Abstract
High quality context information retrieved from trustworthy context providers allows a more reliable context-aware service adaption but also implies a higher risk for the service users in case of privacy violations. In this chapter we present a trust management model that support users and providers of context-aware services in managing the trade-off between privacy protection and context-based service adaptation. We applied our trust management model in two trust-based selection mechanisms. The first trust-based selection mechanism support users of context-aware services in selecting trustworthy service providers to interact with. This mechanism supports the users in the selection process, taking into account the users’ goals, trust beliefs, and the trust dependencies between the service users and the entities that collaborate in the context-aware service provisioning. The second trust-based selection mechanism supports context-aware service providers in selecting trustworthy context providers taking into account the trustworthiness of the context providers to provide context information about a specific user and quality level. To conclude this chapter we present the evaluation of the technical feasibility of our trust management model in trust-based selection mechanisms through a prototype implementation.
Access this chapter
Tax calculation will be finalised at checkout
Purchases are for personal use only
Notes
- 1.
One privacy preference might state that the identity should be completely anonymized.
- 2.
We address this circular trust dependency in our trust management model described in Sect. 2.
- 3.
We refer to Opinion from now on as meaning a Subjective Logic Opinion.
References
Abdul-Rahman A, Hailes S (2000) Supporting trust in virtual communities. In: HICSS’00: Proceedings of the 33rd Hawaii international conference on system sciences, vol 6. IEEE Computer Society, Washington, USA, p 6007
Almenárez F, MarĂn A, Campo C, GarcĂa CR (2004) A pervasive trust management model for dynamic open environments. In: First workshop on pervasive security and trust in mobiQuitous 2004, Boston, USA
Berendt B, Günther O, Spiekermann S (2005) Privacy in e-commerce: stated preferences vs. actual behavior. Commun ACM 48(4):101–106
Daskapan S, Ali Eldin A, Wagenaar R (2005) Trust in mobile context aware systems. In: International business information management conference (5th IBIMA), Dec 2005, Cairo, Egypt
Dockhorn Costa P (2007) Architectural support for context-aware applications: from context models to services platforms. PhD thesis, University of Twente, December 2007
Grandison T, Sloman M (2000) A survey of trust in internet application. http://citeseer.ist.psu.edu/grandison00survey.html
Huebscher MC, McCann JA (2005) A learning model for trustworthiness of context-awareness services. In: PERCOMW’05: Proceedings of the third IEEE international conference on pervasive computing and communications workshops. IEEE Computer Society, Washington, USA, pp 120–124
Huebscher C, Mccann A (2005) An adaptive middleware framework for context-aware applications. Personal Ubiquitous Computing 10(1):12–20
Hulsebosch RJ, Salden AH, Bargh MS, Ebben PWG, Reitsma J (2005) Context sensitive access control. In: SACMAT’05: Proceedings of the tenth ACM symposium on access control models and technologies. ACM, New York, USA, pp 111–119
Jøsang A (1996) The right type of trust for distributed systems. In: NSPW’96: Proceedings of the 1996 workshop on new security paradigms, pp 119–131
Jøsang A (2001) A logic for uncertain probabilities. Int J Uncertainty Fuzziness Knowl Based Syst 9(3):279–311
Jøsang A (2010) Evidential reasoning with subjective logic. In: 13th international conference on information fusion 2010
Jøsang A (2010) Subjective logic book (draft). http://persons.unik.no/josang/papers/subjective_logic.pdf
Jøsang A, Hayward R, Pope S (2006) Trust network analysis with subjective logic. In: ACSC’06: Proceedings of the 29th Australasian computer science conference. Australian Computer Society Inc., Darlinghurst, Australia, pp 85–94
Jøsang A, Keser C, Dimitrakos T (2005) Can we manage trust? In: iTrust 2005, trust management, third international conference. Paris, France, pp 93–107
Kantara Initiative (2013) Identity assurance framework. http://kantarainitiative.org
Lachmund S, Walter T, Gomez L, Bussard L, Olk E (2006) Context-aware access control making access control decisions based on context information. In: 3rd annual international conference on mobile and ubiquitous systems—workshops, July 2006, pp 1–8
Li W, Kilander F, Jansson CG (2006) Toward a person-centric context aware system. In: Workshop on requirements and solutions for pervasive software infrastructures, PERVASIVE, 2006
Mayer RC, Davis JH, Schoorman DF (1995) An integrative model of organizational trust. The Acad Manage Rev 20(3):709–734
Mcknight DH, Chervany NL (1996) The meanings of trust. http://misrc.umn.edu/wpaper/WorkingPapers/9604.pdf
Neisse R (2012) Trust and privacy management support for context-aware service platforms. PhD thesis, University of Twente, March 2012
Neisse R, Doerr J (2013) Model-based specification and refinement of usage control policies. In: Eleventh international conference on privacy, security and trust (PST), 2013
Neisse R, Holling D, Pretschner A (2011) Implementing trust in cloud infrastructures. In: Proceedings of the 11th IEEE/ACM international symposium on cluster, cloud and grid computing (CCGRID), 2011
Neisse R, Wegdam M, van Sinderen M (2008) Trustworthiness and quality of context information. In: Proceedings of the 2008 international symposium on trusted computing (TrustCom), Nov 2008
Neisse R, Wegdam M, van Sinderen M, Lenzini G (2007) Trust management model and architecture for context-aware service platforms. In: Proceedings of the 2nd international symposium on information security (IS07), Nov 26–27. Vilamoura, Portugal, pp 1803–1820
Nielsen M, Krukow K (2003) Towards a formal notion of trust. In: PPDP’03: Proceedings of the 5th ACM SIGPLAN international conference on principles and practice of declarative programming. ACM, New York, USA, pp 4–7
Pons AP (2006) Biometric marketing: targeting the online consumer. Commun ACM 49(8):60–66
Pranam K, Li D, Lalana K, Shashidhara G, Anupam J, Tim J (2004) Enhancing P3P framework through policies and trust. Technical report, UMBC
Quinn K, Lewis D, O’Sullivan D, Wade VP (2006) Trust meta-policies for flexible and dynamic policy based trust management. In: POLICY’06: proceedings of the seventh IEEE international workshop on policies for distributed systems and networks (POLICY’06). IEEE Computer Society, Washington, USA, pp 145–148
Toivonen S, Lenzini G, Uusitalo I (2006) Context-aware trust evaluation functions for dynamic reconfigurable systems. In: Proceedings of the WWW’06 workshop on models of trust for the web (MTW’06), Edinburgh, Scotland
Author information
Authors and Affiliations
Corresponding author
Editor information
Editors and Affiliations
Rights and permissions
Copyright information
© 2014 Springer International Publishing Switzerland
About this chapter
Cite this chapter
Neisse, R., Wegdam, M., van Sinderen, M. (2014). Trust Management Support for Context-Aware Service Platforms. In: Aldini, A., Bogliolo, A. (eds) User-Centric Networking. Lecture Notes in Social Networks. Springer, Cham. https://doi.org/10.1007/978-3-319-05218-2_4
Download citation
DOI: https://doi.org/10.1007/978-3-319-05218-2_4
Published:
Publisher Name: Springer, Cham
Print ISBN: 978-3-319-05217-5
Online ISBN: 978-3-319-05218-2
eBook Packages: Computer ScienceComputer Science (R0)