Trust me, I'm a machine

Apr 05, 2005

An EU computer science project hopes to make the uncertainty attached to the pervasive computing future a lot more secure through establishing trust.
Using the cost-benefit function at the heart of risk analysis, the IST programme-funded SECURE project developed software to integrate the very subjective, human concept of trust into computers, PDAs, mobile 'phones and other network devices.

Pervasive computing is a steadily emerging reality. Mobile phones and PDAs are becoming powerful computers in their own right, cars now routinely include telematics, which allows them to know where they are, for example. Now vending machines that accept payment from your mobile phone or PDA are in deployment. All of these devices will periodically connect to the network to perform transactions, whether it's information, services or purchases.

But as the network spreads and the devices that can access it multipy it is very difficult to maintain security. How do you know the person, or the machine, will not steal your personal information or that they will supply the goods, services or information you purchase?

"We've developed software that allows judgement based on establishing a value of trust and balancing that against the risk of abuse. We've mostly work on developing a system to stop spam, so the software would ask establish if the email is trustworthy. We also looked at using the service for an e-purse, an electronic purse for small transactions," says Vinny Cahill, coordinator of the SECURE project at Trinity College, Dublin.

The concept works like this: your PDA or mobile phone receives a query about your current location. First it establishes the identity of the request. Then your PDA or e-purse asks its trust calculator how trustworthy you are. The calculator bases this on previous experiences. If this is the first time, it will base it on your reputation or rating with others or, in the SECURE system, it can even delegate authority to another party.

Meanwhile the risk evaluator is calculating the cost of the transaction if your trust is abused. If the trust is greater than the risk, you PDA reveals your location. If it is unsure, it asks the user. This could be very helpful if you're near a store that's offering a discount on something you need.

The group says their software scheme can even work offline, the based on experience in similar situations.

SECURE developed their software in Java, which means it can work on almost any device.The project finished in December 2004, when it completed development of a software framework that can incoporated to various applications.

"Trust is emerging as a viable method for creating and using ad hoc networks and we'd like to take it further, but it will be another two or three years before it could be deployed in a commercial application," says Prof. Cahill.

Source: IST Results

Explore further: Growing app industry has developers racing to keep up

add to favorites email to friend print save as pdf

Related Stories

IBM posts lower 1Q earnings amid hardware slump (Update)

Apr 16, 2014

IBM's first-quarter earnings fell and revenue came in below Wall Street's expectations amid an ongoing decline in its hardware business, one that was exacerbated by weaker demand in China and emerging markets.

Once-soaring tech stocks sink in sobering comedown

Apr 12, 2014

The stock market's laws of gravity are ravaging its highest fliers. Just look at the list of technology trailblazers whose values have plummeted from record highs during the past few weeks. Investors have re-focused on safer ...

Bitcoin gets easier for consumers to buy, spend

Apr 11, 2014

It's getting easier for consumers to buy and spend bitcoin, the cybercurrency that has captured much of the tech world. With each passing month, entrepreneurs are rolling out new technology for consumers to buy and store ...

Heartbleed bug causes major security headache (Update 3)

Apr 09, 2014

A confounding computer bug called "Heartbleed" is causing major security headaches across the Internet as websites scramble to fix the problem and Web surfers wonder whether they should change their passwords to prevent the ...

Visionary or looney? Zuckerberg on spending spree

Mar 26, 2014

Facebook's latest multibillion dollar acquisition of virtual reality headset maker Oculus is prompting some people to wonder if CEO Mark Zuckerberg is already living in an alternate reality.

Recommended for you

Growing app industry has developers racing to keep up

3 hours ago

Smartphone application developers say they are challenged by the glut of apps as well as the need to update their software to keep up with evolving phone technology, making creative pricing strategies essential to finding ...

Review: With Galaxy S5, Samsung proves less can be more

5 hours ago

Samsung Electronics Co. has produced the most formidable rival yet to the iPhone 5S: the Galaxy S5. The device, released over the weekend, is the fifth edition of the company's successful line of Galaxy S ...

User comments : 0

More news stories

Making graphene in your kitchen

Graphene has been touted as a wonder material—the world's thinnest substance, but super-strong. Now scientists say it is so easy to make you could produce some in your kitchen.