| Literature DB >> 29649267 |
Farhana Jabeen1, Zara Hamid1, Wadood Abdul2, Sanaa Ghouzali3, Abid Khan1, Saif Ur Rehman Malik1, Mansoor Shaukat Khan4, Sarfraz Nawaz5.
Abstract
In health sector, trust is considered important because it indirectly influences the quality of health care through patient satisfaction, adherence and the continuity of its relationship with health care professionals and the promotion of accurate and timely diagnoses. One of the important requirements of TRSs in the health sector is rating secrecy, which mandates that the identification information about the service consumer should be kept secret to prevent any privacy violation. Anonymity and trust are two imperative objectives, and no significant explicit efforts have been made to achieve both of them at the same time. In this paper, we present a framework for solving the problem of reconciling trust with anonymity in the health sector. Our solution comprises Anonymous Reputation Management (ARM) protocol and Context-aware Trustworthiness Assessment (CTA) protocol. ARM protocol ensures that only those service consumers who received a service from a specific service provider provide a recommendation score anonymously with in the specified time limit. The CTA protocol computes the reputation of a user as a service provider and as a recommender. To determine the correctness of the proposed ARM protocol, formal modelling and verification are performed using High Level Petri Nets (HLPN) and Z3 Solver. Our simulation results verify the accuracy of the proposed context-aware trust assessment scheme.Entities:
Mesh:
Year: 2018 PMID: 29649267 PMCID: PMC5896921 DOI: 10.1371/journal.pone.0195021
Source DB: PubMed Journal: PLoS One ISSN: 1932-6203 Impact factor: 3.240
Fig 1Algorithm 1: Generation of GID.
Fig 2Algorithm 2: Generation of LID.
Fig 3Algorithm 3: Generation of Ticket.
Fig 4Algorithm 1: Generation of GID (Petrinet).
GID generation mappings.
| Places | Mappings |
|---|---|
| φ (Inputs) | |
| φ (Private Key Store) | |
| φ (Global ID Store) | ℙ (GID) |
Fig 5Algorithm 2: Generation of LID (Petrinet).
LID generation mappings.
| Places | Mappings |
|---|---|
| φ (Inputs) | ℙ ( |
| φ (Symmetric Key Store) | ℙ (SKHSP) |
| φ (GID Store) | ℙ (GID) |
| φ (LID Store) | ℙ (LID) |
Fig 6Algorithm 3: Generation of ticket (petrinet).
Ticket generation mappings.
| Places | Mappings |
|---|---|
| φ (Inputs) | ℙ (GIDj× ContextID |
| φ (TicketStore) | ℙ (Ticket) |
Fig 7Execution time taken by the Z3 solver to verify the properties.
Fig 8Impact of bad mouthing attack on the accuracy of reputation score when attack is done in t.
Fig 9Filtering accuracy in terms of MCC (bad mouthing attack done in t).
Fig 10Impact of ballot-stuffing attack on the accuracy of reputation score when attack is done in t.
Fig 11Filtering accuracy in terms of MCC (ballot-stuffing attack done in t).