An efficient trust negotiation strategy towards the resource-limited mobile commerce environment
Bailing LIU1,Yanhui LI1,Bing ZENG2,*(),Chao LEI1
1. School of Information Management, Central China Normal University, Wuhan 430079, China 2. School of Software Engineering, South China University of Technology, Guangzhou 510006, China
Automated trust negotiation (ATN) offers an attractive means for trust establishments, which establishes mutual trust among strangers wishing to share resources or conduct business, but it comes at the cost of non-trivial computation and communication overheads. The deployment of ATN strategies on a resource-constrained mobile device may lead to user-obstructive latency for operations. In this paper, we propose a trust negotiation strategy called trust target Petri nets negotiation strategy (TPNNS). It highly reduces the negotiation latency in the mobile device compared with other negotiation strategies, since it considers all the alternative responses at each step and chooses the best one. TPNNS supports cycle avoidance and employs skipped TPN which is a new approach presented in this paper. What is more, it is complete and ensures no irrelevant credentials are disclosed during the trust negotiation.
Chong A Y L, Chan F T S, Ooi K B. Predicting consumer decisions to adopt mobile commerce: cross country empirical examination between china and malaysia. Decision Support Systems, 2012, 53(1): 34–43
2
Hoffman D L, Novak T P, Peralta M. Building consumer trust online. Communications of the ACM, 1999, 42(4): 80–85
3
Hu R B, Yang D L, Qi R H. Recommended trust evaluation model in mobile commerce based on combination evaluation mode. Operations Research and Management Science, 2010
4
Turban E, King D, King D, Lee J K, Marshall P, Lee J, McKay J. Electronic Commerce 2008: A Managerial Perspective. Englewood Cliffs, NJ: Prentice Hall, 2007
5
Siau K, Shen Z. Building customer trust in mobile commerce. Communications of the ACM, 2003, 46(4): 91–94
6
Luo X, Li H, Zhang J, Shim J P. Examining multi-dimensional trust and multi-faceted risk in initial acceptance of emerging technologies: an empirical study of mobile banking services. Decision Support Systems, 2010, 49(2): 222–234
7
Siau K, Sheng H, Nah F, Davis S. A qualitative investigation on consumer trust in mobile commerce. International Journal of Electronic Business, 2004, 2(3): 283–300
8
Winsborough W H, Seamons K E, Jones V E. Automated trust negotiation. In: Proceedings of DARPA Information Survivability Conference and Exposition. 2000, 88–102
9
Winsborough W H, Li N. Towards practical automated trust negotiation. In: Proceedings of the 3rd IEEE International Workshop on Policies for Distributed Systems and Networks. 2002, 92–103
10
Kim H W, Chan H C,Gupta S. Value-based adoption of mobile internet: an empirical investigation. Decision Support Systems, 2007, 43(1): 111–126
11
Magura B. What hooks m-commerce customers? MIT Sloan Management Review, 2003, 44(3): 9
12
Mahatanankoon P, Wen H J, Lim B. Consumer-based m-commerce: exploring consumer perception of mobile applications. Computer Standards and Interfaces, 2005, 27(4): 347–357
13
Winslett M, Lee A J, Perano K J. Trust negotiation: authorization for virtual organizations. In: Proceedings of the 5th ACM Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies. 2009, 43
14
Yu T, Ma X, Winslett M. Prunes: an efficient and complete strategy for automated trust negotiation over the Internet. In: Proceedings of the 7th ACM Conference on Computer and Communications Security. 2000, 210–219
15
He Y, Zhu M. A complete and efficient strategy based on Petri net in automated trust negotiation. In: Proceedings of the 2nd International Conference on Scalable Information Systems. 2007, 75
16
Yu T, Winslett M, Seamons K E. Interoperable strategies in automated trust negotiation. In: Proceedings of the 8th ACM Conference on Computer and Communications Security. 2001, 146–155
17
Liu X, Tang S, Huang Q, Yu Z W. An ontology-based approach to automated trust negotiation. Computer Standards and Interfaces, 2013, 36(1): 219–230
18
Lu H, Liu B. DFANS: a highly efficient strategy for automated trust negotiation. Computers and Security, 2009, 28(7): 557–565
19
Li N, Du W, Boneh D. Oblivious signature-based envelope. Distributed Computing, 2005, 17(4): 293–302