FeelTrust: Providing Trustworthy Communications in Ubiquitous Mobile Environment

The growing intelligence and popularity of smartphones and the advances in Mobile Ubiquitous Computing have resulted in rapid proliferation of data-sharing applications. Instances of these applications include pervasive social networking, games, file sharing and so on. In such scenarios, users are usually involved in selecting the peers with whom communication should take place, continuously facing trust issues. Unfortunately, providing trust support in a pervasive world is challenging due to peer mobility and lack in central control. We propose a novel approach that establishes trust leveraging users' profiles: humans today produce rich strings of unique data twenty-four hours a day. These information enables a task-aware trust model, namely a finer-grained model in which users are classified as trusted or not depending on the intended business activity. However, simply collecting user's interests may be insufficient to provide a reasonable trust management system. In order to enable the system to recognize malicious users, we include a recommendation subsystem based on the Wilson score confidence interval. It has been designed to be lightweight, minimizing battery depletion. It also protects user privacy. To make our approach fully deployable, it supports two modalities: a TPM-based one and a TPM-less one. The former gives more security guarantees and ensures a fully distributed approach. The latter, requires a Trusted Authority to avoid feedbacks to get tampered and is no more fully distributed.

[1]  Audun Jøsang,et al.  Dirichlet Reputation Systems , 2007, The Second International Conference on Availability, Reliability and Security (ARES'07).

[2]  Francesco Palmieri,et al.  Automatic security assessment for next generation wireless mobile networks , 2011, Mob. Inf. Syst..

[3]  Jennifer Golbeck,et al.  Investigating interactions of trust and interest similarity , 2007, Decis. Support Syst..

[4]  Josep Lluís de la Rosa i Esteva,et al.  Opinion-Based Filtering through Trust , 2002, CIA.

[5]  Ulrich Ultes-Nitsche,et al.  Transport Layer Security (TLS) Extensions for the Trusted Platform Module (TPM) , 2010 .

[6]  Tomas Olsson Decentralized Social Filtering based on Trust , 1998, AAAI 1998.

[7]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[8]  E. B. Wilson Probable Inference, the Law of Succession, and Statistical Inference , 1927 .

[9]  Amitava Mukherjee,et al.  Pervasive Computing: A Paradigm for the 21st Century , 2003, Computer.

[10]  Yoshiyori Urano,et al.  User authentication on smart phones using a data mining method , 2010, 2010 International Conference on Information Society.

[11]  Gianni D'Angelo,et al.  A bluetooth infrastructure for automatic services access in ubiquitous and nomadic computing environments , 2007, MobiWac '07.

[12]  Félix Gómez Mármol,et al.  Security threats scenarios in trust and reputation models for distributed systems , 2009, Comput. Secur..

[13]  C. Sierra,et al.  REGRET: A reputation model for gregarious societies , 2001 .

[14]  Francesco Palmieri,et al.  Audit-Based Access Control in Nomadic Wireless Environments , 2006, ICCSA.

[15]  David Wetherall,et al.  Toward trustworthy mobile sensing , 2010, HotMobile '10.

[16]  Peter Szolovits,et al.  Ratings in Distributed Systems: A Bayesian Approach , 2002 .

[17]  Jean-Pierre Seifert,et al.  Building Efficient Integrity Measurement and Attestation for Mobile Phone Platforms , 2009, MobiSec.

[18]  Salam HAJJAR,et al.  Privacy Preserving Reputation Systems , 2009 .

[19]  Julita Vassileva,et al.  Trust and reputation model in peer-to-peer networks , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).

[20]  Marco Voss,et al.  Privacy Preserving Online Reputation Systems , 2004, International Information Security Workshops.

[21]  Paul J. Leach,et al.  Simple Service Discovery Protocol/1.0 , 1999 .

[22]  Audun Jøsang,et al.  AIS Electronic Library (AISeL) , 2017 .

[23]  S Hailes,et al.  Using Recommendations for Managing Trust in Distributed Systems , 1997 .

[24]  Philip Ginzboorg,et al.  Security for Interactions in Pervasive Networks: Applicability of Recommendation Systems , 2004, ESAS.

[25]  Marc Langheinrich,et al.  A Privacy Awareness System for Ubiquitous Computing Environments , 2002, UbiComp.

[26]  Jim Waldo,et al.  The Jini architecture for network-centric computing , 1999, CACM.

[27]  Chrysanthos Dellarocas,et al.  Mechanisms for coping with unfair ratings and discriminatory behavior in online reputation reporting systems , 2000, ICIS.