Multi-Dimensional Trust Model: Towards Multi-Layered Secure Architecture for Enhanced Threat Information Sharing

Jihen Bennaceur , Wissem Zouaghi , Ali Mabrouk

Journal of Systems Science and Systems Engineering ›› : 1 -24.

PDF
Journal of Systems Science and Systems Engineering ›› : 1 -24. DOI: 10.1007/s11518-024-5631-y
Article

Multi-Dimensional Trust Model: Towards Multi-Layered Secure Architecture for Enhanced Threat Information Sharing

Author information +
History +
PDF

Abstract

The trust concept has become more and more popular by paving its way gradually into the modern field. Thus, it becomes a more alluring and attractive solution to secure and protect information sharing against attackers. Indeed, malicious entities can launch intentionally or unintentionally very harmful attacks against the information-sharing process causing network paralysis. In this paper, we propose composite trust-based schemes from the perspective of direct experience and entities’ recommendations to enhance the shared threat information in the public and private communities. Therefore, we introduce a first trust-based model defined by several specific dimensions to improve the security of private/targeted communities. Furthermore, a second trust-based scheme is proposed for the public community where the concept of zero-trust is introduced to enhance the shared critical data inside this open environment. Thus, our proposal reveals a new level of defense against the misbehaving entities by introducing a penalty scheme to punish malicious and suspicious users and to exempt the attackers with continuous misbehaving from participating in the information-sharing process. Extensive simulations demonstrate that the proposed trust-based model provides high stability and resistance in a heavily hostile environment for the public and private communities.

Cite this article

Download citation ▾
Jihen Bennaceur, Wissem Zouaghi, Ali Mabrouk. Multi-Dimensional Trust Model: Towards Multi-Layered Secure Architecture for Enhanced Threat Information Sharing. Journal of Systems Science and Systems Engineering 1-24 DOI:10.1007/s11518-024-5631-y

登录浏览全文

4963

注册一个新账户 忘记密码

References

[1]

Artmotion Cloud security risk map, 2021

[2]

Braga D D S, Niemann M, Hellingrath B, Neto F B D L. Survey on computational trust and reputation models Journal on ACM Computing Surveys, 2018, 51(5): 1-40

[3]

Chan K, Adali S. An agent-based model for trust and information sharing in networked systems International Multi-Disciplinary Conference on Cognitive Methods in Situation Awareness and Decision Support, 2012(March 06–08,2012)

[4]

Chan K, Cho J H, Adali S. Composite trust M=model for an information sharing scenario 9th International Conference on Ubiquitous Intelligence and Computing, and 9th International Conference on Autonomic and Trusted Computing, 2012(September 04–07)

[5]

CopyTrack Global infringement report 2019: Tracking worldwide image theft, 2019

[6]

Goodwin C, Nicholas J P, Bryant J, Ciglic K, Kleiner A, Kutterer C, Massagli A, Mckay A, Mckitrick P, Neutze J, Storch T, Sullivan K (2015). A framework for cy-bersecurity information sharing and risk reduction. Microsoft Retrieved from https://www.microsoft.com/en-us/download/details.aspx?id=45516.

[7]

Gordon L A, Loeb M P, Lucyshyn W, Sohail T. The impact of the Sarbanes–Oxley act on the corporate disclosures of information security activities Journal of Accounting Public Policy, 2006, 25(5): 503-530.

[8]

Kindervag J, Balaouras S, Coit L. No more chewy centers: Introducing the zero trust model of information security Forrester Research, 2010 1-13

[9]

Mapunya S, Velempini M. The design of byzantine attack mitigation scheme in cognitive radio ad-hoc networks International Conference on Intelligent and Innovative Computing Applications (ICONIC), 2018(December 06–07, 2018)

[10]

Medić A. Survey of computer trust and reputation models–The literature overview International Journal of Information and Communication Technology Research, 2012, 2(3): 254-275

[11]

Platt J E, Jacobson P D, Kardia SLR. Public trust in health information sharing: Implications for biobanking and electronic health record systems Journal on Personalized Medicine, 2015, 5(1): 3-21.

[12]

Platt J E, Jacobson P D, Kardia SLR. Public trust in health information sharing: A measure of system trust Health Services Research, 2018, 53(2): 824-845.

[13]

Olsson T, Hell M, Höst M, Franke U, Borg M. Sharing of vulnerability information among companies-a survey of Swedish companies 45th Euromicro Conference on Software Engineering and Advanced Applications (SEAA), 2019(August 28–30, 2019)

[14]

Ozer O, Subramanian U, Wang Y. Information sharing, advice provision, or delegation: What leads to Higher trust and trustworthiness? Management Science, 2018, 64(1): 474-493.

[15]

Samaniego M, Deters R. Zero-Trust Hierarchical Management in IoT IEEE International Congress on Internet of Things (ICIOT), 2018(July 02–07, 2018)

[16]

Sutton D. Trustedd information sharing for cyber situational awareness Elektrotechnik und Informationstechnik, 2015, 2(132): 113-116.

[17]

Ureña R, Chiclana F, Herrera-Viedma E. DeciTrust-NET: A graph-based trust and reputation framework for social networks Information Fusion, 2020, 61: 101-112.

[18]

Wang Y, Vassileva J. Trust and Reputation Model in Peer-to-Peer Networks Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003), 2003(September 01–03, 2003)

[19]

Wu Y, Zhao Y M, Riguidel M, Wang G H, Yi P. Security and trust management in opportunistic networks: A survey Security and Communication Networks, 2015, 8(9): 1812-1827.

RIGHTS & PERMISSIONS

Systems Engineering Society of China and Springer-Verlag GmbH Germany

AI Summary AI Mindmap
PDF

298

Accesses

0

Citation

Detail

Sections
Recommended

AI思维导图

/