Skip to main content
Log in

Assessment of recommendation trust for access control in open networks

  • Published:
Cluster Computing Aims and scope Submit manuscript

Abstract

Access control is an important means of ensuring information security, and trust-based access control has been considered as an effective mechanism for access control in open networks. To make access control mechanisms more effective, the assessment of trust has become a key issue. Among the different components of trust, recommendation trust plays a key role in environments and applications in which there are not enough direct interactions between entities, making direct trust less reliable. In this paper, we propose a method for the assessment of recommendation trust in which we try to solve the problem of weight assignment to decision attributes by using relevant theories in expert investigation, fuzzy analysis and gray correlation analysis. We also perform some experiment to show that the results of the proposed assessment method are in line with the actual ones to demonstrate the effectiveness of the proposed method as well as its advantages over some other comparable methods.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Fig. 1

Similar content being viewed by others

References

  1. Han, H., Jung, H., Yeom, H.Y.: Aspect-oriented development of cluster computing software. Clust. Comput. 14(4), 357–375 (2011)

    Article  Google Scholar 

  2. Jia, X., Zhang, Y., Du, D.: Guest editorial on cluster computing in the internet. Clust. Comput. 7(1), 5 (2004)

    Article  Google Scholar 

  3. Kim, M., Sang, O.P.: Trust management on user behavioral patterns for a mobile cloud computing. Clust. Comput. 16(4), 725–731 (2013)

    Article  Google Scholar 

  4. Phoomvuthissarn, S.: Trust and role based access control for secure interoperation. In: Proceedings of the International Symposium on Communications and Information Technologies, Sydney, Australia, October, pp. 1458–1463 (2007)

  5. Anakath, A.S., Rajakumar, S., Ambika, S.: Privacy preserving multi factor authentication using trust management. Clust. Comput. 9, 1–7 (2017)

    Google Scholar 

  6. Li, R., Tang, Z., Lu, Z., Hu, J.: Request-driven role mapping framework for secure interoperation in multi-domain environment. Int. J. Comput. Syst. Sci. Eng. 23(3), 193–206 (2008)

    Google Scholar 

  7. Sarrouh, N.: Formal modeling of trust-based access control in dynamic coalitions. In: IEEE 37th Annual Computer Software and Applications Conference (COMPSAC), Kyoto, Japan, pp. 224–229 (2013)

  8. Zhang, Y.X., He, J.S., Zhao, B., Huang, Z.Q., Liu, R.H.: Towards more pro-active access control in computer systems and networks. Comput. Secur. 49, 132–146 (2015)

    Article  Google Scholar 

  9. Zhao, B., He, J.S., Huang, N., Zhang, Y.X., Liu, R.H.: Dynamic global trust evaluation based on balance weight. J. Beijing Univ. Posts Telecommun. 38(2), 113–117 (2015)

    Google Scholar 

  10. Ma, S.N., He, J.S., Shuai, X.B.: An access control method based on scenario trust. Int. J. Comput. Intell. Syst. 5(5), 942–952 (2012)

    Article  Google Scholar 

  11. Daniel, T., Nicola, Z., Sandro, E.: A distributed goal evaluation algorithm for trust management. Theory Pract. Log. Program. 14, 293–337 (2014)

    Article  MathSciNet  Google Scholar 

  12. Smari, W.W., Clemente, P., Lalande, J.F.: An extended attribute based access control model with trust and privacy: application to a collaborative crisis management system. Future generation computer systems. Int. J. Grid Comput. Sci. 31(2), 147–168 (2014)

    Google Scholar 

  13. Li, M., Sun, X.X., Wang, H.: Multi-level delegations with trust management in access control systems. J. Intell. Inf. Syst. 39(3), 611–626 (2012)

    Article  Google Scholar 

Download references

Acknowledgements

The work in this paper has been supported by National Natural Science Foundation of China (61501008), National High-Tech R&D Program (863 Program) (2015AA017204), Beijing Natural Science Foundation (4162007) and Shandong Natural Science Foundation (ZR2013FQ024).

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Zhi Wang.

Rights and permissions

Reprints and permissions

About this article

Check for updates. Verify currency and authenticity via CrossMark

Cite this article

Zhao, B., Xiao, C., Zhang, Y. et al. Assessment of recommendation trust for access control in open networks. Cluster Comput 22 (Suppl 1), 565–571 (2019). https://doi.org/10.1007/s10586-017-1338-x

Download citation

  • Received:

  • Revised:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s10586-017-1338-x

Keywords

Navigation