Reputation Scoring System Using an Economic Trust Model A distributed approach to evaluate trusted third parties on the Internet

被引:3
作者
Vyshegorodtsev, Marat [1 ]
Miyamoto, Daisuke [1 ]
Wakahara, Yasushi [1 ]
机构
[1] Univ Tokyo, Grad Sch Engn, Tokyo, Japan
来源
2013 IEEE 27TH INTERNATIONAL CONFERENCE ON ADVANCED INFORMATION NETWORKING AND APPLICATIONS WORKSHOPS (WAINA) | 2013年
关键词
trust; governance; distributed networks;
D O I
10.1109/WAINA.2013.120
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
The trust anchors defined in the DNSSEC and SSL architecture make the governance of the Internet very rigidly aligned with the domain name registrars and the software vendors. The root certification authorities (root CAs) are defined ultimately and built into the software key stores of an end-user. However, the end-user is not given any criteria to distinguish the built-in root CAs so that he is unable to manage the default key store effectively. In this paper we suggest a new approach of creating a reputation score for the trusted third parties (TTPs). We evaluate each TTP based on its economic performance by counting the amount of transaction fees put on the certificate-signing transactions. Then we become able to apply different filtering algorithms to reveal the TTPs subject to automated removal from or addition to the software key stores. One of the examples - if a root or subordinate CA does not have a single buyer of SSL certificates yet, then it is not required to keep the CA in the web browser trusted certificate store. We make use of the Bitcoin protocol to reveal the transaction information and guarantee the integrity of the transaction database, which is managed and stored in a P2P manner. As a result, we achieve a completely dynamic and distributed reputation scoring system, where the cost of an attack is higher than the cost of normal system operation.
引用
收藏
页码:730 / 737
页数:8
相关论文
共 16 条
[1]  
[Anonymous], 2009, NETCRAFT SSL SERVER
[2]  
[Anonymous], 1997, BACK
[3]  
Barok Dusan, 2011, BITC CENS RES CURR D
[4]  
Dzambasow M., 2005, 4158 RFC
[5]   Providing trust in wireless sensor networks using a bio-inspired technique [J].
Gomez Marmol, Felix ;
Martinez Perez, Gregorio .
TELECOMMUNICATION SYSTEMS, 2011, 46 (02) :163-180
[6]   A Survey of Attack and Defense Techniques for Reputation Systems [J].
Hoffman, Kevin ;
Zage, David ;
Nita-Rotaru, Cristina .
ACM COMPUTING SURVEYS, 2009, 42 (01)
[7]  
Internation Telecommunication Union, 2008, X509 INT TEL UN
[8]  
Juels A., 1999, Proceedings 1999 Network and Distributed System Security Symposium, P151
[9]  
Lu Yanbin, 2010, IEEE 10 INT C PEER T
[10]  
Marlinspike M., 2011, SSL FUTURE AUTHENTIC