Visible to the public "An Artificial Intelligence-Based Trust Model for Pervasive Computing"Conflict Detection Enabled

Title"An Artificial Intelligence-Based Trust Model for Pervasive Computing"
Publication TypeConference Paper
Year of Publication2015
AuthorsG. DAngelo, S. Rampone, F. Palmieri
Conference Name2015 10th International Conference on P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC)
Date PublishedNov
PublisherIEEE
ISBN Number 978-1-4673-9473-4
Accession Number15836571
KeywordsApriori algorithm, artificial intelligence, artificial intelligence-based trust model, Bayes methods, behavioral patterns, Classification algorithms, Computational modeling, computational services distribution, computers arena, data mining, decision making, effective trust model, human-like decision making, Itemsets, naïve Bayes classifier, network interactions, pattern classification, Pervasive computing, pubcrawl170105, security, trust model, Trusted Computing, ubiquitous computing, ubiquitous computing scenarios, user trustworthiness
Abstract

Pervasive Computing is one of the latest and more advanced paradigms currently available in the computers arena. Its ability to provide the distribution of computational services within environments where people live, work or socialize leads to make issues such as privacy, trust and identity more challenging compared to traditional computing environments. In this work we review these general issues and propose a Pervasive Computing architecture based on a simple but effective trust model that is better able to cope with them. The proposed architecture combines some Artificial Intelligence techniques to achieve close resemblance with human-like decision making. Accordingly, Apriori algorithm is first used in order to extract the behavioral patterns adopted from the users during their network interactions. Naive Bayes classifier is then used for final decision making expressed in term of probability of user trustworthiness. To validate our approach we applied it to some typical ubiquitous computing scenarios. The obtained results demonstrated the usefulness of such approach and the competitiveness against other existing ones.

URLhttp://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7424653&isnumber=7424499
DOI10.1109/3PGCIC.2015.94
Citation Key7424653