Trust me, I'm a machine

April 5, 2005

An EU computer science project hopes to make the uncertainty attached to the pervasive computing future a lot more secure through establishing trust.
Using the cost-benefit function at the heart of risk analysis, the IST programme-funded SECURE project developed software to integrate the very subjective, human concept of trust into computers, PDAs, mobile 'phones and other network devices.

Pervasive computing is a steadily emerging reality. Mobile phones and PDAs are becoming powerful computers in their own right, cars now routinely include telematics, which allows them to know where they are, for example. Now vending machines that accept payment from your mobile phone or PDA are in deployment. All of these devices will periodically connect to the network to perform transactions, whether it's information, services or purchases.

But as the network spreads and the devices that can access it multipy it is very difficult to maintain security. How do you know the person, or the machine, will not steal your personal information or that they will supply the goods, services or information you purchase?

"We've developed software that allows judgement based on establishing a value of trust and balancing that against the risk of abuse. We've mostly work on developing a system to stop spam, so the software would ask establish if the email is trustworthy. We also looked at using the service for an e-purse, an electronic purse for small transactions," says Vinny Cahill, coordinator of the SECURE project at Trinity College, Dublin.

The concept works like this: your PDA or mobile phone receives a query about your current location. First it establishes the identity of the request. Then your PDA or e-purse asks its trust calculator how trustworthy you are. The calculator bases this on previous experiences. If this is the first time, it will base it on your reputation or rating with others or, in the SECURE system, it can even delegate authority to another party.

Meanwhile the risk evaluator is calculating the cost of the transaction if your trust is abused. If the trust is greater than the risk, you PDA reveals your location. If it is unsure, it asks the user. This could be very helpful if you're near a store that's offering a discount on something you need.

The group says their software scheme can even work offline, the based on experience in similar situations.

SECURE developed their software in Java, which means it can work on almost any device.The project finished in December 2004, when it completed development of a software framework that can incoporated to various applications.

"Trust is emerging as a viable method for creating and using ad hoc networks and we'd like to take it further, but it will be another two or three years before it could be deployed in a commercial application," says Prof. Cahill.

Source: IST Results

Explore further: Samsung says it has found no battery problem in China (Update)

Related Stories

Russia fines Google $6.7 million over anti-trust charge

August 11, 2016

Russia's anti-trust authority on Thursday fined Google 438 million rubles ($6.75 million) after finding it guilty of abusing its dominant market position by forcing smartphone makers to install its search engine on Androids.

Recommended for you

Elon Musk unveils plan for Mars 'city' (Update 2)

September 27, 2016

SpaceX chief Elon Musk unveiled on Tuesday ambitious plans to establish a "city" on Mars by sending humans on massive spacecraft with cabins, at a cost as low as $100,000 per person.

Unusual martian region leaves clues to planet's past

September 27, 2016

Researcher Don Hood from LSU and colleagues at collaborating universities studied an unusual region on Mars—an area with high elevation called Thaumasia Planum. They analyzed the geography and mineralogy of this area they ...

Quantum computing advances with control of entanglement

September 27, 2016

When the quantum computer was imagined 30 years ago, it was revered for its potential to quickly and accurately complete practical tasks often considered impossible for mere humans and for conventional computers. But, there ...

Scientists uncover secret to gold's catalytic powers

September 27, 2016

Settling a decades-long debate, new research conclusively shows that a hierarchy of active species exists in gold on iron oxide catalysis designed for low temperature carbon monoxide oxidation; Nanoparticles, sub-nanometer ...

Microsoft teams with Bank of America on 'blockchain'

September 27, 2016

Microsoft and Bank of America Merrill Lynch on Tuesday announced they are working together to make financial transactions more efficient with blockchain technology—the foundation of bitcoin digital currency.

0 comments

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Click here to reset your password.
Sign in to get notified via email when new comments are made.