You are on page 1of 10

Real Time Services for

Securing Fog
Presented by:
Muhammad Ahmed 18i-1244
Ahmed Raza 18i-1475
Muhammad Ijaz Riaz 18i-1474
Evidence-based trust management
• Considers anything that proves trust relationships among nodes (e.g., keys,
identity, address), or
• any evidence that any node can generate (e.g., a challenge and response
process)
Evidence-based trust management
• Trust Models
• Public-key cryptography
• Duckling model
• Distributed trust model
Monitoring-Based Trust Model
• Rates the trust level of each participating node based on direct
information (e.g., observing the behavior)
• Pre-deployment knowledge of trust vs. continuous monitoring
(reactive)
Monitoring-Based Trust Model
• Unified trust management scheme
• the trust model has two components:
• trust from direct observation
• trust from indirect observation
• Policy-based approach
• Based on strong and objective security schemes
• Verifiable properties
Reputation-based trust management
• Trust is calculated by collecting, aggregating, and disseminating reputation
among the entities
• E.g., vendor evaluation for online shopping
Reputation-based trust management
• Examples of completely centralized mechanism for storing and
exploring reputation data:
• Amazon.com
• Visitors usually look for customer reviews before deciding to buy new books.
• eBay
• Participants at eBay’s auctions can rate each other after each transaction.
Reputation-based Trust Management Systems
Design Considerations
• The system should be self-policing
• The system should maintain anonymity
• The system should not assign any profit to newcomers
• The system should have minimal overhead in terms of computation,
infrastructure, storage, and message complexity

You might also like