Trust me, I'm a machine

Apr 05, 2005

An EU computer science project hopes to make the uncertainty attached to the pervasive computing future a lot more secure through establishing trust.
Using the cost-benefit function at the heart of risk analysis, the IST programme-funded SECURE project developed software to integrate the very subjective, human concept of trust into computers, PDAs, mobile 'phones and other network devices.

Pervasive computing is a steadily emerging reality. Mobile phones and PDAs are becoming powerful computers in their own right, cars now routinely include telematics, which allows them to know where they are, for example. Now vending machines that accept payment from your mobile phone or PDA are in deployment. All of these devices will periodically connect to the network to perform transactions, whether it's information, services or purchases.

But as the network spreads and the devices that can access it multipy it is very difficult to maintain security. How do you know the person, or the machine, will not steal your personal information or that they will supply the goods, services or information you purchase?

"We've developed software that allows judgement based on establishing a value of trust and balancing that against the risk of abuse. We've mostly work on developing a system to stop spam, so the software would ask establish if the email is trustworthy. We also looked at using the service for an e-purse, an electronic purse for small transactions," says Vinny Cahill, coordinator of the SECURE project at Trinity College, Dublin.

The concept works like this: your PDA or mobile phone receives a query about your current location. First it establishes the identity of the request. Then your PDA or e-purse asks its trust calculator how trustworthy you are. The calculator bases this on previous experiences. If this is the first time, it will base it on your reputation or rating with others or, in the SECURE system, it can even delegate authority to another party.

Meanwhile the risk evaluator is calculating the cost of the transaction if your trust is abused. If the trust is greater than the risk, you PDA reveals your location. If it is unsure, it asks the user. This could be very helpful if you're near a store that's offering a discount on something you need.

The group says their software scheme can even work offline, the based on experience in similar situations.

SECURE developed their software in Java, which means it can work on almost any device.The project finished in December 2004, when it completed development of a software framework that can incoporated to various applications.

"Trust is emerging as a viable method for creating and using ad hoc networks and we'd like to take it further, but it will be another two or three years before it could be deployed in a commercial application," says Prof. Cahill.

Source: IST Results

Explore further: Pilot sites in energy from coffee waste show good results

add to favorites email to friend print save as pdf

Related Stories

For secure software: X-rays instead of passport control

Aug 21, 2014

Trust is good, control is better. This also applies to the security of computer programs. Instead of trusting "identification documents" in the form of certificates, JOANA, the new software analysis tool, examines the source ...

Malware worms its way into more apps, study finds

Jun 24, 2014

Malicious software is increasingly making its way into mobile phones through "cloned" versions of popular apps, and software weaknesses in legitimate ones, security researchers said Tuesday.

China's startups hope for boom after Alibaba IPO

Jun 11, 2014

Nils Pihl has spent 18 months building what he calls cutting-edge software to crunch "really big data sets." But instead of going to Silicon Valley, the 27-year-old Swede and his four colleagues have been ...

Apple expands into health, home with new software

Jun 03, 2014

Apple is expanding into home and health management as the company tries to turn its iPhones, iPads and Mac computers into an interchangeable network of devices that serve as a hub of people's increasingly ...

Recommended for you

China's Alibaba plans IPO for week of September 8

16 hours ago

Chinese e-commerce giant Alibaba plans to hold its initial public offering on the US stock market the week of September 8, the Wall Street Journal reported Saturday, citing a person familiar with the matter.

Tablet sales slow as PCs find footing

17 hours ago

Tablets won't eclipse personal computers as fast as once thought, according to studies by market tracker International Data Corporation (IDC).

Startups offer banking for smartphone users

17 hours ago

The latest banks are small enough to fit in the palm of your hand. Startups, such as Moven and Simple, offer banking that's designed specifically for smartphones, enabling users to track their spending on the go. Some things ...

FIXD tells car drivers via smartphone what is wrong

Aug 29, 2014

A key source of anxiety while driving solo, when even a bothersome back-seat driver's comments would have made you listen: the "check engine" light is on but you do not feel, smell or see anything wrong. ...

User comments : 0