1 / 12

Trust Based Risk Management for Distributed System Security - A New Approach

Trust Based Risk Management for Distributed System Security - A New Approach. Presented By Rajat Kadia. Introducing the Risk Management Issue in security

flynn
Download Presentation

Trust Based Risk Management for Distributed System Security - A New Approach

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. Trust Based Risk Management for Distributed System Security - A New Approach Presented By RajatKadia

  2. Introducing the Risk Management Issue in security Trust Enhanced Security Model for Risk Management Experimental Evaluation of the Model Conclusion

  3. Trust Enhanced Security Model With Risk Management Integration for System Utility • Overview of model : It consist of four blocks 1) Trust model 2) Authorization 3) Interaction 4) Utility

  4. Trust Enhanced Authorization with Risk Management Consideration for UtilityMaximization

  5. Trust model • The trust model manages the trust information in the system and makes trust decisions with risk management consideration δ : T × E → T (1) decision : (t > tth) → {0, 1} (2)

  6. Authorization with Risk Management Integration The authorization block performs the standard authorization process with risk consideration Auth : A × R × T × tth → P (3)

  7. Interaction The interaction component manages the mapping between behavioral evidences and the resulting updated trust value.

  8. Utility The utility block is used to calculate the system utility at the end of each interaction utility : E × F → U (4)

  9. Experimental Studies and Result Analysis Utility without Risk based Trust Management for Various Malicious Behaviors Distributions - 0% to 100% Security Violations

  10. Utility with Risk based Trust Management for Various Malicious Behaviors Distributions - 0% to 100% Security Violations Experimental Studies and Result Analysis

  11. Conclusion • This new approach has introduced a way for linking security system with risk management to achieve economical benefits through utility maximization. It also provided a qualitative approach for risk and security integration via trust

  12. Thank You

More Related