Ontology’s in Trust Negotiation Systems: Facts, Challenges, and Solutions based on Privacy on the Web
ECE Department, Sahrdaya College of Engineering and Technology, Kodakara, Thrissur (DT), Kerala.
The increasing use of Internet in a variety of distributed multiparty interactions and transactions with strong real-time requirements has pushed the search for solutions to the problem of attribute-based digital interactions. A promising solution today is represented by automated trust negotiation systems. Trust negotiation systems allow subjects in different security domains to securely Exchange protected resources and services. These trust negotiation systems, however, by their nature, may represent a threat to privacy in that credentials, exchanged during discussions, often contain sensitive personal information that may need to be selectively released. In this paper, we address the problem of preserving privacy in trust negotiations. We introduce the idea of privacy preserving disclosure, that is, a set that does not include attributes or identification, or combinations of these that may compromise privacy. To obtain privacy preserving disclosure sets, we propose two techniques based on the notions of substitution and generalization. We argue that formulating the trust negotiation requirements in terms of disclosure policies is often restrictive. To solve this problem, we show how trust negotiation requirements can be expressed as property-based policies that list the properties needed to obtain a given resource. To better address this issue, we introduce the notion of reference ontology, and formalize the notion of trust requirement. Additionally, we develop an approach to derive disclosure policies from trust requirements and formally state some semantics relationships (i.e., equivalence, stronger than) that may hold between policies. These relationships can be used by a credential requestor to reason about which disclosure policies he/she should use in a trust negotiation. In this project contains five modules. They are (1) Adding new employees and admin control, (2) Domain creation & verification, (3) Database management, (4) Privilege settings and (5) Web service actions.
Keywords: XML, Role-based access control, Trust management, Web services.
Back to TOC