Skip to main content

Trust Assessment for the Security of Information Systems

  • Chapter
  • First Online:
Advances in Knowledge Discovery and Management

Part of the book series: Studies in Computational Intelligence ((SCI,volume 834))

  • 251 Accesses

Abstract

Recent development of   various sensors and communicating devices has significantly enhanced information systems (IS). However, the security of these objects as well as the confidence in  the information they produce cannot be guaranteed. They can be deceived or under the control of a malicious third party. This raises new issues concerning trust one can have in data, sensors, and the IS itself. This research studies security of information systems considering trust assessment. This paper first introduces the concept of trust one can have in the sources of information and then defines a mathematical trust-measure. A thought on global trust measurement and propagation of trust is presented in the Discussion section, but it is not dealt with in this paper. Simulations conducted in the framework of ship navigation system illustrate the relevance of this approach.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Subscribe and save

Springer+ Basic
$34.99 /Month
  • Get 10 units per month
  • Download Article/Chapter or eBook
  • 1 Unit = 1 Article or 1 Chapter
  • Cancel anytime
Subscribe now

Buy Now

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Similar content being viewed by others

Notes

  1. 1.

    Search And Rescue.

  2. 2.

    Closest Point of Approach, collision alert warning of an obstacle on the route pursued by the vessel.

  3. 3.

    Automatic Identification System, a system standardized by the International Maritime Organization for the real-time broadcasting of VHF navigation information.

References

  • Abdul-Rahman, A., & Hailes, S. (2000). Supporting trust in virtual communities. In Proceedings of the 33rd Annual Hawaii International Conference on System Sciences (pp. 9–19). IEEE.

    Google Scholar 

  • ANSSI. (2015). Cybersecurity for industrial control systems. Technical report, Agence Nationale pour la Sécurité des Systmes d’information.

    Google Scholar 

  • Balduzzi, M., Pasta, A., & Wilhoit, K. (2014). A security evaluation of automated identification system. In Proceedings of the 30th Annual Computer Security Applications Conference (pp. 436–445). ACM.

    Google Scholar 

  • Bhatti, J., & Humphreys, T. (2017). Hostile control of ships via false GPS signals: Demonstration and detection. Navigation, 64(1), 51–66.

    Article  Google Scholar 

  • Blomqvist, K. (1997). The many faces of trust. Scandinavian Journal of Management, 13(3), 271–286.

    Article  Google Scholar 

  • Capra, L., & Musolesi, M. (2006). Autonomic trust prediction for pervasive systems. In 20th International Conference on Advanced Information Networking and Applications (Vol. 2, pp. 48–59). IEEE.

    Google Scholar 

  • Costé, B., Ray, C., & Coatrieux, G. (2016). Évaluation de la confiance dans un environnement multisources. In Informatique des Organisations et Systémes d’Information et de Décision (INFORSID), Atelier Sécurité des systémes d’information: technologies et personnes.

    Google Scholar 

  • Da Costa Pereira, C., TeTettamanzi, A. B., & Villata, S. (2011). Changing one’s mind: Erase or rewind? Possibilistic belief revision with fuzzy argumentation based on trust. In Proceedings of the Twenty-Second International Joint Conference on Artificial Intelligence (Vol. 1, pp. 164–171).

    Google Scholar 

  • Das, A., & Islam, M. M. (2012). Securedtrust: A dynamic trust computation model for secured communication in multiagent systems. IEEE Transactions on Dependable and Secure Computing, 9(2), 261–274.

    Article  Google Scholar 

  • De Cock, M., & Da Silva, P. P. (2006). A many valued representation and propagation of trust and distrust. In Fuzzy Logic and Applications (pp. 114–120). Springer.

    Google Scholar 

  • De Courcy, R. (1992). Les systèmes d’information en réadaptation. Québec, Réseau International CIDIH et facteurs environnementaux, 1(5), 7–10.

    Google Scholar 

  • Demolombe, R. (2001). To trust information sources: a proposal for a modal logical framework. In Trust and Deception in Virtual Societies (pp. 111–124). Springer.

    Google Scholar 

  • Demolombe, R. (2004). Reasoning about trust: A formal logical framework. In Trust Management, pages 291–303. Springer.

    Google Scholar 

  • Deutsch, M. (1958). Trust and suspicion. Journal of Conflict Resolution, 265–279.

    Article  Google Scholar 

  • Dung, P. M. (1993). On the acceptability of arguments and its fundamental role in nonmonotonic reasoning and logic programming. International Joint Conferences on Artificial Intelligence (pp. 852–857).

    Google Scholar 

  • Esfandiari, B., & Chandrasekharan, S. (2001). On how agents make friends: Mechanisms for trust acquisition. In 4th Workshop on Deception, Fraud and Trust in Societies (Vol. 222).

    Google Scholar 

  • Forrester, J. W. (1994). System dynamics, systems thinking, and soft or. System Dynamics Review, 10(2–3), 245–256.

    Article  Google Scholar 

  • Grandison, T., & Sloman, M. (2000). A survey of trust in internet applications. IEEE Communications Surveys & Tutorials, 3(4), 2–16.

    Article  Google Scholar 

  • Josang, A., Hayward, R., & Pope, S. (2006). Trust network analysis with subjective logic. In Proceedings of the 29th Australasian Computer Science Conference (Vol. 48, pp. 85–94). Australian Computer Society, Inc.

    Google Scholar 

  • Josang, A., Ivanovska, M., & Muller, T. (2015). Trust revision for conflicting sources. In Proceedings of the 18th International Conference on Information Fusion (FUSION 2015) (pp. 550–557).

    Google Scholar 

  • Jousselme, A.-L., Boury-Brisset, A.-C., Debaque, B., & Prévost, D. (2014). Characterization of hard and soft sources of information: A practical illustration. In 17th International Conference on Information Fusion (pp. 1–8). IEEE.

    Google Scholar 

  • Lewis, J. D., & Weigert, A. (1985). Trust as a social reality. Social Forces, 63(4), 967–985.

    Article  Google Scholar 

  • Liu, W., & Williams, M.-A. (2002). Trustworthiness of information sources and information pedigree. In Intelligent Agents VIII (pp. 290–306). Springer.

    Google Scholar 

  • Lorini, E., & Demolombe, R. (2008). From binary trust to graded trust in information sources: A logical perspective. LNAI, 5396, 205–225.

    Google Scholar 

  • Luhmann, N. (1979). Trust and Power. U.M.I.

    Google Scholar 

  • Marsh, S. P. (1994). Formalising trust as a computational concept. Ph.D. thesis, Department of Computer Science and Mathematics, University of Stirling.

    Google Scholar 

  • Matt, P.-A., Morge, M., & Toni, F. (2010). Combining statistics and arguments to compute trust. In Proceedings of 9th International Conference on Autonomous Agents and Multiagent Systems (pp. 209–216).

    Google Scholar 

  • McKnight, D. H., & Chervany, N. L. (2000). What is trust? A conceptual analysis and an interdisciplinary model. In Americas Conference on Information Systems (pp. 827–833).

    Google Scholar 

  • Paglieri, F., Castelfranchi, C., da Costa Pereira, C., Falcone, R., Tettamanzi, A., & Villata, S. (2014). Trusting the messenger because of the message: Feedback dynamics from information quality to source evaluation. Computational and Mathematical Organization Theory, 20(2), 176–194.

    Google Scholar 

  • Papoulis, A., & Pillai, S. U. (1986). Probability, Random Variables, and Stochastic Processes. New York: McGraw Hill.

    Google Scholar 

  • Parsons, S., Tang, Y., Sklar, E., McBurney, P., & Cai, K. (2011). Argumentation-based reasoning in agents with varying degrees of trust.

    Google Scholar 

  • Ray, C., Gallen, R., Iphar, C., Napoli, A., & Bouju, A. (2015). DeAIS project: Detection of AIS spoofing and resulting risks. In OCEANS 2015-Genova (pp. 1–6).

    Google Scholar 

  • Stranders, R., de Weerdt, M., & Witteveen, C. (2008). Fuzzy argumentation for trust. In Computational Logic in Multi-Agent Systems (pp. 214–230). Springer.

    Google Scholar 

  • Sun, Y. L., Han, Z., Yu, W., & Liu, K. R. (2006). A trust evaluation framework in distributed networks: Vulnerability analysis and defense against attacks. In INFOCOM (pp. 1–13).

    Google Scholar 

  • Teacy, W. T. L., Patel, J., Jennings, N. R., & Luck, M. (2006). TRAVOS: Trust and reputation in the context of inaccurate information sources. Autonomous Agents and Multi-Agent Systems, 12(2), 183–198.

    Article  Google Scholar 

  • Villata, S., Boella, G., Gabbay, D. M., & van der Torre, L. (2013). A socio-cognitive model of trust using argumentation theory. International Journal of Approximate Reasoning, 54(4), 541–559.

    Article  MathSciNet  Google Scholar 

  • Wang, Y., & Singh, M. P. (2006). Trust representation and aggregation in a distributed agent system. AAAI, 6, 1425–1430.

    Google Scholar 

  • Wang, Y., & Singh, M. P. (2007). Formal trust model for multiagent systems. In International Joint Conference on Artificial Intelligence (pp. 1551–1556).

    Google Scholar 

  • Yan, Z., Zhang, P., & Virtanen, T. (2003). Trust evaluation based security solution in ad hoc networks. In Proceedings of the Seventh Nordic Workshop on Secure IT Systems (Vol. 14).

    Google Scholar 

  • Yu, B., & Singh, M. P. (2002). An evidential model of distributed reputation management. In Proceedings of the First International Joint Conference on Autonomous Agents and Multiagent Systems: Part 1 (pp. 294–301). ACM.

    Google Scholar 

Download references

Acknowledgements

This research is co-financed by the Chair of Naval Cyber Defense and the Brittany region. The authors thank them for their support.

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Benjamin Costé .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2019 Springer Nature Switzerland AG

About this chapter

Check for updates. Verify currency and authenticity via CrossMark

Cite this chapter

Costé, B., Ray, C., Coatrieux, G. (2019). Trust Assessment for the Security of Information Systems. In: Pinaud, B., Guillet, F., Gandon, F., Largeron, C. (eds) Advances in Knowledge Discovery and Management. Studies in Computational Intelligence, vol 834. Springer, Cham. https://doi.org/10.1007/978-3-030-18129-1_8

Download citation

Publish with us

Policies and ethics