Skip to main content

Trust Management Support for Context-Aware Service Platforms

  • Chapter
  • First Online:
User-Centric Networking

Part of the book series: Lecture Notes in Social Networks ((LNSN))

Abstract

High quality context information retrieved from trustworthy context providers allows a more reliable context-aware service adaption but also implies a higher risk for the service users in case of privacy violations. In this chapter we present a trust management model that support users and providers of context-aware services in managing the trade-off between privacy protection and context-based service adaptation. We applied our trust management model in two trust-based selection mechanisms. The first trust-based selection mechanism support users of context-aware services in selecting trustworthy service providers to interact with. This mechanism supports the users in the selection process, taking into account the users’ goals, trust beliefs, and the trust dependencies between the service users and the entities that collaborate in the context-aware service provisioning. The second trust-based selection mechanism supports context-aware service providers in selecting trustworthy context providers taking into account the trustworthiness of the context providers to provide context information about a specific user and quality level. To conclude this chapter we present the evaluation of the technical feasibility of our trust management model in trust-based selection mechanisms through a prototype implementation.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 54.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    One privacy preference might state that the identity should be completely anonymized.

  2. 2.

    We address this circular trust dependency in our trust management model described in Sect. 2.

  3. 3.

    We refer to Opinion from now on as meaning a Subjective Logic Opinion.

References

  1. Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: HICSS’00: Proceedings of the 33rd Hawaii international conference on system sciences, vol 6. IEEE Computer Society, Washington, USA, p 6007

    Google Scholar 

  2. Almenárez F, Marín A, Campo C, García CR (2004) A pervasive trust management model for dynamic open environments. In: First workshop on pervasive security and trust in mobiQuitous 2004, Boston, USA

    Google Scholar 

  3. Berendt B, Günther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101–106

    Article  Google Scholar 

  4. Daskapan S, Ali Eldin A, Wagenaar R (2005) Trust in mobile context aware systems. In: International business information management conference (5th IBIMA), Dec 2005, Cairo, Egypt

    Google Scholar 

  5. Dockhorn Costa P (2007) Architectural support for context-aware applications: from context models to services platforms. PhD thesis, University of Twente, December 2007

    Google Scholar 

  6. Grandison T, Sloman M (2000) A survey of trust in internet application. http://citeseer.ist.psu.edu/grandison00survey.html

  7. Huebscher MC, McCann JA (2005) A learning model for trustworthiness of context-awareness services. In: PERCOMW’05: Proceedings of the third IEEE international conference on pervasive computing and communications workshops. IEEE Computer Society, Washington, USA, pp 120–124

    Google Scholar 

  8. Huebscher C, Mccann A (2005) An adaptive middleware framework for context-aware applications. Personal Ubiquitous Computing 10(1):12–20

    Google Scholar 

  9. Hulsebosch RJ, Salden AH, Bargh MS, Ebben PWG, Reitsma J (2005) Context sensitive access control. In: SACMAT’05: Proceedings of the tenth ACM symposium on access control models and technologies. ACM, New York, USA, pp 111–119

    Google Scholar 

  10. Jøsang A (1996) The right type of trust for distributed systems. In: NSPW’96: Proceedings of the 1996 workshop on new security paradigms, pp 119–131

    Google Scholar 

  11. Jøsang A (2001) A logic for uncertain probabilities. Int J Uncertainty Fuzziness Knowl Based Syst 9(3):279–311

    Google Scholar 

  12. Jøsang A (2010) Evidential reasoning with subjective logic. In: 13th international conference on information fusion 2010

    Google Scholar 

  13. Jøsang A (2010) Subjective logic book (draft). http://persons.unik.no/josang/papers/subjective_logic.pdf

  14. Jøsang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In: ACSC’06: Proceedings of the 29th Australasian computer science conference. Australian Computer Society Inc., Darlinghurst, Australia, pp 85–94

    Google Scholar 

  15. Jøsang A, Keser C, Dimitrakos T (2005) Can we manage trust? In: iTrust 2005, trust management, third international conference. Paris, France, pp 93–107

    Google Scholar 

  16. Kantara Initiative (2013) Identity assurance framework. http://kantarainitiative.org

  17. Lachmund S, Walter T, Gomez L, Bussard L, Olk E (2006) Context-aware access control making access control decisions based on context information. In: 3rd annual international conference on mobile and ubiquitous systems—workshops, July 2006, pp 1–8

    Google Scholar 

  18. Li W, Kilander F, Jansson CG (2006) Toward a person-centric context aware system. In: Workshop on requirements and solutions for pervasive software infrastructures, PERVASIVE, 2006

    Google Scholar 

  19. Mayer RC, Davis JH, Schoorman DF (1995) An integrative model of organizational trust. The Acad Manage Rev 20(3):709–734

    Google Scholar 

  20. Mcknight DH, Chervany NL (1996) The meanings of trust. http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf

  21. Neisse R (2012) Trust and privacy management support for context-aware service platforms. PhD thesis, University of Twente, March 2012

    Google Scholar 

  22. Neisse R, Doerr J (2013) Model-based specification and refinement of usage control policies. In: Eleventh international conference on privacy, security and trust (PST), 2013

    Google Scholar 

  23. Neisse R, Holling D, Pretschner A (2011) Implementing trust in cloud infrastructures. In: Proceedings of the 11th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGRID), 2011

    Google Scholar 

  24. Neisse R, Wegdam M, van Sinderen M (2008) Trustworthiness and quality of context information. In: Proceedings of the 2008 international symposium on trusted computing (TrustCom), Nov 2008

    Google Scholar 

  25. Neisse R, Wegdam M, van Sinderen M, Lenzini G (2007) Trust management model and architecture for context-aware service platforms. In: Proceedings of the 2nd international symposium on information security (IS07), Nov 26–27. Vilamoura, Portugal, pp 1803–1820

    Google Scholar 

  26. Nielsen M, Krukow K (2003) Towards a formal notion of trust. In: PPDP’03: Proceedings of the 5th ACM SIGPLAN international conference on principles and practice of declarative programming. ACM, New York, USA, pp 4–7

    Google Scholar 

  27. Pons AP (2006) Biometric marketing: targeting the online consumer. Commun ACM 49(8):60–66

    Article  Google Scholar 

  28. Pranam K, Li D, Lalana K, Shashidhara G, Anupam J, Tim J (2004) Enhancing P3P framework through policies and trust. Technical report, UMBC

    Google Scholar 

  29. Quinn K, Lewis D, O’Sullivan D, Wade VP (2006) Trust meta-policies for flexible and dynamic policy based trust management. In: POLICY’06: proceedings of the seventh IEEE international workshop on policies for distributed systems and networks (POLICY’06). IEEE Computer Society, Washington, USA, pp 145–148

    Google Scholar 

  30. Toivonen S, Lenzini G, Uusitalo I (2006) Context-aware trust evaluation functions for dynamic reconfigurable systems. In: Proceedings of the WWW’06 workshop on models of trust for the web (MTW’06), Edinburgh, Scotland

    Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Ricardo Neisse .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2014 Springer International Publishing Switzerland

About this chapter

Cite this chapter

Neisse, R., Wegdam, M., van Sinderen, M. (2014). Trust Management Support for Context-Aware Service Platforms. In: Aldini, A., Bogliolo, A. (eds) User-Centric Networking. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-05218-2_4

Download citation

  • DOI: https://doi.org/10.1007/978-3-319-05218-2_4

  • Published:

  • Publisher Name: Springer, Cham

  • Print ISBN: 978-3-319-05217-5

  • Online ISBN: 978-3-319-05218-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics