35 research outputs found

    Honey bee based trust management system for cloud computing

    Get PDF
    Cloud computing has been considered as the new computing paradigm that would offer computer resources over the Internet as service.With the widespread use of cloud, computing would become another utility similar to electricity, water, gas and telephony where the customer would be paying only for the services consumed contrary to the current practice of paying a monthly or annual fixed charge irrespective of use.For cloud computing to become accepted by everybody, several issues need to be resolved.One of the most important issues to be addressed is cloud security.Trust management is one of the important components of cloud security that requires special attention. In this paper, the authors propose the concept that honey bee algorithm which has been developed to solve complex optimization problems can be successfully used to address this issue.The authors have taken a closer look at the optimization problems that had been solved using the honey bee algorithm and the similarity between these problems and the cloud computing environment.Thus concluding that the honey bee algorithm could be successfully used to solve the trust management issue in cloud computing

    A GENERIC TRUST MANAGEMENT FRAMEWORK FOR HETEROGENEOUS SENSORS IN CYBER PHYSICAL SYSTEMS

    Get PDF
    Objective: Wireless Technology†is the magic word in today's era. In which, Cyber Physical Systems (CPS) is the booming world which binds the physical world and cyber world together. The CPS is also called as Safety Critical System because of the human life involvement. In this emerging technology, lots of heterogeneous sensors are involved and each sensor will play an important role. If something goes wrong with sensor or sensor data. It will definitely affect the human life involved in it.Methods: In this paper, we proposed a generic trust management framework for heterogeneous sensors which will detect the sensor data falsification (Data Integrity), faulty sensor reading, and packet dropping nodes (Selfish Nodes) through rules and rating concept.Results: The efficiency of the proposed framework is evaluated with the help of Network Simulator 2 (NS-2.35). The maximum numbers of untrusted nodes are identified in point 0.40 than Multi-Level Trust Framework for Wireless Sensor Network (MTF-WSN) and Framework for Packet-Droppers Mitigation (FPDM). It is also evident that Trust Management Framework for Cyber Physical Systems (TRMF-CPS) identifies maximum number of untrusted nodes in the detection range of 0.35 and 0.45. Therefore, 0.35 and 0.45 are considered as maximum and minimum threshold points for effective untrusted nodes. Conclusion:The experimentation results and comparative study shows that, our trust management framework will easily detected sensors which misbehave.Â

    Use of prediction based meter reputation factors in power systems

    Get PDF
    Reputation systems provide a protocol for participants to interact based on their past performance. The concept of a prediction based meter reputation factor is introduced as a number between 0.1 and 1 that is assigned to every meter and that varies based on the accuracy of a meter's predictions. A system architecture is presented that allows the instantiation of rules for economic interaction between metered participants in a power system using reputation factors. This will create a system in which individuals are incentivised to provide accurate predictions, giving planners more reliable information. It also provides a basis for the allocation of rewards for flexibility and penalties for inflexibility. Two algorithms to allocate meter reputation factors are presented and assessed using a defined performance index and metering information from the OpenLV project. It is demonstrated that the performance of the meter reputation algorithms can be moderated according to system requirements. It is concluded that instantiation of the algorithms in such a way that makes persecution of individuals impossible is crucial

    A fuzzy approach to trust based access control in internet of things

    Get PDF

    Robust multi-dimensional trust computing mechanism for cloud computing

    Get PDF
    Cloud computing has become the most promising way of purchasing computing resources over the Internet.The main advantage of .cloud computing is its economic advantages over the traditional computing resource provisioning.For cloud computing to become acceptable to wider audience, it is necessary to maintain the quality of service (QoS) commitments specified in the service level agreement.In this paper, the authors propose a robust multi-level trust computing mechanism that can be used to track the performance of cloud systems using multiple QoS attributes.In addition, tests carried out show that the proposed mechanism is more robust than the ones published in the literature

    FSDA: Framework for Secure Data Aggregation in Wireless Sensor Network for Enhancing Key Management

    Get PDF
    An effective key management plays a crucial role in imposing a resilient security technique in Wireless Sensor Network (WSN). After reviewing the existing approaches of key management, it is confirmed that existing approachs does not offer good coverage on all potential security breaches in WSN. With WSN being essential part of Internet-of-Things (IoT), the existing approaches of key management can definitely not address such security breaches. Therefore, this paper introduces a Framework for Secure Data Aggregation (FSDA) that hybridizes the public key encryption mechanism in order to obtain a novel key management system. The proposed system does not target any specific attacks but is widely applicable for both internal and external attacks in WSN owing to its design principle. The study outcome exhibits that proposed FSDA offers highly reduced computational burden, minimal delay, less energy consumption, and higher data transmission perforance in contrast to frequency used encryption schemes in WSN

    Building Ethics into Artificial Intelligence

    Full text link
    As artificial intelligence (AI) systems become increasingly ubiquitous, the topic of AI governance for ethical decision-making by AI has captured public imagination. Within the AI research community, this topic remains less familiar to many researchers. In this paper, we complement existing surveys, which largely focused on the psychological, social and legal discussions of the topic, with an analysis of recent advances in technical solutions for AI governance. By reviewing publications in leading AI conferences including AAAI, AAMAS, ECAI and IJCAI, we propose a taxonomy which divides the field into four areas: 1) exploring ethical dilemmas; 2) individual ethical decision frameworks; 3) collective ethical decision frameworks; and 4) ethics in human-AI interactions. We highlight the intuitions and key techniques used in each approach, and discuss promising future research directions towards successful integration of ethical AI systems into human societies

    CRM: a new dynamic cross-layer reputation computation model in wireless networks

    Get PDF
    This is the author accepted manuscript. The final version is available from University Press (OUP) via the DOI in this record.Multi-hop wireless networks (MWNs) have been widely accepted as an indispensable component of next-generation communication systems due to their broad applications and easy deployment without relying on any infrastructure. Although showing huge benefits, MWNs face many security problems, especially the internal multi-layer security threats being one of the most challenging issues. Since most security mechanisms require the cooperation of nodes, characterizing and learning actions of neighboring nodes and the evolution of these actions over time is vital to construct an efficient and robust solution for security-sensitive applications such as social networking, mobile banking, and teleconferencing. In this paper, we propose a new dynamic cross-layer reputation computation model named CRM to dynamically characterize and quantify actions of nodes. CRM couples uncertainty based conventional layered reputation computation model with cross-layer design and multi-level security technology to identify malicious nodes and preserve security against internal multi-layer threats. Simulation results and performance analyses demonstrate that CRM can provide rapid and accurate malicious node identification and management, and implement the security preservation against the internal multi-layer and bad mouthing attacks more effectively and efficiently than existing models.The authors would like to thank anonymous reviewers and editors for their constructive comments. This work is supported by: 1. Changjiang Scholars and Innovative Research Team in University (IRT1078), 2. the Key Program of NSFC-Guangdong Union Foundation (U1135002), 3. National Natural Science Foundation of China (61202390), 4. Fujian Natural Science Foundation:2013J01222, 5. the open research fund of Key Lab of Broadband Wireless Communication and Sensor Network Technology (Nanjing University of Posts and Telecommunications, Ministry of Education)
    corecore