120 likes | 242 Vues
This paper presents a novel approach to integrating trust-based risk management in distributed systems, enhancing security measures. It introduces a Trust Enhanced Security Model, consisting of four key components: Trust Model, Authorization, Interaction, and Utility. The model evaluates trust decisions while considering risk management to optimize system utility. Experimental studies demonstrate the effectiveness of this model in mitigating security violations caused by malicious behaviors. This work aims to provide a systematic method for linking security and risk management, promoting both security and economic benefits through utility maximization.
E N D
Trust Based Risk Management for Distributed System Security - A New Approach Presented By RajatKadia
Introducing the Risk Management Issue in security Trust Enhanced Security Model for Risk Management Experimental Evaluation of the Model Conclusion
Trust Enhanced Security Model With Risk Management Integration for System Utility • Overview of model : It consist of four blocks 1) Trust model 2) Authorization 3) Interaction 4) Utility
Trust Enhanced Authorization with Risk Management Consideration for UtilityMaximization
Trust model • The trust model manages the trust information in the system and makes trust decisions with risk management consideration δ : T × E → T (1) decision : (t > tth) → {0, 1} (2)
Authorization with Risk Management Integration The authorization block performs the standard authorization process with risk consideration Auth : A × R × T × tth → P (3)
Interaction The interaction component manages the mapping between behavioral evidences and the resulting updated trust value.
Utility The utility block is used to calculate the system utility at the end of each interaction utility : E × F → U (4)
Experimental Studies and Result Analysis Utility without Risk based Trust Management for Various Malicious Behaviors Distributions - 0% to 100% Security Violations
Utility with Risk based Trust Management for Various Malicious Behaviors Distributions - 0% to 100% Security Violations Experimental Studies and Result Analysis
Conclusion • This new approach has introduced a way for linking security system with risk management to achieve economical benefits through utility maximization. It also provided a qualitative approach for risk and security integration via trust