEL(2006)- 2 ACK SchemeScheme

If X does not receive ack from Y, Y is marked as unresponsive.

If X does not receive ack from Z, Y is marked as suspicious ◦Y did not send the packet to Z ◦or Y relied on an untrustworthy peer Z.

X Y Z

Page 26: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

MATE (2006)- UCLMATE (2006)- UCLAttempts integrated mgt

of trust & risk for decision making

Expected utility theory incorporates trust info of sources, risk attitude of user, & context (location type)

Risk restricted to timeliness of delivery.

Page 27: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

MATE (2006)- LimitationsMATE (2006)- Limitationsrisks scenario if component suppliers do not provide software within the agreed time ranges.

Do not examine the potential risks from the way a software component actually operates.

This situation might arise if the software component is signed with the author's key, thus guaranteeing the software integrity, and author is highly trusts.

Page 28: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Evolution of Trust ModelsEvolution of Trust ModelsTarget Environ.

Idea

AT&T labs(1996, 1998)

PKI A lot like Access Control

Abdul-Rahman & Hailes (2000)

Virtual comm.

Intro to Reputation-based Trust Models

& agents autonomy

Aberer & Despotovic (2001)

P2P Attempts distributed Storage of Trust info.

CONFIDANT (2002)

Mobile Ad-hoc

Attempts incorporation of Detection & isolation of misbehavior

SECURE (2003)

Ubiquitous roaming entities

Attempts Incorporation of risk model with Trust

Page 29: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Evolution of Trust Models- Evolution of Trust Models- Cont.Cont.

Target Environ.

Idea

hTrust(2004) Mobile ad-hoc

Trust Management & dispositional trust.

Detection & isolation of malicious recommenders.

The HOW question is answered.

McNamara et al. (2006)

Mobile ad-hoc

Mobility introduced as a factor

STRUDEL (2006)

CPD Combat Tragedy of the commons (Selfishness of Nodes)

MATE (2006)

Mobile ad-hoc

Attempts integrated management of trust and risk (an element of dispositional trust).

Page 30: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

Questions?Questions?

Page 31: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

ReferencesReferences Abdul-Rahman, A. and Hailes, S. “Supporting Trust in Virtual Communities”. In

Proceedings of the 33rd Hawaii International Conference on System Sciences, 2000.

Aberer, K. and Despotovic, Z. “Managing Trust in a Peer-2-Peer Information System”. In Proceedings of the 10th ACM International Conference on Information and Knowledge Management, Atlanta, USA, November 2001.

Bhargav-Spantzel, A., Squicciarini, A. and Bertino, E. “Trust Negotiation in Identity Management”. In IEEE Security and Privacy, volume 5, issue 2, pages 55—63, March 2007.

Blaze, M., Feigenbaum, J. and Lacy, J. “Decentralized Trust Management”. In Proceedings of IEEE Symposium on Security and Privacy, pages 164--173, Oakland, CA, May 1996.

Blaze, M., Feigenbaum, J. and Keromytis, A. “KeyNote: Trust Management for Public-Key Infrastructures”. In Proceedings of the 6th International Workshop on Security Protocols, volume 1550 of Lecture Notes in Computer Science, pages 59--63, Cambridge, UK, April 1998. Springer-Verlag.

Blaze, M., Feigenbaum, J., Ioannidis, J. and Keromytis, A. “The KeyNote Trust Management System, Version 2. RFC-2704”. IETF, September 1999.

Blaze, M., Feigenbaum, J., Ioannidis, J. and Keromytis, A. “The Role of Trust Management in Distributed Systems Security”. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pages 185--210, 1999.

Buchegger, S. and Le Boudec, J. “Performance Analysis of the CONFIDANT Protocol: Cooperation of Nodes — Fairness in Dynamic Ad-hoc Networks”. In Proceedings of IEEE/ACM Symposium on Mobile Ad Hoc Networking and Computing (MobiHOC), Lausanne, CH, June 2002.

Page 32: A Survey of Trust Management Systems Speaker: Dalal Al-Arayed PhD-IT Student Supervised by: João Pedro Sousa, PhD Assistant Professor, CS, GMU.

References- Cont.References- Cont. Cahill, V., Gray, E., Seigneur, J., Jensen, C., Chen, Y., Shand, B., Dimmock, N.,

Twigg, A., Bacon, J., English, C., Wagealla, W., Terzis, S., Nixon,P., Serugendo, G., Bryce,C., Carbone, M., Krukow, K.and Nielsen, M. “Using Trust for Secure Collaboration in Uncertain Environments”. In IEEE Pervasive Computing Mobile and Ubiquitous Computing, volume 2, issue 3, pages 52-61, July-Sept. 2003.

Capra, L. “Engineering human trust in mobile system collaborations”. In Proceedings of the 12th International Symposium on Foundations of Software Engineering, pages 107-116, Newport Beach, CA, USA, November 2004. ACM Press.

Chun, B. and Bavier, A. “Decentralized Trust Management and Accountability in Federated Systems”. In Proceedings of the 37 th Hawaii International Conference of System Sciences, Jan 2004.

Donato,D., Paniccia, M., Selis, M., Castillo, C., Cortese, G. and Leonardi, S. “New metrics for reputation Management in P2P networks”. In Proceedings of the 3 rd International Workshop on Adversarial Information retrieval on the web, May 2007. ACM.

Kamvar, S., Schlosser, M., Garcia-Molina, H. “The Eigentrust Algorithm for Reputation Management in P2P Networks.” In Proceedings of the 12th International Conference on WWW, New York, USA, ACM Press, pages 640--651, 2003.

Mcnamara, L., Mascolo, C. and Capra, L. "Trust and Mobility aware Service Provision for Pervasive Computing". In Int. Workshop on Requirements and Solutions for Pervasive Software Infrastructures (co-located with Pervasive 2006), Dublin, Ireland, May 2006.

Quercia, D., Lad, M., Hailes, S., Capra, L. and Bhatti, S. “STRUDEL: Supporting Trust in the Dynamic Establishment of peering coaLitions”. In Proceedings of the 21st ACM Symposium on Applied Computing, Dijon, France, April 2006.

Quercia, D. and Hailes, S. “MATE: Mobility and Adaptation with Trust and Expected-utility”. International Journal Internet Technology and Secured Transactions (IJITST), volume 1, 2007.