A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents

Jan Kantert, Lukas Klejnowski, Sarah Edenhofer, Sven Tomforde, Christian Müller-Schloer

Abstract

Information and communication technology witnesses a raise of open, distributed systems that consist of various heterogeneous elements. Within such an environment, individual elements have to efficiently fulfil their goals, which may require cooperation with others. As a consequence, a variety of threats appears that need to be handled and circumvented in the entity’s behaviour. One major technical approach to provide a working environment for such systems is to introduce technical trust. In this paper, we present a basic threat model that comprises the most important challenges in this context – related to the basic system and the trust management, respectively. In order to illustrate the particular hazardous aspects, we discuss a Desktop Computing Grid application as scenario.

References

  1. Anderson, D. P. (2004). BOINC: A System for PublicResource Computing and Storage. In Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing, GRID 7804, pages 4-10, Washington, DC, USA. IEEE.
  2. Bernard, Y., Klejnowski, L., Çakar, E., Hähner, J., and Müller-Schloer, C. (2011). Efficiency and Robustness Using Trusted Communities in a Trusted Desktop Grid. In Proc. of SASO Workshops, pages 21-26, Michigan, US. IEEE.
  3. Castelfranchi, C. and Falcone, R. (2010). Trust Theory: A Socio-Cognitive and Computational Model, volume 18. John Wiley & Sons, Chichester, UK.
  4. Centeno, R. and Billhardt, H. (2011). Using incentive mechanisms for an adaptive regulation of open multi-agent systems. In Proceedings of the Twenty-Second international joint conference on Artificial IntelligenceVolume Volume One, pages 139-145. AAAI Press.
  5. Centeno, R., Billhardt, H., and Hermoso, R. (2011). An adaptive sanctioning mechanism for open multi-agent systems regulated by norms. In Tools with Artificial Intelligence (ICTAI), 2011 23rd IEEE International Conference on, pages 523-530. IEEE.
  6. Chakravarti, A. J., Baumgartner, G., and Lauria, M. (2005). The organic grid: self-organizing computation on a peer-to-peer network. Systems, Man and Cybernetics, Part A: Systems and Humans, IEEE Transactions on, 35(3):373-384.
  7. Choi, S., Buyya, R., Kim, H., and Byun, E. (2008). A Taxonomy of Desktop Grids and its Mapping to State of the Art Systems. Technical report, Grid Computing and Dist. Sys. Laboratory, The University of Melbourne.
  8. Domingues, P., Sousa, B., and Moura Silva, L. (2007). Sabotage-tolerance and Trustmanagement in Desktop Grid Computing. Future Generation Computer Systems, 23(7):904-912.
  9. Foster, I., Jennings, N. R., and Kesselman, C. (2004). Brain meets brawn: Why grid and agents need each other. In Proceedings of the Third International Joint Conference on Autonomous Agents and Multiagent SystemsVolume 1, pages 8-15. IEEE Computer Society.
  10. Hermoso, R., Billhardt, H., and Ossowski, S. (2010). Role evolution in open multi-agent systems as an information source for trust. In Proceedings of the 9th International Conference on Autonomous Agents and Multiagent Systems: volume 1-Volume 1, pages 217- 224. International Foundation for Autonomous Agents and Multiagent Systems.
  11. Hernan, S., Lambert, S., Ostwald, T., and Shostack, A. Uncover security design flaws using the stride approach (2006). URL: http://msdn. microsoft. com/en-us/magazine/cc163519. aspx [accessed 2010- 01-12][WebCite Cache].
  12. Horling, B. and Lesser, V. (2004). A survey of multi-agent organizational paradigms. The Knowledge Engineering Review, 19(04):281-316.
  13. Klejnowski, L. (2014). Trusted Community: A Novel Multiagent Organisation for Open Distributed Systems. PhD thesis, Leibniz Universität Hannover.
  14. Litzkow, M. J., Livny, M., and Mutka, M. W. (1988). Condora hunter of idle workstations. In Distributed Computing Systems, 1988., 8th International Conference on, pages 104-111. IEEE.
  15. Marmol, F. G. and Pérez, G. M. (2009). Security threats scenarios in trust and reputation models for distributed systems. computers & security, 28(7):545-556.
  16. Oussalah, M. and Griffiths, N. (2005). Cooperative clans. Kybernetes, 34(9/10):1384-1403.
  17. Patoli, Z., Gkion, M., Al-Barakati, A., Zhang, W., Newbury, P., and White, M. (2009). How to build an open source render farm based on desktop grid computing. In Wireless Networks, Information Processing and Systems, pages 268-278. Springer.
  18. Pitt, J., Schaumeier, J., and Artikis, A. (2011). The Axiomatisation of Socio-Economic Principles for SelfOrganising Systems. In Self-Adaptive and SelfOrganizing Systems (SASO), 2011 Fifth IEEE International Conference on, pages 138-147, Michigan, US. IEEE.
  19. Poslad, S., Charlton, P., and Calisti, M. (2003). Specifying standard security mechanisms in multi-agent systems. In Trust, Reputation, and Security: Theories and Practice, pages 163-176. Springer.
  20. Steghöfer, J.-P., Kiefhaber, R., Leichtenstern, K., Bernard, Y., Klejnowski, L., Reif, W., Ungerer, T., André, E., Hähner, J., and Müller-Schloer, C. (2010). Trustworthy Organic Computing Systems: Challenges and Perspectives. In Proc. of ATC 2010, pages 62-76, Boston, MA. Springer.
  21. Walker, D. W. and Dongarra, J. J. (1996). Mpi: a standard message passing interface. Supercomputer, 12:56-68.
  22. Wierzbicki, A. (2010). Trust and fairness in open, distributed systems, volume 298. Springer.
Download


Paper Citation


in Harvard Style

Kantert J., Klejnowski L., Edenhofer S., Tomforde S. and Müller-Schloer C. (2016). A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents . In Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART, ISBN 978-989-758-172-4, pages 173-180. DOI: 10.5220/0005696801730180


in Bibtex Style

@conference{icaart16,
author={Jan Kantert and Lukas Klejnowski and Sarah Edenhofer and Sven Tomforde and Christian Müller-Schloer},
title={A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents},
booktitle={Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,},
year={2016},
pages={173-180},
publisher={SciTePress},
organization={INSTICC},
doi={10.5220/0005696801730180},
isbn={978-989-758-172-4},
}


in EndNote Style

TY - CONF
JO - Proceedings of the 8th International Conference on Agents and Artificial Intelligence - Volume 1: ICAART,
TI - A Threatmodel for Trust-based Systems Consisting of Open, Heterogeneous and Distributed Agents
SN - 978-989-758-172-4
AU - Kantert J.
AU - Klejnowski L.
AU - Edenhofer S.
AU - Tomforde S.
AU - Müller-Schloer C.
PY - 2016
SP - 173
EP - 180
DO - 10.5220/0005696801730180