A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents
Jan Kantert, Lukas Klejnowski, Sarah Edenhofer, Sven Tomforde, Christian Müller-Schloer
2016
Abstract
Information and communication technology witnesses a raise of open, distributed systems that consist of various heterogeneous elements. Within such an environment, individual elements have to efficiently fulfil their goals, which may require cooperation with others. As a consequence, a variety of threats appears that need to be handled and circumvented in the entity’s behaviour. One major technical approach to provide a working environment for such systems is to introduce technical trust. In this paper, we present a basic threat model that comprises the most important challenges in this context – related to the basic system and the trust management, respectively. In order to illustrate the particular hazardous aspects, we discuss a Desktop Computing Grid application as scenario.
References
- Anderson, D. P. (2004). BOINC: A System for PublicResource Computing and Storage. In Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing, GRID 7804, pages 4-10, Washington, DC, USA. IEEE.
- Bernard, Y., Klejnowski, L., Çakar, E., Hähner, J., and Müller-Schloer, C. (2011). Efficiency and Robustness Using Trusted Communities in a Trusted Desktop Grid. In Proc. of SASO Workshops, pages 21-26, Michigan, US. IEEE.
- Castelfranchi, C. and Falcone, R. (2010). Trust Theory: A Socio-Cognitive and Computational Model, volume 18. John Wiley & Sons, Chichester, UK.
- Centeno, R. and Billhardt, H. (2011). Using incentive mechanisms for an adaptive regulation of open multi-agent systems. In Proceedings of the Twenty-Second international joint conference on Artificial IntelligenceVolume Volume One, pages 139-145. AAAI Press.
- Centeno, R., Billhardt, H., and Hermoso, R. (2011). An adaptive sanctioning mechanism for open multi-agent systems regulated by norms. In Tools with Artificial Intelligence (ICTAI), 2011 23rd IEEE International Conference on, pages 523-530. IEEE.
- Chakravarti, A. J., Baumgartner, G., and Lauria, M. (2005). The organic grid: self-organizing computation on a peer-to-peer network. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 35(3):373-384.
- Choi, S., Buyya, R., Kim, H., and Byun, E. (2008). A Taxonomy of Desktop Grids and its Mapping to State of the Art Systems. Technical report, Grid Computing and Dist. Sys. Laboratory, The University of Melbourne.
- Domingues, P., Sousa, B., and Moura Silva, L. (2007). Sabotage-tolerance and Trustmanagement in Desktop Grid Computing. Future Generation Computer Systems, 23(7):904-912.
- Foster, I., Jennings, N. R., and Kesselman, C. (2004). Brain meets brawn: Why grid and agents need each other. In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent SystemsVolume 1, pages 8-15. IEEE Computer Society.
- Hermoso, R., Billhardt, H., and Ossowski, S. (2010). Role evolution in open multi-agent systems as an information source for trust. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1-Volume 1, pages 217- 224. International Foundation for Autonomous Agents and Multiagent Systems.
- Hernan, S., Lambert, S., Ostwald, T., and Shostack, A. Uncover security design flaws using the stride approach (2006). URL: http://msdn. microsoft. com/en-us/magazine/cc163519. aspx [accessed 2010- 01-12][WebCite Cache].
- Horling, B. and Lesser, V. (2004). A survey of multi-agent organizational paradigms. The Knowledge Engineering Review, 19(04):281-316.
- Klejnowski, L. (2014). Trusted Community: A Novel Multiagent Organisation for Open Distributed Systems. PhD thesis, Leibniz Universität Hannover.
- Litzkow, M. J., Livny, M., and Mutka, M. W. (1988). Condora hunter of idle workstations. In Distributed Computing Systems, 1988., 8th International Conference on, pages 104-111. IEEE.
- Marmol, F. G. and Pérez, G. M. (2009). Security threats scenarios in trust and reputation models for distributed systems. computers & security, 28(7):545-556.
- Oussalah, M. and Griffiths, N. (2005). Cooperative clans. Kybernetes, 34(9/10):1384-1403.
- Patoli, Z., Gkion, M., Al-Barakati, A., Zhang, W., Newbury, P., and White, M. (2009). How to build an open source render farm based on desktop grid computing. In Wireless Networks, Information Processing and Systems, pages 268-278. Springer.
- Pitt, J., Schaumeier, J., and Artikis, A. (2011). The Axiomatisation of Socio-Economic Principles for SelfOrganising Systems. In Self-Adaptive and SelfOrganizing Systems (SASO), 2011 Fifth IEEE International Conference on, pages 138-147, Michigan, US. IEEE.
- Poslad, S., Charlton, P., and Calisti, M. (2003). Specifying standard security mechanisms in multi-agent systems. In Trust, Reputation, and Security: Theories and Practice, pages 163-176. Springer.
- Steghöfer, J.-P., Kiefhaber, R., Leichtenstern, K., Bernard, Y., Klejnowski, L., Reif, W., Ungerer, T., André, E., Hähner, J., and Müller-Schloer, C. (2010). Trustworthy Organic Computing Systems: Challenges and Perspectives. In Proc. of ATC 2010, pages 62-76, Boston, MA. Springer.
- Walker, D. W. and Dongarra, J. J. (1996). Mpi: a standard message passing interface. Supercomputer, 12:56-68.
- Wierzbicki, A. (2010). Trust and fairness in open, distributed systems, volume 298. Springer.
Paper Citation
in Harvard Style
Kantert J., Klejnowski L., Edenhofer S., Tomforde S. and Müller-Schloer C. (2016). A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents . In Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART, ISBN 978-989-758-172-4, pages 173-180. DOI: 10.5220/0005696801730180
in Bibtex Style
@conference{icaart16,
author={Jan Kantert and Lukas Klejnowski and Sarah Edenhofer and Sven Tomforde and Christian Müller-Schloer},
title={A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents},
booktitle={Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,},
year={2016},
pages={173-180},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005696801730180},
isbn={978-989-758-172-4},
}
in EndNote Style
TY - CONF
JO - Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,
TI - A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents
SN - 978-989-758-172-4
AU - Kantert J.
AU - Klejnowski L.
AU - Edenhofer S.
AU - Tomforde S.
AU - Müller-Schloer C.
PY - 2016
SP - 173
EP - 180
DO - 10.5220/0005696801730180