Title :
A Trust-Based Usage Control Scheme for Resource Sharing
Author :
Chen Lu;Zhang Li-Qiang;Zhou Qing;Chen Yun
Author_Institution :
Dept. of Inf. Security, Naval Univ. of Eng., Wuhan, China
Abstract :
As peer-to-peer (P2P) networks lack any centralized authority, security issues for sharing resource usage control become outstanding. The emerging hardware-based trusted computing (TC) technologies vouch to provide root of trust upon which secure applications can be developed. So a scheme of usage control for resource sharing using TC technologies in P2P networks is introduced in this paper. We advance a TRS-UCON model with the properties of decision continuity and attribute mutability to control the information flow in single or both peers and the sharing resource usage by evaluating the trust degree and policies. An architecture for policy enforcement is proposed to illustrate how TC technologies are applied to usage control. The value of trust degree is a result of comprehensive evaluation according both the integrity of subject/object and the conditions of system and user, such as user reputation and resource access history. So we can trust a remote peer by this way not only authenticated boot but also runtime security without knowing the redundant information of the peer. And the client peer of the resource sharing system can be active to choose the trustable resource supplier and also be the focus of security enhancement contrary to the traditional ways that only emphasize the security of server with resource on it.
Keywords :
"Resource management","Computer architecture","Computational modeling","History","Authorization","Servers"
Conference_Titel :
Ubiquitous Intelligence and Computing and 2015 IEEE 12th Intl Conf on Autonomic and Trusted Computing and 2015 IEEE 15th Intl Conf on Scalable Computing and Communications and Its Associated Workshops (UIC-ATC-ScalCom), 2015 IEEE 12th Intl Conf on
DOI :
10.1109/UIC-ATC-ScalCom-CBDCom-IoP.2015.111