scholarly journals Conceptualizing Distrust Model with Balance Theory and Multi-Faceted Model for Mitigating False Reviews in Location-Based Services (LBS)

Symmetry ◽  
2019 ◽  
Vol 11 (9) ◽  
pp. 1118
Author(s):  
Manmeet Mahinderjit Singh ◽  
Lee Wern Shen ◽  
Mohammed Anbar

Location-based services (LBS) use real-time geo-data from a smartphone to provide information, entertainment or surveillance information. However, the reputations of LBS application have raised some privacy and security issues such as location tracked by third parties and creation of fake reviews and events through Sybil attack. Fake events on LBS such as congestion, accidents or police activity affect routes users and fake reviews caused nuisances and decreases trust towards this technology. The current trust model in LBS is single faceted and not personalized. The concept of both trust and distrust are essential criteria of any trust management model to measure the reliability of LBS applications. This paper explores the relationship between trust models and the distrust concept in LBS. By deriving a representation of the multi-faceted model and balance theory conceptualized in a MiniLBS prototype, trust in this technology is quantified. By adopting matrix factorization and probability algorithms on the survey results, the relationship between distrust and trust is further examined and tested. The result obtained from the experiment was nearly zero, the smallest one was 3.0253 × 10−95, and the largest value was only 4.967 × 10−43. The results show that distrust is not a negation of trust. Another crucial finding suggests that balance theory within distrust in the LBS trust model can enhance the trust management model in LBS and indirectly cater issues rise from fake event problem.

Author(s):  
Grantej Vinod Otari ◽  
Vijay Ram Ghorpade

Mobile Grid network connects large number of mobile devices like smartphones, tablets, PDAs, wireless digital medical equipment’s etc for the purpose of sharing their resources and performing the task collaboratively and cooperatively. The mobile nodes participating in the mobile grid are autonomous and open in nature making them more vulnerable to data and control attacks made by malicious or selfish nodes. Preventing these malicious or selfish nodes and identifying the trusted nodes to participate in the network is an NP-hard problem. To recognize trusted nodes in the mobile grid system a novel trust management model is proposed in this paper by applying an elitist multi objective optimization algorithm Non-dominated Sorting Genetic Algorithm-II (NSGA-II). The proposed trust management model assesses the trust index of each mobile node in the network using various evaluation factors or attributes and then obtains the non-dominated set of trusted nodes in each front. Comparative analysis of the proposed trust model shows that the proposed model can be a potential candidate for implementing trust management in mobile grid network.


2021 ◽  
Vol 11 (18) ◽  
pp. 8496
Author(s):  
Salah T. Alshammari ◽  
Khalid Alsubhi

Cloud computing is a widely used technology that has changed the way people and organizations store and access information. This technology is versatile, and extensive amounts of data can be stored in the cloud. Businesses can access various services over the cloud without having to install applications. However, cloud computing services are provided over a public domain, which means that both trusted and non-trusted users can access the services. Although there are a number of advantages to cloud computing services, especially for business owners, various challenges are posed in terms of the privacy and security of information and online services. A threat that is widely faced in the cloud environment is the on/off attack, in which entities exhibit proper behavior for a given time period to develop a positive reputation and gather trust, after which they exhibit deception. Another threat often faced by trust management services is a collusion attack, which is also known as collusive malicious feedback behavior. This is carried out when a group of people work together to make false recommendations with the intention of damaging the reputation of another party, which is referred to as a slandering attack, or to enhance their own reputation, which is referred to as a self-promoting attack. In this paper, a viable solution is provided with the given trust model for preventing these attacks. This method works by providing effective security to cloud services by identifying malicious and inappropriate behaviors through the application of trust algorithms that can identify on/off attacks and collusion attacks by applying different security criteria. Finally, the results show that the proposed trust model system can provide high security by decreasing security risk and improving the quality of decisions of data owners and cloud operators.


Author(s):  
Paul J. Bolt ◽  
Sharyl N. Cross

Chapter 1 explores perspectives on world order, including power relationships and the rules that shape state behavior and perceptions of legitimacy. After outlining a brief history of the relationship between Russia and China that ranged from cooperation to military clashes, the chapter details Chinese and Russian perspectives on the contemporary international order as shaped by their histories and current political situation. Chinese and Russian views largely coincide on security issues, the desirability of a more multipolar order, and institutions that would enhance their standing in the world. While the Chinese–Russian partnership has accelerated considerably, particularly since the crisis in Ukraine in 2014, there are still some areas of competition that limit the extent of the relationship.


SAGE Open ◽  
2021 ◽  
Vol 11 (1) ◽  
pp. 215824402110061
Author(s):  
Ana Maria Magalhães Correia ◽  
Clarissa Figueredo Rocha ◽  
Luiz Carlos Duclós ◽  
Claudimar Pereira da Veiga

This study proposes a management model by business processes for science parks based on the premises and concept of enterprise architecture (EA). The model offers integrating business processes with activities and information that can be generated by adopting customized information systems to meet the science parks’ needs. The proposed model’s main contributions included EA as a means for shaping and enabling reconfiguration through descriptions of the structures of business processes and information systems that connect these structures, forming business and information architecture frameworks. In association with these frameworks, the managers need to define a coherent set of patterns, policies, procedures, and principles that sustain the business processes integrated with the information systems. As a result of the study, this model can help management execute and control activities related to business processes in the parks through interaction and alignment with the information system intended to facilitate the execution. The model will also lead to greater agility and efficiency in these business processes, considering their specific nature and the relationship with the parks’ actors. As a practical contribution, knowledge of these processes aids the management of the parks in their drive for a competitive advantage by maintaining and developing their management models.


2015 ◽  
Vol 34 ◽  
pp. 693-704 ◽  
Author(s):  
Ugur Eray Tahta ◽  
Sevil Sen ◽  
Ahmet Burak Can

Sign in / Sign up

Export Citation Format

Share Document