Privacy protection in trust management

被引:0
|
作者
Peng, Zhi-Yu [1 ]
Li, Shan-Ping [1 ]
机构
[1] Zhejiang Univ, Coll Comp Sci, Hangzhou 310027, Peoples R China
关键词
privacy-preserving; credential chain discovery; trust management; pervasive computing;
D O I
10.1109/ICMLC.2008.4620616
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As pervasive computing leading to an increased collection of information in the computational world as well as the real world, privacy leaking becomes a serious issue. Although privacy protection has drawn great attention in recent years, the privacy-preserving trust management has not been brought forward. Credential chain discovery problem is the key issue in trust management, and traditionally credentials are full open in the whole system. This could expose users' access control policies as well as other private information, and leads to a great risk of being cheated by malicious users. This paper advocates a privacy-preserving credential chain discovery mechanism, in which credentials are no longer available to everyone. By merely learning credentials of one's logic neighbors, this mechanism still achieves good results. The simulations show that this mechanism is practical.
引用
收藏
页码:1358 / 1362
页数:5
相关论文
共 50 条
  • [1] Trust Evaluation Model Based on Privacy Protection
    Si, Ruo-qian
    Zhang, Lin
    [J]. 2015 International Conference on Network and Information Systems for Computers (ICNISC), 2015, : 595 - 600
  • [2] Privacy Protection in Trust Models for Agent Societies
    Carbo, Javier
    Pedraza, Juanita
    Lopez, Mar
    Manuel Molina, Jose
    [J]. INTERNATIONAL JOINT CONFERENCE SOCO'14-CISIS'14-ICEUTE'14, 2014, 299 : 135 - 144
  • [3] Dynamic trust establishment with privacy protection for web services
    Wu, ZP
    Weaver, AC
    [J]. 2005 IEEE INTERNATIONAL CONFERENCE ON WEB SERVICES, VOLS 1 AND 2, PROCEEDINGS, 2005, : 811 - 812
  • [4] Privacy, reputation, and trust: Some implications for data protection
    Sartor, Giovanni
    [J]. TRUST MANAGEMENT, PROCEEDINGS, 2006, 3986 : 354 - 366
  • [5] A Distributed Trust Evaluation Protocol with Privacy Protection for Intercloud
    Dou, Yi
    Chan, Henry C. B.
    Au, Man Ho
    [J]. IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2019, 30 (06) : 1208 - 1221
  • [6] Secure knowledge management: Confidentiality, trust, and privacy
    Bertino, Elisa
    Khan, Latifur R.
    Sandhu, Ravi
    Thuraisingham, Bhavani
    [J]. IEEE TRANSACTIONS ON SYSTEMS MAN AND CYBERNETICS PART A-SYSTEMS AND HUMANS, 2006, 36 (03): : 429 - 438
  • [7] Trust Management In Privacy - Preserving Information System
    Peng, Kun
    Bao, Feng
    [J]. PROCEEDINGS OF 2010 3RD IEEE INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE AND INFORMATION TECHNOLOGY (ICCSIT 2010), VOL 7, 2010, : 1 - 4
  • [8] Management of Patient Information and Privacy Protection
    Aygin, Dilek
    Gul, Aysel
    [J]. TURKISH JOURNAL OF BUSINESS ETHICS, 2020, 13 (01): : 92 - 99
  • [9] Toward Trust-based Privacy Protection in Consumer Communication
    Xu, Fei
    He, Jingsha
    Xu, Jing
    Zhang, Yuqiang
    [J]. INTERNATIONAL JOURNAL OF SECURITY AND ITS APPLICATIONS, 2013, 7 (03): : 85 - 98
  • [10] Platform rules as privacy tools: The influence of screenshot accountability and trust on privacy management
    Shore, Alexis
    Prena, Kelsey
    [J]. NEW MEDIA & SOCIETY, 2023,