Skip to main content

A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments

  • Conference paper

Part of the book series: Lecture Notes in Computer Science ((LNPSE,volume 5060))

Abstract

Traditionally, to handle security for stand-alone computers and small networks, user authentication and access control mechanisms would be almost enough. However, considering distributed networks such as the Internet and pervasive environments, these kinds of approaches are confronted with flexibility challenges and scalability problems. This is mainly because open environments lack a central control, and users in them are not predetermined. In such ubiquitous computing environments, issues concerning security and trust become crucial. Adding trust to the existing security infrastructures would enhance the security of these environments. Although many trust models are proposed to deal with trust issues in pervasive environments, none of them considers the semantic relations exist among pervasive elements and especially among trust categories. Employing Semantic Web concepts, we propose a computational trust model based on the ontology structure, considering the mentioned semantic relations. In this model, each entity can calculate its trust in other entities and use the calculated trust values to make decisions about granting or rejecting collaborations. Using ontology structure can make the model extendible to encompass other pervasive features such as context awareness in a simple way.

This research is partially supported by Iran Telecommunication Research Center (ITRC).

This is a preview of subscription content, log in via an institution.

Buying options

Chapter
USD   29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD   84.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD   109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Learn about institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Swrl: A semantic web rule language combining owl and ruleml, http://www.w3.org/Submission/SWRL

  2. Ubisec project, pervasive trust management model (ptm), http://www.it.uc3m.es/~florina/ptm

  3. Abdul-Rahman, A., Hailes, S.: A distributed trust model. In: New Security Paradigms Workshop, pp. 48–60. ACM Press, New York (1998)

    Google Scholar 

  4. Almenarez, F., Marin, A., Campo, C., Garcia, C.: Ptm: A pervasive trust management model for dynamic open environments. In: First Workshop on Pervasive Security, Privacy and Trust PSPT (2004)

    Google Scholar 

  5. Almenarez, F., Marin, A., Diaz, D., Sanchez, J.: Developing a model for trust management in pervasive devices. In: Fourth Annual IEEE International Conference on Pervasive Computing and Communications Workshop (PERCOMW 2006) (2006)

    Google Scholar 

  6. Blaze, M., Feigenbaum, J., Keromyts, A.D.: The role of trust management in distributed systems security. In: Secure Internet Programming, pp. 185–210 (1999)

    Google Scholar 

  7. English, C., Nixon, P., Terzis, S., McGettrick, A., Lowe, H.: Dynamic trust models for ubiquitous computing environments. In: Ubicomp Security Workshop (2002)

    Google Scholar 

  8. Golbeck, G.A.: Computing and Applying Trust in Web-Based Social Networks. PhD thesis, University of Maryland (2005)

    Google Scholar 

  9. Golbeck, G.A., James, H.: Inferring binary trust relationships in web-based social networks. ACM Transactions on Internet Technology 6(4), 497–529 (2005)

    Article  Google Scholar 

  10. Griffiths, N., Chao, K.M., Younas, M.: Fuzzy trust for peer-to-peer systems. In: P2P Data and Knowledge Sharing Workshop (P2P/DAKS 2006), at the 26th International Conference on Distributed Computing Systems (ICDCS 2006), Lisbon, Portugal, pp. 73–73. IEEE Computer Society Press, Los Alamitos (2006)

    Chapter  Google Scholar 

  11. Josang, A.: The consensus operator for combining beliefs. Artificial Intelligence Journal 142(1-2), 157–170 (2002)

    Article  MathSciNet  Google Scholar 

  12. Josang, A., Hayward, R., Pope, S.: Trust network analysis with subjective logic. In: Australasian Computer Science Conference (ACSC 2006), Hobart, Australia, pp. 85–94 (2006)

    Google Scholar 

  13. Kagal, L., Finin, T., Joshi, A.: Trust-based security in pervasive computing environments. IEEE Computer 34(12), 154–157 (2001)

    Google Scholar 

  14. Kagal, L., Finin, T., Joshi, A.: Moving from security to distributed trust in ubiquitous computing environments. IEEE Computer (2001)

    Google Scholar 

  15. Satyanarayanan, M.: Pervasive computing: Vision and challenges. IEEE Personal Communications 8(4), 10–17 (2001)

    Article  Google Scholar 

  16. Wang, Y., Vassileva, J.: Trust and reputation model in peer-to-peer networks. In: 3rd International Conference on Peer-to-Peer Computing (P2P 2003), pp. 150–157. IEEE Computer Society, Los Alamitos (2003)

    Chapter  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Chunming Rong Martin Gilje Jaatun Frode Eika Sandnes Laurence T. Yang Jianhua Ma

Rights and permissions

Reprints and permissions

Copyright information

© 2008 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Taherian, M., Jalili, R., Amini, M. (2008). A Semantic-Aware Ontology-Based Trust Model for Pervasive Computing Environments. In: Rong, C., Jaatun, M.G., Sandnes, F.E., Yang, L.T., Ma, J. (eds) Autonomic and Trusted Computing. ATC 2008. Lecture Notes in Computer Science, vol 5060. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-540-69295-9_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-540-69295-9_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-540-69294-2

  • Online ISBN: 978-3-540-69295-9

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics