Skip to main content
Log in

A computational trust model for access control in P2P

  • Research Papers
  • Published:
Science China Information Sciences Aims and scope Submit manuscript

Abstract

Trust brings a new method for building scalable and fine-grained access control mechanism in P2P systems. The quantificational expression of trust and the calculation of trust in a trust network are the basis of trust degree based access control. In this paper, the properties of trust is analyzed by referring to the fruits from social science; the semantics of trust in the context of access control is described, and a trust degree based access control model named TDBAC is introduced. Basing on the properties and semantics of trust, a computational trust model which includes a multilevel comprehensive evaluation method for expressing direct trust and calculators for computing recommended trust is put forward. To compute trust in a trust network, an algorithm that transforms a trust network to a computable expression is given. The algorithm simplifies the computation process and is also flexible.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Fast A, Jensen D, Neil L B. Creating social networks to improve peer-to-peer networking. In: KDD’05: Proceeding of the Eleventh ACM SIGKDD International Conference on Knowledge Discovery in Data Mining, New York, 2005. 568–573

  2. Krishnan R, Sandhu R, Niu J, et al. Formal models for group-centric secure information sharing. Technical Report CS-TR-2009-002. Department of Computer Science, The University of Texas, San Antonio, 2009

    Google Scholar 

  3. Li J, Dabek F. F2F: reliable storage in open networks. In: 5th International Workshop on Peer-to-Peer Systems (IPTPS’ 06), Santa Barbara, CA, USA, 2006

  4. Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: IEEE Conference on Security and Privacy, Oakland, CA, 1996. 5

  5. Bizer C, Cyganiak R, Gauss T, et al. The TriQL.P browser: Filtering information using context-, content- and rating-based trust policies. In: Proceedings of the Semantic Web and Policy Workshop at the 4th International Semantic Web Conference, Galway, Ireland, 2005

  6. Atrf Y. Building trust in e-commerce. IEEE Internet Comput, 2002, 6: 18–24

    Google Scholar 

  7. Bertino E, Khan L R, Sandhu R, et al. Secure knowledge management: confidentiality, trust, and privacy. IEEE Trans Syst Man Cybern A, 2006, 36: 429–438

    Article  Google Scholar 

  8. Mudhakar S, Xiong L, Liu L. Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In: Proceedings of the 14th International Conference on World Wide Web, New York, 2005. 422–431

  9. Zhou R, Hwang F K. Powertrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Trans Parall Distr Syst, 2007. 18: 460–473

    Article  Google Scholar 

  10. Blaze M, Feigenbaum J, Keromytis A D. KeyNote: Trust management for public-key infrastructures. Lecture Notes Comput Sci, 1999, 1550: 59–63

    Article  Google Scholar 

  11. Chu Y H, Feigenbaum J, LaMacchia B, et al. REFEREE: Trust management for Web applications. World Wide Web 1997, 2: 127–139

    Google Scholar 

  12. Li N, Benjamin N G, Feigenbaum J. Delegation logic: a logic-based approach to distributed authorization. ACM Trans Inf Syst Secur, 2003, 6: 128–171

    Article  Google Scholar 

  13. Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Proceedings of the European Symposium on Research in Security (ESORJCS). Brighton: Springer-Verlag, 1994. 3–18

    Google Scholar 

  14. Jøsang A. The right type of trust for distributed systems. In: Proceedings of the 1996 New Security Paradigms Workshop. New York: ACM Press, 1996

    Google Scholar 

  15. Jøsang A, Hayward R, Pope S. Trust network analysis with subjective logic. In: Proceedings of the Australasian Computer Science Conference (ACSC’06), Hobart, 2006. 1

  16. Ray I, Ray I, Chakraborty S. An interoperable context sensitive model of trust. J Intell Inf Sys, 2009, 32: 75–104

    Article  Google Scholar 

  17. Abdul-Rahman A, Hailes S. A distributed trust model. In: Proceedings of the 1997 New Security Paradigms Workshop, New York: ACM, 1997

    Google Scholar 

  18. Abdul-Rahman A. A framework for decentralised trust reasoning. PhD thesis, University of London, 2004. 12

  19. Tang W, Hu J B, Chen Z. Research on a fuzzy logic-based subjective trust management model. J Comput Res Dev, 2005, 42: 1654–1659

    Article  Google Scholar 

  20. Richardson M, Agrawal R, Domingos P. Trust management for the semantic web. In: International Semantic Web Conference, Sanibel Island, Florida, USA, 2003. 351–368

  21. Agudo I, Fernandez-Gago C, Lopez J. A model for trust metrics analysis. TrustBus 2008, LNCS 5185. Berlin: Springer-Verlag, 2008. 28–37

    Google Scholar 

  22. Huang J, Nicol D. A calculus of trust and its applications to PKI and identity management. In: 8th Symposium on Identity and Trust on the Internet, Gaithersburg, Maryland, USA, 2009. 23–37

  23. Gambetta D, ed. Trust: making and breaking cooperative relations. Basil Blackwell, 1988

  24. Hardin R. The street-level epistemology of trust. Polit Society, 1993, 21: 505–529

    Article  Google Scholar 

  25. Christianson B, Harbison W. Why isn’t trust transitive? In: Proceedings of the Security Protocols Workshop. Cambridge, UK, 1996. 171–176

  26. ISO 7498-2, OSI security architecture, Feb. 1989

  27. Lampson B W. Protection. In: Proc 5th Princeton Conf on Information Sciences and Systems, Princeton, 1971. 437–443

  28. Harrison M A, Ruaao W L. Protection in operating systems. Commun ACM, 1976, 19: 461–471

    Article  MATH  Google Scholar 

  29. Zadeh L A. Fuzzy Sets. Inf Control, 1965, 8: 338–353

    Article  MATH  MathSciNet  Google Scholar 

  30. Guo Y J. Theory, Method and Application of Comprehensive evaluation. Beijing: Science Press, 2007

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Bo Lang.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Lang, B. A computational trust model for access control in P2P. Sci. China Inf. Sci. 53, 896–910 (2010). https://doi.org/10.1007/s11432-010-0108-7

Download citation

  • Received:

  • Accepted:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11432-010-0108-7

Keywords

Navigation