Understanding the trust of software-intensive distributed systems

被引:2
作者
Gallege, Lahiru S. [1 ]
Gamage, Dimuthu U. [1 ]
Hill, James H. [1 ]
Raje, Rajeev R. [1 ]
机构
[1] Indiana Univ Purdue Univ, Dept Comp & Informat Sci, Indianapolis, IN 46202 USA
基金
美国国家科学基金会;
关键词
trust; survey; distributed systems; software services; models; trustworthiness of systems; SERVICE SELECTION; MODEL;
D O I
10.1002/cpe.3656
中图分类号
TP31 [计算机软件];
学科分类号
081202 ; 0835 ;
摘要
An early understanding of the trust concerns while composing a distributed system from independently developed software services saves time and effort. It also allows the developer of such distributed systems to reason about the trust-related properties of these systems. Although there are prevalent approaches for evaluating the trust of such systems, it is not clear which approach, if any, is the most comprehensive and best suited for a given situation. Moreover, there is no agreement about a unified approach, for quantifying trust, which can be applied to the entire software life-cycle of distributed systems. This article, first, motivates the need for such a quantification of trust via a case study from the domain of indoor tracking. It then provides a comprehensive survey of current approaches that define trust, in general domains, and then focuses on the relevant approaches from the domain of software-oriented distributed systems. These prevalent efforts are categorized into groups using existing clustering tools and then are further analyzed for their comprehensiveness. The analysis depicts: (1) many trust-related efforts and associated models have their own constrained views of trust; (2) different trust models focus on different aspects of trust and life-cycle details; and (3) it is difficult to interoperate across different trust models. Hence, the paper identifies a set of principles that can assist in quantifying and evaluating the trust throughout the software life-cycle of distributed systems. These principles, then, are applied to the aforementioned case study to provide an outline of how trustworthy distributed systems can be composed from independent software services. Copyright (c) 2015 John Wiley & Sons, Ltd.
引用
收藏
页码:114 / 143
页数:30
相关论文
共 103 条
[1]   Trustworthiness among Peer Processes in Distributed Agreement Protocol [J].
Aikebaier, Ailixier ;
Enokido, Tomoya ;
Takizawa, Makoto .
2010 24TH IEEE INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS (AINA), 2010, :565-572
[2]  
Alagar V, 2007, P 2007 C SPEC VER CO, P89
[3]  
[Anonymous], 1988, TRUST MAKING BREAKIN
[4]   A survey of trust in computer science and the Semantic Web [J].
Artz, Donovan ;
Gil, Yolanda .
JOURNAL OF WEB SEMANTICS, 2007, 5 (02) :58-71
[5]  
Benzel T. V., 2005, DESIGN PRINCIPLES SE
[6]  
Blaze M., 1999, Secure Internet programming. Security issues for mobile and distributed objects, P185
[7]   Composition trust bindings in pervasive computing service composition [J].
Buford, J ;
Kumar, R ;
Perkins, G .
FOURTH ANNUAL IEEE INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND COMMUNICATIONS WORKSHOPS, PROCEEDINGS, 2006, :261-+
[8]  
Calloni B, 2010, TRUSTED SOFTWARE DEV
[9]  
CarrotInc, 2002, CARR CLUST ENG
[10]   Principles of trust for MAS: Cognitive anatomy, social importance, and quantification [J].
Castelfranchi, C ;
Falcone, R .
INTERNATIONAL CONFERENCE ON MULTI-AGENT SYSTEMS, PROCEEDINGS, 1998, :72-79