Skip to main content

Abstract

In this chapter we demonstrate how to increase the value of shared information by providing context on its quality via trust metrics. In order to evaluate the achieved level of trust, a trust evaluation system is described. This system assesses the quality of information based on past behaviour, direct experience, recommendation, referral, and roles. This management process filters and prioritises information provided by Semantic Room (SR) members while dynamically adjusting the trust level of members.

Sharing of sensitive information in a commons requires that precautions be taken to safeguard the interest of members and to uphold codes of privacy. In the case of financial institutions, the requisites for security and privacy place demands on the CoMiFin platform that are satisfied using advanced modelling techniques, rigorous data analysis, and information management.

To this end, in this chapter we present a distributed SR architecture which is capable of correlating events coming from SR members while preserving the privacy of sensitive data items. The SR consists of SR Gateways deployed at each financial institution and a set of private clouds forming the SR collaborative processing system (CSP). SR Gateways perform data pre-processing and anonymize data items, as prescribed by the SR contract, using the Shamir secret sharing scheme. Anonymous data are sent to the CPS, which aggregates information through MapReduce-based computations. The anonymous data resulting from the collaborative computation are revealed to the SR members only if suspicious activities are detected. We show how this SR can be leveraged for detecting Man-in-the-Browser attacks.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 84.99
Price excludes VAT (USA)
  • Available as EPUB and PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 109.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info
Hardcover Book
USD 109.99
Price excludes VAT (USA)
  • Durable hardcover edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Notes

  1. 1.

    Suspicious activities have different meanings according to the legislation of different countries.

References

  1. Lodi, G., Querzoni, L., Baldoni, R., Marchetti, M., Colajanni, M., Bortnikov, V., Chockler, G., Dekel, E., Laventman, G., Roytman, A.: Defending financial infrastructures through early warning systems: the intelligence cloud approach. In: Proc. 5th Annual Workshop on Cyber Security and Information Intelligence Research, Knoxville, TN, USA (2009)

    Google Scholar 

  2. McGibney, J., Botvich, D.: A trust overlay architecture and protocol for enhanced protection against spam. In: Proc. 2nd Int. Conf. on Availability, Reliability, and Security (ARES), Vienna, pp. 749–756 (2007)

    Chapter  Google Scholar 

  3. CoMiFin (Communication Middleware for Monitoring Financial Critical Infrastructures). http://www.comifin.eu

  4. Drools, http://www.jboss.org/drools

  5. Huynh, T., Jennings, N., Shadbolt, N.: An integrated trust and reputation model for open multi-agent systems. J. Autonom. Agents Multi-Agent Syst. 13(2), 119–154 (2006)

    Article  Google Scholar 

  6. Xiong, L., Liu, L.: PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities. IEEE Trans. Knowl. Data Eng. 16(7), 843–857 (2004)

    Article  Google Scholar 

  7. Singh, M.P.: Trustworthy service composition: Challenges and research questions. In: Proc. of the Autonomous Agents and Multi-Agent Systems, Workshop on Deception, Fraud and Trust in Agent Societies, pp. 117–135 (2002)

    Google Scholar 

  8. Malik, Z., Bouguettaya, A.: RATEWeb: reputation assessment for trust establishment among web services. VLDB J. 18(4), 885–911 (2009)

    Article  Google Scholar 

  9. Reiley, D., Bryan, D., Prasad, N., Reeves, D.: Pennies from Ebay: the determinants of price in online auctions. J. Ind. Econ. 55(2), 223–233 (2007)

    Article  Google Scholar 

  10. Blaze, M., Feigenbaum, J., Keromytis, A.: KeyNote: trust management for public-key infrastructures. In: Security Protocols Int. Workshop, Cambridge, England, pp. 56–63 (1998)

    Google Scholar 

  11. Sabater, J.: Trust and reputation for agent societies. Departament d’Informàtica, Universitat Autònoma de Barcelona (UAB), Ph.D. Thesis (2002)

    Google Scholar 

  12. Cate, F., Staten, M., Ivanov, G.: The value of information sharing. In: Protecting Privacy in the New Millennium Series, Council of Better Business Bureau (2000)

    Google Scholar 

  13. Luckham, D.: The Power of Events: An Introduction to Complex Event Processing in Distributed Enterprise Systems. Addison-Wesley, Reading (2002)

    Google Scholar 

  14. Hive. http://wiki.apache.org/hadoop/Hive (2011)

  15. Shamir, A.: How to share a secret. Commun. ACM 22, 612–613 (1979)

    Article  MATH  MathSciNet  Google Scholar 

  16. Jaql. http://www.jaql.org/ (2011)

  17. Burkhart, M., Strasser, M., Many, D., Dimitropoulos, X.: SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In: USENIX Security Symposium, USENIX (2010)

    Google Scholar 

  18. Bogdanov, D., Laur, S., Willemson, J.: Sharemind: a framework for fast privacy-preserving computations. In: Proc. of the 13th European Symposium on Research in Computer Security: Computer Security, ESORICS ’08, pp. 192–206. Springer, Berlin (2008)

    Google Scholar 

  19. Jeffrey, D., Ghemawat, S.: MapReduce: simplified data processing on large clusters. Commun. ACM 51(1), 107–113 (2008)

    Article  Google Scholar 

  20. Hadoop. http://hadoop.apache.org/ (2011)

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Barry P. Mulcahy .

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2012 Springer-Verlag Berlin Heidelberg

About this chapter

Cite this chapter

Esteves Verssimo, P. et al. (2012). Trust and Privacy. In: Baldoni, R., Chockler, G. (eds) Collaborative Financial Infrastructure Protection. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-20420-3_6

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-20420-3_6

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-20419-7

  • Online ISBN: 978-3-642-20420-3

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics