<!DOCTYPE article PUBLIC "-//NLM//DTD JATS (Z39.96) Journal Archiving and Interchange DTD v1.0 20120330//EN" "JATS-archivearticle1.dtd">
<article xmlns:xlink="http://www.w3.org/1999/xlink">
  <front>
    <journal-meta />
    <article-meta>
      <title-group>
        <article-title>A Trust and Reputation Framework</article-title>
      </title-group>
      <contrib-group>
        <aff id="aff0">
          <label>0</label>
          <institution>Department of Computer Science, University of Malaga</institution>
          ,
          <addr-line>29071, Malaga</addr-line>
          ,
          <country country="ES">Spain</country>
        </aff>
      </contrib-group>
      <abstract>
        <p>The Future Internet is posing new security challenges as their scenarios are bringing together a huge amount of stakeholders and devices that must interact under unforeseeable conditions. In addition, in these scenarios we cannot expect entities to know each other beforehand, and therefore, they must be involved in risky and uncertain collaborations. In order to minimize threats and security breaches, it is required that a well-informed decision-making process is in place, and it is here where trust and reputation can play a crucial role. Unfortunately, services and applications developers are often unarmed to address trust and reputation requirements in these scenarios. To overcome this limitation, we propose a trust and reputation framework that allows developers to create trust- and reputation-aware applications.</p>
      </abstract>
    </article-meta>
  </front>
  <body>
    <sec id="sec-1">
      <title>-</title>
      <p>Future Internet (FI) scenarios bring together multiple entities, namely
stakeholders and devices, that need to collaborate in order to reach their goals. Should
these entities knew each other beforehand, upfront mechanisms could be in place
at design-time in order to ensure that these collaborations have a successful
ending for all parties. However, this cannot be assumed. Therefore, it is required to
guarantee a successful ending even under risky and uncertain conditions, which
generally involves making good decisions. These conditions present a breeding
ground for trust.</p>
      <p>Even when the concept of trust is not standardized, it is agreed that it
can be a valuable tool to leverage decision-making processes. The concept and
implications of trust are embodied in trust models, which de ne the rules to
process trust in an automatic or semi-automatic way within a computational
setting. For the last twenty years, many models have been proposed, each one
targeting di erent contexts and purposes, and with their own particularities.</p>
      <p>One issue with trust models is that they are usually built on top of an existing
application in an ad-hoc manner in order to match the speci c needs of the
application and its environment, limiting the models' re-usability. Furthermore,
most models do not distinguish explicitly between trust and reputation, nor do
they provide guidelines to combine these notions to yield more solid results.</p>
      <p>We believe that this approach is not adequate and that developers should be
provided with some mechanisms to systematically incorporate trust and
reputation models into their services and applications.</p>
      <p>The rest of the paper is organized as follows. Section 2 describes the goals
that we are pursuing. In Section 3 we explain the research methodology that is
being followed and discuss the work that has been carried out up to now. Finally,
the conclusions and some lines for future research are presented in Section 4.
2</p>
    </sec>
    <sec id="sec-2">
      <title>Aims and Goals</title>
      <p>Our main goal is the speci cation, design and implementation of a development
framework that allows developers to implement trust- and reputation-aware
applications. The framework must expose an Application Programming Interface
(API) in order to make its functionalities accessible, and it must also provide
hot spots where trust models can be customized to t the application needs.</p>
      <p>An important sub-goal that is derived from the main expected contributions
is the provision of insight into trust and reputation. It is often the case that
these concepts are considered as being synonyms or are used interchangeably,
however they are quite di erent notions that need to be considered separately.
Building a development framework requires performing a domain analysis in the
framework targeted area, in this case, trust and reputation. Not only can this
domain analysis shed light on concepts such as trust or reputation, but also on
the trust models internal workings.</p>
      <p>The main expected contribution of this research to the eld of Engineering
Secure Software and Systems is two-fold: on the one hand, by providing
developers with a tool like a trust and reputation framework, we foster thinking over
trust and reputation requirements from the very beginning. On the other hand,
as applications are developed by using the framework, trust and reputation
models are naturally incorporated within the application itself, and not as patches
added after-the-fact, as it is the standard nowadays. Thus, trust models can use
all the information available to the application in a more e cient way.
3</p>
    </sec>
    <sec id="sec-3">
      <title>Research Methodology</title>
      <p>This section summarizes the research methodology that is being followed. It is
divided into six phases, each one further elaborated in its own section. For each
phase, we state whether it is completed or further work needs to be done, and
we also outline their main ndings and results.
3.1</p>
      <sec id="sec-3-1">
        <title>Phase 1: Literature Review</title>
        <p>
          Surveys, such as the one by J sang, Ismail and Boyd [
          <xref ref-type="bibr" rid="ref5">5</xref>
          ] or the one by Ruohomaa
and Kutvonen [
          <xref ref-type="bibr" rid="ref11">11</xref>
          ] are the best starting point to obtain a solid knowledge of the
work carried out in trust and reputation over a period of time, and they
constitute the main source for the next phase: the domain analysis. Other interesting
contributions include those that provide assistance to developers with creating
trust and reputation implementations. In this direction, we conducted research
on architectural styles [
          <xref ref-type="bibr" rid="ref12">12</xref>
          ], frameworks [
          <xref ref-type="bibr" rid="ref7">7</xref>
          ] [
          <xref ref-type="bibr" rid="ref2">2</xref>
          ] and middlewares [
          <xref ref-type="bibr" rid="ref6">6</xref>
          ] [
          <xref ref-type="bibr" rid="ref4">4</xref>
          ] where trust
and reputation are the core concept.
        </p>
        <p>Some drawn conclusions are that most works do not provide enough margin
of customization and lack of a framework-oriented approach. In addition, no
existing contributions di erentiate between the notions of trust and reputation,
as they tend to focus on just one of them, usually reputation.</p>
        <p>Even though this task was already nished, it is required to continuously
check out new interesting papers.
3.2</p>
      </sec>
      <sec id="sec-3-2">
        <title>Phase 2: Domain Analysis</title>
        <p>
          A domain analysis is of paramount importance when building a development
framework [
          <xref ref-type="bibr" rid="ref3">3</xref>
          ], and for this analysis to be complete, it may be required to look
up new literature that helps to ll some gaps that may have arisen.
        </p>
        <p>
          The main contribution is a conceptual framework that gathers and relates
the most important concepts in trust and reputation models. This framework is
represented in the form of UML diagrams, like the one depicted in Figure 1. As
explained in an earlier contribution [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], this conceptual framework also serves as
a comparison framework under which di erent trust and reputation models can
be compared.
        </p>
        <p>Trustee's
Objective
Properties
Trustee's
Subjective
Properties
Trustor's
Objective
Properties
Trustor's
Subjective
Properties
Context
1.*</p>
        <p>Role
Witness</p>
        <p>Trustor</p>
        <p>Trustee
Provider</p>
        <p>Trusted Third</p>
        <p>Party
Policy Model
Negotiation</p>
        <p>Model
Behaviour
Model
Reputation</p>
        <p>Model
Propagation</p>
        <p>Model
Provision</p>
        <p>Access</p>
        <p>Identiy</p>
        <p>Infrastructure plays
Trust Class 1.* instantiates</p>
        <p>Purpose
Factors</p>
        <p>Trust
influence</p>
        <p>Modeling</p>
        <p>Method
Mathematic</p>
        <p>Graphic</p>
        <p>Linguistic</p>
        <p>Entities
2.* 2</p>
        <p>Requester
computes has has relates Trust</p>
        <p>Trust Model establishes 1.* Relationship</p>
        <p>has TrusMtDoedceilsion
uses</p>
        <p>1.*
Assumptions</p>
        <p>Trust
Evaluation</p>
        <p>Model</p>
        <p>Fig. 1: Common Concepts for Trust Models</p>
        <p>
          Also, in our earlier work [
          <xref ref-type="bibr" rid="ref8">8</xref>
          ], we classi ed trust models into two types: decision
models, tightly related to the authorization problem, and evaluation models,
where the evaluation of trust according to several in uencing factors is the most
important consideration.
        </p>
        <p>Even though this phase is also completed, the analysis should be re ned as
new relevant papers arise.
3.3</p>
      </sec>
      <sec id="sec-3-3">
        <title>Phase 3: Requirements Elicitation</title>
        <p>
          The previous phase conducted an exhaustive analysis on trust and reputation.
This analysis assisted in determining the requirements that a trust and
reputation framework must ful l. Since accommodating all possible trust models in
a single framework may be a daunting task, we decided to focus on evaluation
models. A list of requirements can be found in an earlier work [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ].
        </p>
        <p>Even though this phase is nalized, some new requirements may arise as
a consequence of new relevant literature or due to the architecture and design
phases. One of our ndings is that evaluation models are centred around the
notion of trust metric. Trust metric uses a computation engine to yield a trust
or reputation value given a set of variables. The di erence between many
evaluation models stems from (i) the variables used in the computation and (ii) the
computation engine used to aggregate these variables into a simple value or a
tuple of values. Therefore, one of the most important requirements for a trust
and reputation framework is to allow developers to de ne their own metrics.
Time and uncertainty are two important factors as well, and developers should
be allowed to include them. The former may be used to consider freshness in
trust values, whereas the latter refers to how reliable a trust value is.
3.4</p>
      </sec>
      <sec id="sec-3-4">
        <title>Phase 4: Architecture</title>
        <p>
          This phase consists of sketching the high-level software structure that supports
the requirements elicited in the previous phase. A half-way technical and
conceptual architecture was discussed in earlier works [
          <xref ref-type="bibr" rid="ref10">10</xref>
          ] [
          <xref ref-type="bibr" rid="ref9">9</xref>
          ]. A recent work1 provides
greater insight into the technical details of a possible architecture, and even
guidelines are given for implementation of some of the components and their
communication mechanisms.
        </p>
        <p>At the architectural level, building a trust and reputation framework requires
planning in two fronts. On the one hand, we need to carefully design an easy
yet exible API that allows connecting any application to a trust server. On
the other hand, the framework must provide enough hot spots to support the
customization of the trust server behaviour at runtime in order to accommodate
new trust and reputation models.</p>
        <p>The type of application that we want to build by using the framework
determines the design of the aforementioned factors: API and hot spots. In this
1We cannot provide the reference as the work is currently under review.
sense, we think of two types of applications that follow two di erent architectural
styles: client-server applications and peer-to-peer applications.</p>
        <p>The rst one requires the developer to de ne the interactions between an
application server and a trust server, and the trust server holds information
about the whole system. In the second approach, each peer holds an instance of
the trust server, which holds only partial information about the whole system.</p>
        <p>The architecture proposed in our recent work1 was originally designed to
support the client-server approach, even though we think it can be tailored in
order to support the peer-to-peer architectural style.
3.5</p>
      </sec>
      <sec id="sec-3-5">
        <title>Phase 5: Design and Implementation</title>
        <p>This phase elaborates on the architecture in order to re ne the components into
sub-components and modules. Inner data structures are also detailed and the
database schemas and tables are fully speci ed. This re nement goes on until
the implementation of each module is made easy. This phase remains un nished.
3.6</p>
      </sec>
      <sec id="sec-3-6">
        <title>Phase 6: Validation</title>
        <p>
          The last phase consists of validating the framework implementation by
developing a trust-aware application in the scope of e-Health and/or SmartGrid, which
have been identi ed as the two main NESSoS2 scenarios [
          <xref ref-type="bibr" rid="ref1">1</xref>
          ].
        </p>
        <p>It is likely that we observe certain de ciencies and limitations of the
framework in a real application. Actually, any framework requires iterations in order
to be able to accommodate a wide range of applications. Therefore, the output of
this phase could help to improve the architecture and design of the framework.
4</p>
      </sec>
    </sec>
    <sec id="sec-4">
      <title>Conclusions and Future Work</title>
      <p>New Future Internet applications will need support from trust and reputation
services for their successful adoption. Yet these services have been laid aside and
are very often considered once an application is already deployed and running.
At that moment, adding trust and reputation features may be hard, and may
lead to poor and, above all, barely reusable solutions.</p>
      <p>We propose a trust framework that assists developers in the task of creating
services and applications that need trust and reputation models. Examples of
such applications are those proposed in the NESSoS project, and validation is
to be done in their scope.</p>
      <p>As future work, we are planning to research on how recon guration
mechanisms can leverage trust models during the service or application lifetime. The
trend in Software Engineering is towards adapting the software at runtime to
new requirements or new environmental conditions, changing the architecture
itself without the need for re-implementation. We would like to obtain insight
into how the trust framework could exploit advances in this direction in order
to support self-adapting trust models.</p>
    </sec>
  </body>
  <back>
    <ref-list>
      <ref id="ref1">
        <mixed-citation>
          <article-title>1. Selection and Documentation of the Two Major Application Case Studies</article-title>
          .
          <source>NESSoS Deliverable 11.2</source>
          ,
          <year>October 2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref2">
        <mixed-citation>
          2.
          <string-name>
            <given-names>Vinny</given-names>
            <surname>Cahill</surname>
          </string-name>
          , Elizabeth Gray,
          <string-name>
            <surname>Jean-Marc</surname>
            <given-names>Seigneur</given-names>
          </string-name>
          ,
          <string-name>
            <given-names>Christian D.</given-names>
            <surname>Jensen</surname>
          </string-name>
          , Yong Chen, Brian Shand, Nathan Dimmock, Andy Twigg, Jean Bacon, Colin English, Waleed Wagealla, Sotirios Terzis, Paddy Nixon, Giovanna di Marzo Serugendo, Ciaran Bryce, Marco Carbone, Karl Krukow, and
          <string-name>
            <given-names>Mogens</given-names>
            <surname>Nielsen</surname>
          </string-name>
          .
          <article-title>Using Trust for Secure Collaboration in Uncertain Environments</article-title>
          .
          <source>IEEE Pervasive Computing</source>
          ,
          <volume>2</volume>
          (
          <issue>3</issue>
          ):
          <volume>52</volume>
          {
          <fpage>61</fpage>
          ,
          <year>July 2003</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref3">
        <mixed-citation>
          3.
          <string-name>
            <surname>Mohamed</surname>
            <given-names>E.</given-names>
          </string-name>
          <string-name>
            <surname>Fayad</surname>
          </string-name>
          ,
          <string-name>
            <surname>Douglas C.Schmidt</surname>
          </string-name>
          , and Ralph E.Johnson. Building Application Frameworks:
          <article-title>Object-Oriented Foundations of Framework Design</article-title>
          . Wiley,
          <year>Septembre 1999</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref4">
        <mixed-citation>
          4.
          <string-name>
            <given-names>Chern</given-names>
            <surname>Har</surname>
          </string-name>
          <article-title>Yew. Architecture Supporting Computational Trust Formation</article-title>
          .
          <source>PhD thesis</source>
          , University of Western Ontario, London, Ontario,
          <year>2011</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref5">
        <mixed-citation>
          5.
          <string-name>
            <surname>Audun</surname>
            <given-names>J</given-names>
          </string-name>
          sang, Roslan Ismail, and
          <string-name>
            <given-names>Colin</given-names>
            <surname>Boyd</surname>
          </string-name>
          .
          <article-title>A survey of trust and reputation systems for online service provision</article-title>
          .
          <source>Decision Support Systems</source>
          ,
          <volume>43</volume>
          (
          <issue>2</issue>
          ):
          <volume>618</volume>
          {
          <fpage>644</fpage>
          ,
          <string-name>
            <surname>March</surname>
          </string-name>
          <year>2007</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref6">
        <mixed-citation>
          6.
          <string-name>
            <given-names>Rolf</given-names>
            <surname>Kiefhaber</surname>
          </string-name>
          , Florian Siefert, Gerrit Anders, Theo Ungerer, and
          <string-name>
            <given-names>Wolfgang</given-names>
            <surname>Reif</surname>
          </string-name>
          .
          <article-title>The Trust-Enabling Middleware: Introduction and Application</article-title>
          .
          <source>Technical Report 2011-10</source>
          , Universitatsbibliothek der Universitat Augsburg,
          <source>Universitatsstr. 22</source>
          ,
          <issue>86159</issue>
          <year>Augsburg</year>
          ,
          <year>2011</year>
          . http://opus.bibliothek.uniaugsburg.de/volltexte/2011/1733/.
        </mixed-citation>
      </ref>
      <ref id="ref7">
        <mixed-citation>
          7.
          <string-name>
            <surname>Adam</surname>
            <given-names>J.</given-names>
          </string-name>
          <string-name>
            <surname>Lee</surname>
            ,
            <given-names>Marianne</given-names>
          </string-name>
          <string-name>
            <surname>Winslett</surname>
            , and
            <given-names>Kenneth J. Perano.</given-names>
          </string-name>
          <article-title>TrustBuilder2: A Recon gurable Framework for Trust Negotiation</article-title>
          . In Elena Ferrari,
          <string-name>
            <given-names>Ninghui</given-names>
            <surname>Li</surname>
          </string-name>
          ,
          <string-name>
            <given-names>Elisa</given-names>
            <surname>Bertino</surname>
          </string-name>
          , and
          <string-name>
            <surname>Y A</surname>
          </string-name>
          ~
          <volume>14</volume>
          cel Karabulut, editors,
          <source>IFIPTM</source>
          , volume
          <volume>300</volume>
          <source>of IFIP Conference Proceedings</source>
          , pages
          <volume>176</volume>
          {
          <fpage>195</fpage>
          . Springer,
          <year>2009</year>
          .
        </mixed-citation>
      </ref>
      <ref id="ref8">
        <mixed-citation>
          8. Francisco Moyano, Carmen Fernandez-Gago, and
          <string-name>
            <given-names>Javier</given-names>
            <surname>Lopez</surname>
          </string-name>
          .
          <article-title>A conceptual framework for trust models</article-title>
          .
          <source>In Simone Fischer-Hubner</source>
          , Sokratis Katsikas, and Gerald Quirchmayr, editors,
          <source>9th International Conference on Trust, Privacy &amp; Security in Digital Business (TrustBus</source>
          <year>2012</year>
          ), volume
          <volume>7449</volume>
          of Lectures Notes in Computer Science, pages
          <volume>93</volume>
          {
          <fpage>104</fpage>
          , Vienna,
          <year>Sep 2012</year>
          2012. Springer Verlag, Springer Verlag.
        </mixed-citation>
      </ref>
      <ref id="ref9">
        <mixed-citation>
          9. Francisco Moyano, Carmen Fernandez-Gago, and
          <string-name>
            <given-names>Javier</given-names>
            <surname>Lopez</surname>
          </string-name>
          .
          <article-title>Implementing trust and reputation systems: A framework for developers' usage</article-title>
          . In International Workshop on Quantitative Aspects in Security Assurance, Pisa,
          <year>Sep 2012</year>
          2012.
        </mixed-citation>
      </ref>
      <ref id="ref10">
        <mixed-citation>
          10. Francisco Moyano, Carmen Fernandez-Gago, and
          <string-name>
            <given-names>Javier</given-names>
            <surname>Lopez</surname>
          </string-name>
          .
          <article-title>Building trust and reputation in: A development framework for trust models implementation</article-title>
          .
          <source>In 8th International Workshop on Security and Trust Management (STM</source>
          <year>2012</year>
          ), Pisa, In Press.
        </mixed-citation>
      </ref>
      <ref id="ref11">
        <mixed-citation>
          11.
          <string-name>
            <given-names>Sini</given-names>
            <surname>Ruohomaa</surname>
          </string-name>
          and
          <string-name>
            <given-names>Lea</given-names>
            <surname>Kutvonen</surname>
          </string-name>
          .
          <article-title>Trust management survey</article-title>
          .
          <source>In Proceedings of the Third international conference on Trust Management, iTrust'05</source>
          , pages
          <fpage>77</fpage>
          {
          <fpage>92</fpage>
          , Berlin, Heidelberg,
          <year>2005</year>
          . Springer-Verlag.
        </mixed-citation>
      </ref>
      <ref id="ref12">
        <mixed-citation>
          12.
          <string-name>
            <surname>Girish</surname>
            <given-names>Suryanarayana</given-names>
          </string-name>
          ,
          <string-name>
            <surname>Mamadou H. Diallo</surname>
          </string-name>
          ,
          <string-name>
            <surname>Justin R. Erenkrantz</surname>
            , and
            <given-names>Richard N.</given-names>
          </string-name>
          <string-name>
            <surname>Taylor</surname>
          </string-name>
          .
          <article-title>Architectural Support for Trust Models in Decentralized Applications</article-title>
          .
          <source>In Proceeding of the 28th international conference</source>
          , pages
          <volume>52</volume>
          {
          <fpage>61</fpage>
          , New York, New York, USA,
          <year>2006</year>
          . ACM Press.
        </mixed-citation>
      </ref>
    </ref-list>
  </back>
</article>