An Interactive Trust Model for Application Market of the Internet of Things

被引:51
作者
Kang, Kai [1 ,2 ]
Pang, Zhibo [3 ]
Xu, Li Da [4 ,5 ,6 ,7 ]
Ma, Liya [1 ,2 ]
Wang, Cong [1 ,2 ]
机构
[1] Beijing Univ Posts & Telecommun, Sch Software Engn, Beijing 100876, Peoples R China
[2] Key Lab Trustworthy Distributed Comp & Serv BUPT, Beijing 100876, Peoples R China
[3] ABB AB, Corp Res, S-72178 Vasteras, Sweden
[4] Chinese Acad Sci, Inst Comp Technol, Beijing, Peoples R China
[5] Shanghai Jiao Tong Univ, Shanghai 200030, Peoples R China
[6] Univ Sci & Technol China, Hefei 230026, Peoples R China
[7] Old Dominion Univ, Norfolk, VA 23529 USA
基金
美国国家科学基金会; 中国国家自然科学基金;
关键词
Evaluation vector; feedback vector; interactive trust model (ITM); Internet of Things (IoT); IoT application market (IAM); ENTERPRISE SYSTEMS; COMPLIANCE CHECKING; ARCHITECTURE; FRAMEWORK; SERVICES; DESIGN;
D O I
10.1109/TII.2014.2306799
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
The Internet of Things (IoT) application market (IAM) is supposed to be an effective approach for service distribution in the era of IoT. To protect the privacy and security of users, a systematic mechanism to determine the trustworthiness of the applications in the IAM is demanded. In this paper, an interactive trust model (ITM) is proposed based on interaction between application market and end users. In this model, application trustworthiness (AT) is quantitatively evaluated by the similarity between the application's behavior and the behavior expected by the user. In particular, by using the evaluation vector and feedback vector feature of application in the marketplace and behavior of applications on end devices can be exchanged in mathematical form to establish the connection between market and users. Behavior-based detecting agent on a users' device gives strong evidence about what applications have done to your privacy and security issues. Indicators derived by this model are presented in the market along with the application, and it helps users to more efficiently select the most appropriate application from the market.
引用
收藏
页码:1516 / 1526
页数:11
相关论文
共 51 条
  • [1] [Anonymous], SECURITY
  • [2] [Anonymous], 2014, Communications of the ACM, DOI DOI 10.1145/2494522
  • [3] The Internet of Things: A survey
    Atzori, Luigi
    Iera, Antonio
    Morabito, Giacomo
    [J]. COMPUTER NETWORKS, 2010, 54 (15) : 2787 - 2805
  • [4] Internet of Things for Enterprise Systems of Modern Manufacturing
    Bi, Zhuming
    Xu, Li Da
    Wang, Chengen
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2014, 10 (02) : 1537 - 1546
  • [5] Android: Changing the Mobile Landscape
    Butler, Margaret
    [J]. IEEE PERVASIVE COMPUTING, 2011, 10 (01) : 4 - 7
  • [6] Review of Security Issues in Industrial Networks
    Cheminod, Manuel
    Durante, Luca
    Valenzano, Adriano
    [J]. IEEE TRANSACTIONS ON INDUSTRIAL INFORMATICS, 2013, 9 (01) : 277 - 293
  • [7] Data configurations in railway signalling engineering - an application of enterprise systems techniques
    Chen, Xiangxian
    Guan, Aiai
    Qiu, Xinxi
    Huang, Hai
    Liu, Jiquan
    Duan, Huilong
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2013, 7 (03) : 354 - 374
  • [8] Enterprise systems in financial sector - an application in precious metal trading forecasting
    Chen, Xiaozhu
    Fang, Yiwei
    [J]. ENTERPRISE INFORMATION SYSTEMS, 2013, 7 (04) : 558 - 568
  • [9] Chin E., 2012, Proceedings of the Eighth Symposium on Usable Privacy and Security, P1, DOI [10.1145/2335356.2335358., DOI 10.1145/2335356.2335358, 10.1145/2335356.2335358]
  • [10] Usefulness Is Not Trustworthiness
    Cox, Landon P.
    [J]. IEEE INTERNET COMPUTING, 2011, 15 (03) : 79 - 80