Documenti di Didattica
Documenti di Professioni
Documenti di Cultura
By: Tesfaye Z.
email: tesfuzewduab@gmail.com
Bahirdar/Ethiopia
Executive Summery
• A tradeoff exists in these systems: the more sources of
data and the higher fidelity in those sources which can
improve people’s decision, the more privacy reduction.
• there is generally no a priori trust relationship
• we first show how trust evaluation process of the user’s
system can be based on previous interactions and peer
recommendations.
• A solution then relied on trust to control privacy disclosure
is proposed that depends on pre-defined privacy policy.
Background
• Defined as 'present everywhere’
• is also described as Pervasive Computing;
• appear everywhere and anywhere in contrast to that of
desktop computing
• Ubiquitous Computing devices are tiny, invisible
microprocessors embedded in any type of objects like
clothes,home,cars,watches etc.,
• How it differ from traditional computing?
Limited BW and Geographical positions will changes
Introductions
Manage information quickly, efficiently
Removes complexity of new technologies.
Convenient access
Smart home:
Consider the following
•
Methodology
• Traditional authentication and access control are effective
only where the system knows
which users are going to access and
what their access rights are.
Drawback: not flexible
Solutions: decision to should rely on some kind of
trust developed with past interactions.
• There are two different stages in our solution:
• i) we estimate the trust value for each request coming
from an entity;
• ii) we exploit the trust based privacy policy to make
decision how much private data should release to the
guest.
Approach
• Trust?
• A trust B=>B does something which A expects
• A not trust B=> the result is not what A expects
• With Privacy, it involves the handling and protection of
sensitive personal information.
• TP,Q ( trust of P on Q)=>TP,Q∈ [0,100]
• P completely trusts Q if TP,Q = 100 and completely
distrusts Q if TP,Q = 0.
Trust Evaluation
• system P to evaluate the trust value of any principal Q is
as follows:[servers receive a request Q which wishes to
get user’s personal current activity]
• 1. examine the query: request comes from a common
source or not
• 2. If it is from a familiar starting point, the servers will
transfer the query to the trust calculation module.
• 3.
Time-Based Past Interaction History
• past interaction history is usually recorded in log files
• successful and unsuccessful interactions between Q andP
established on the past behaviors
• unsuccessful interaction [UIt] => principal did not get the
outcome as it expected.
• Successful interaction [SIt] => expected outcome.
• The trust value of Q as calculated by a system P
TPQ = 70
TPQ = 76
Peer Recommendation
• required when the system has no or not enough
information about a principal.
• If there exists certain peer having more interactions with
this principal, his suggestion should be likely logical
and important for assessing the trust value.
•