Abstract
Access control is an important means of ensuring information security, and trust-based access control has been considered as an effective mechanism for access control in open networks. To make access control mechanisms more effective, the assessment of trust has become a key issue. Among the different components of trust, recommendation trust plays a key role in environments and applications in which there are not enough direct interactions between entities, making direct trust less reliable. In this paper, we propose a method for the assessment of recommendation trust in which we try to solve the problem of weight assignment to decision attributes by using relevant theories in expert investigation, fuzzy analysis and gray correlation analysis. We also perform some experiment to show that the results of the proposed assessment method are in line with the actual ones to demonstrate the effectiveness of the proposed method as well as its advantages over some other comparable methods.
Similar content being viewed by others
References
Han, H., Jung, H., Yeom, H.Y.: Aspect-oriented development of cluster computing software. Clust. Comput. 14(4), 357–375 (2011)
Jia, X., Zhang, Y., Du, D.: Guest editorial on cluster computing in the internet. Clust. Comput. 7(1), 5 (2004)
Kim, M., Sang, O.P.: Trust management on user behavioral patterns for a mobile cloud computing. Clust. Comput. 16(4), 725–731 (2013)
Phoomvuthissarn, S.: Trust and role based access control for secure interoperation. In: Proceedings of the International Symposium on Communications and Information Technologies, Sydney, Australia, October, pp. 1458–1463 (2007)
Anakath, A.S., Rajakumar, S., Ambika, S.: Privacy preserving multi factor authentication using trust management. Clust. Comput. 9, 1–7 (2017)
Li, R., Tang, Z., Lu, Z., Hu, J.: Request-driven role mapping framework for secure interoperation in multi-domain environment. Int. J. Comput. Syst. Sci. Eng. 23(3), 193–206 (2008)
Sarrouh, N.: Formal modeling of trust-based access control in dynamic coalitions. In: IEEE 37th Annual Computer Software and Applications Conference (COMPSAC), Kyoto, Japan, pp. 224–229 (2013)
Zhang, Y.X., He, J.S., Zhao, B., Huang, Z.Q., Liu, R.H.: Towards more pro-active access control in computer systems and networks. Comput. Secur. 49, 132–146 (2015)
Zhao, B., He, J.S., Huang, N., Zhang, Y.X., Liu, R.H.: Dynamic global trust evaluation based on balance weight. J. Beijing Univ. Posts Telecommun. 38(2), 113–117 (2015)
Ma, S.N., He, J.S., Shuai, X.B.: An access control method based on scenario trust. Int. J. Comput. Intell. Syst. 5(5), 942–952 (2012)
Daniel, T., Nicola, Z., Sandro, E.: A distributed goal evaluation algorithm for trust management. Theory Pract. Log. Program. 14, 293–337 (2014)
Smari, W.W., Clemente, P., Lalande, J.F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future generation computer systems. Int. J. Grid Comput. Sci. 31(2), 147–168 (2014)
Li, M., Sun, X.X., Wang, H.: Multi-level delegations with trust management in access control systems. J. Intell. Inf. Syst. 39(3), 611–626 (2012)
Acknowledgements
The work in this paper has been supported by National Natural Science Foundation of China (61501008), National High-Tech R&D Program (863 Program) (2015AA017204), Beijing Natural Science Foundation (4162007) and Shandong Natural Science Foundation (ZR2013FQ024).
Author information
Authors and Affiliations
Corresponding author
Rights and permissions
About this article
Cite this article
Zhao, B., Xiao, C., Zhang, Y. et al. Assessment of recommendation trust for access control in open networks. Cluster Comput 22 (Suppl 1), 565–571 (2019). https://doi.org/10.1007/s10586-017-1338-x
Received:
Revised:
Accepted:
Published:
Issue Date:
DOI: https://doi.org/10.1007/s10586-017-1338-x