A testbed for evaluating computational trust models

2012 ◽  
Author(s):  
Partheeban Chandrasekaran
Author(s):  
Pekka Ruotsalainen ◽  
Bernd Blobel

Digital health information systems (DHIS) are increasingly members of ecosystems, collecting, using and sharing a huge amount of personal health information (PHI), frequently without control and authorization through the data subject. From the data subject’s perspective, there is frequently no guarantee and therefore no trust that PHI is processed ethically in Digital Health Ecosystems. This results in new ethical, privacy and trust challenges to be solved. The authors’ objective is to find a combination of ethical principles, privacy and trust models, together enabling design, implementation of DHIS acting ethically, being trustworthy, and supporting the user’s privacy needs. Research published in journals, conference proceedings, and standards documents is analyzed from the viewpoint of ethics, privacy and trust. In that context, systems theory and systems engineering approaches together with heuristic analysis are deployed. The ethical model proposed is a combination of consequentialism, professional medical ethics and utilitarianism. Privacy enforcement can be facilitated by defining it as health information specific contextual intellectual property right, where a service user can express their own privacy needs using computer-understandable policies. Thereby, privacy as a dynamic, indeterminate concept, and computational trust, deploys linguistic values and fuzzy mathematics. The proposed solution, combining ethical principles, privacy as intellectual property and computational trust models, shows a new way to achieve ethically acceptable, trustworthy and privacy-enabling DHIS and Digital Health Ecosystems.


Author(s):  
Vaishali Ravindra Thakare ◽  
John Singh K

The interest in cloud computing and its techniques are gaining exponentially in IT industries because of its cost-effective architecture and services. However, these flexible services of cloud bring many security and privacy challenges due to loss of control over the data. This paper focuses on an analysis of various computational trust models in cloud security environment. The computational trust models that are used to build secure cloud architectures are not available in a blended fashion to overcome security and privacy challenges. The paper aims to contribute to the literature review to assist researchers who are striving to contribute in this area. The main objective of this review is to identify and analyse the recently published research topics related to trust models and trust mechanisms for cloud with regard to research activity and proposed approaches. The future work is to design a trust mechanism for cloud security models to achieve the higher level of security.


Author(s):  
Xin Liu ◽  
Anwitaman Datta ◽  
Karl Aberer

2014 ◽  
Vol 17 (05) ◽  
pp. 1450020 ◽  
Author(s):  
MEHRDAD ASHTIANI ◽  
MOHAMMAD ABDOLLAHI AZGOMI

Trust models play an important role in computational environments. One of the main aims of the work undertaken in this domain is to provide a model that can better describe the socio-technical nature of computational trust. It has been recently shown that quantum-like formulations in the field of human decision making can better explain the underlying nature of these types of processes. Based on this research, the aim of this paper is to propose a novel model of trust based on quantum probabilities as the underlying mathematics of quantum theory. It will be shown that by using this new mathematical framework, we will have a powerful mechanism to model the contextuality property of trust. Also, it is hypothesized that many events or evaluations in the context of trust can be and should be considered as incompatible, which is unique to the noncommutative structure of quantum probabilities. The main contribution of this paper will be that, by using the quantum Bayesian inference mechanism for belief updating in the framework of quantum theory, we propose a biased trust inference mechanism. This mechanism allows us to model the negative and positive biases that a trustor may subjectively feel toward a certain trustee candidate. It is shown that by using this bias, we can model and describe the exploration versus exploitation problem in the context of trust decision making, recency effects for recently good or bad transactions, filtering pessimistic and optimistic recommendations that may result in good-mouthing or bad-mouthing attacks, the attitude of the trustor toward risk and uncertainty in different situations and the pseudo-transitivity property of trust. Finally, we have conducted several experimental evaluations in order to demonstrate the effectiveness of the proposed model in different scenarios.


2010 ◽  
Vol 22 (9) ◽  
pp. 1286-1298 ◽  
Author(s):  
Jianshu Weng ◽  
Zhiqi Shen ◽  
Chunyan Miao ◽  
Angela Goh ◽  
Cyril Leung

Sign in / Sign up

Export Citation Format

Share Document