attacks (Huang, 2002), it has advantages over many
software-based solutions. It has potential advantages
over other solutions as well; especially when the
Trusted Computing Group standard (TCG, 2003) is
deployed and more and more industry digital device
vendors offer TCG-compatible hardware and
software in the future. Our solution will have
potential advantages when various digital device
vendors produce TCG compatible products in the
future.
The RT module can be designed and
implemented inside a secure main chip in the mobile
computing platform. The secure main chip provides
a secure environment to offer security services for
the operating system (OS) and application software.
It also has a number of security enforcement
mechanisms (e.g. secure booting, integrity checking
and device authentication). Particularly, it provides
cryptographic functions and secure storage. The RT
module functionalities and the ATMF functionalities
can be implemented by a number of protected
applications. The protected applications are small
applications dedicated to performing security critical
operations inside a secure environment. They have
strict size limitations and resemble function libraries.
The protected applications can access any resource
in the secure environment. They can also
communicate with normal applications in order to
offer security services. New protected applications
can be added to the system at any time. The secure
environment software controls loading and
execution of the protected applications. Only signed
protected applications are allowed to run.
In addition, the secure register of the RT module,
the policy base, the execution base and the
mechanism base could be implemented by a flexible
and light secure storage mechanism supported by the
trusted computing platform (Asokan and Ekberg,
2008).
7 CONCLUSIONS
In this paper, we presented our arguments for
autonomic trust management in the pervasive
system. In our brief literature review, we found that
related work seldom supported autonomic trust
management. We proposed an autonomic trust
management solution based on the trust sustaining
mechanism and the adaptive trust control model.
The main contribution of our solution lies in the fact
that it supports two levels of autonomic trust
management: between devices as well as between
services offered by the devices. This solution can
also effectively avoid or reduce risk by stopping or
restricting any potential risky activities based on the
trustor’s specification. We demonstrated the
effectiveness of our solution by applying it into an
example pervasive system. We also discussed the
advantages of and implementation strategies for the
solution.
For future work, we will study the performance
of our solution through a prototype implementation
on the basis of a mobile trusted computing platform.
REFERENCES
Asokan, N., Ekberg, J., 2008. A platform for OnBoard
credentials. Financial Cryptography and Data Security
2008.
Campbell, R., Al-Muhtadi, J., Naldurg, P., Sampemane,
G., Mickunas, M.D., 2002. Towards security and
privacy for pervasive computing. In proceedings of
International Symposium on Software Security.
Denning, D.E., 1993. A new paradigm for trusted
Systems. Proc. 1992-1993 workshop on New security
paradigms, pp. 36-41.
England, P., Lampson, B., Manferdelli, J., Peinado, M.,
Willman, B., 2003. A trusted open platform. IEEE
Computer Society, pp. 55-62.
Huang A. B., 2002. The trusted OC: skin-deep security,
Computer, Vol.35, No.10, pp. 103-5.
Kosko, B., 1986. Fuzzy cognitive maps. International
Journal Man-Machine Studies, Vol. 24, pp. 65-75.
Shand, B., Dimmock, N., Bacon, J., 2004. Trust for
ubiquitous, transparent collaboration. Wireless
Networks, Vol. 10 Issue 6, pp. 711-721.
Spanoudakis, G., 2007. Dynamic trust assessment of
software services. 2nd international workshop on
Service oriented software engineering, pp. 36-40.
Sun, T., Denko, M.K., 2007. A distributed trust
management scheme in the pervasive computing
environment. Canadian Conference on Electrical and
Computing Engineering, pp. 1219-1222.
TCG, Trusted Computing Group, 2003. Trusted Platform
Module - TPM Specification v1.2. Retrieved May,
2006, from
https://www.trustedcomputinggroup.org/specs/TPM/
Vaughan-Nichols, S.J., 2003. How trustworthy is trusted
computing?” Computer, Vol. 36, Issue 3.
William, C., Shin, D., 2006. A visual Framework for
securing impromptu collaboration in pervasive
computing. International Conference on Collaborative
Computing: Networking, Applications and
Worksharing.
Wolfe, S.T., Ahamed, S.I., Zulkernine, M.A., 2006. Trust
framework for pervasive computing environments.
IEEE International Conference on Computer Systems
and Applications, pp. 312-319.
Xu, W., Xin, Y., Lu, G., 2007. A trust framework for
pervasive computing environments. International
AUTONOMIC TRUST MANAGEMENT FOR A PERVASIVE SYSTEM
499