p-Trust: A New Model of Trust to Allow Finer Control Over Privacy in Peer-to-Peer Framework

被引:5
作者
Chakraborty, Sudip [1 ]
Ray, Indrajit [1 ]
机构
[1] Colorado State Univ, Comp Sci Dept, Ft Collins, CO 80523 USA
基金
美国国家科学基金会;
关键词
Security; trust; privacy; peer-to-peer network;
D O I
10.4304/jcp.2.2.13-24
中图分类号
TP39 [计算机的应用];
学科分类号
081203 ; 0835 ;
摘要
Every time a user conducts an electronic transaction over the Internet a wealth of personal information is revealed, either voluntarily or involuntarily. This causes serious breach of privacy for the user, in particular, if the personally identifying information is misused by the other users present in the network. Ideally, therefore, the user would like to have a considerable degree of control over what personal information to reveal and to whom. Researchers have proposed models to allow a user to determine what personal information to reveal while doing a transaction over the Internet. However, these models do not help the user in determining who to trust, how much to trust and why to trust them with the personal information. The models fail to address loss of privacy through the misuse of information. In this paper we propose a privacy enhancing trust model to measure the degree of confidence that a user can have in the context of preservation of her privacy during a transaction. The model considers several factor while computing trust which include a user's own experience and knowledge about the target user and feedback obtained from groups of peer users called 'trusted neighbors' and 'friends'. The proposed scheme provides a flexible and powerful approach for the secure handling of private data and offers a user considerable control over how she wishes to disseminate her personal data.
引用
收藏
页码:13 / 24
页数:12
相关论文
共 32 条
  • [1] Abdul-Rahman A., 2000, P 33 ANN HAW INT C S
  • [2] Aberer K., 2001, P 10 INT C INF KNOWL
  • [3] [Anonymous], 1999, CCIMB99031 INT STAND
  • [4] [Anonymous], 1999, CCIMB99033 INT STAND
  • [5] [Anonymous], 1999, CCIMB99032 INT STAND
  • [6] Berthold O., 2000, Proceedings of the Tenth Conference on Computers, Freedom and Privacy. CFP2000: Challenging the Assumptions, P57, DOI 10.1145/332186.332211
  • [7] Bertino E., 2004, Privacy Enhancing Technologies. 4th International Workshop, PET 2004. Revised Selected Papers (Lecture Notes in Computer Science Vol. 3424, P283
  • [8] Trust-X:: A peer-to-peer framework for trust establishment
    Bertino, E
    Ferrari, E
    Squicciarini, AC
    [J]. IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, 2004, 16 (07) : 827 - 842
  • [9] Beth T., 1994, Computer Security - ESORICS 94. Third European Symposium on Research in Computer Security. Proceedings, P3
  • [10] BONATTI P, 2000, 7 ACM C COMP COMM SE, P134