您的位置:山东大学 -> 科技期刊社 -> 《山东大学学报(理学版)》

山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (09): 103-108.doi: 10.6040/j.issn.1671-9352.2.2014.365

• 论文 • 上一篇    下一篇

开放式网络信任计算中多影响因子的分析

赵斌1,2, 何泾沙1,3, 张伊璇1, 翟鹏2, 刘公政1, 周世义3   

  1. 1. 北京工业大学软件学院, 北京 100124;
    2. 济宁学院计算机科学系, 山东 曲阜 273155;
    3. 北京经开投资开发股份有限公司信息技术部, 北京 100176
  • 收稿日期:2014-06-15 修回日期:2014-08-27 出版日期:2014-09-20 发布日期:2014-09-30
  • 通讯作者: 何泾沙(1961-),男,教授,博士,研究方向为计算机网络与安全、云计算和数字取证.E-mail:jhe@bjut.edu.cn E-mail:jhe@bjut.edu.cn
  • 作者简介:赵斌(1979-),男,讲师,博士研究生,研究方向为计算机网络与安全、云计算和数字取证.E-mail:jnzhaobin@163.com
  • 基金资助:
    国家自然科学基金资助项目(61272500);北京市自然科学基金资助项目(4142008);北京市委、市政府重点工作及区县政府应急项目(z131100005613030);山东省自然科学基金资助项目(ZR2013FQ024);山东省科学技术发展计划项目(2012RKA08002,2013RKA08007);山东省高校科技计划项目(J12LN70,J14LN80)

Analysis of multi-factor in trust evaluation of open network

ZHAO Bin1,2, HE Jing-sha1,3, ZHANG Yi-xuan1, ZHAI Peng2, LIU Gong-zheng1, ZHOU Shi-yi3   

  1. 1. School of Software Engineering, Beijing University of Technology, Beijing 100124, China;
    2. Department of Computer Science, Jining University, Qufu 273155, Shangdong, China;
    3. Information Technology Department, Beijing Development Area Co., Ltd, Beijing 100176, China
  • Received:2014-06-15 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

摘要: 信任模型是解决开放式网络环境中信任问题的有效方式,信任度量是可信管理中亟待解决的关键问题。根据信任模型设计原则,针对信任计算中动态适应能力和信任有效聚合不足等问题,在提出的信任计算模型中引入奖惩因子、推荐实体的评价可信度和平衡权重等多影响因子来提高信任的可靠程度和精度,并给出了各影响因子的设计。最后,通过Matlab软件仿真实现了奖惩函数和平衡权重的选取分析。仿真实验结果表明,该信任计算模型有较好的聚合速度。

关键词: 影响因子, 开放式网络, 信任计算, 仿真分析

Abstract: Trust model is an effective way of resolving trust problems in open networks in which trust evaluation is a key issue to be addressed in trust management. According to the design rules of trust models, the problems of lacking dynamic adaptability in trust evaluation and the lack of effective methods for the aggregation of trust, the multiple factors that include the bonus-penalty factor, evaluation reliability of the recommending entities and balanced weight were introduced into trust evaluation to improve the realiblity and accuracy of trust. The design of the bonus-penalty function was also presented. Finally, the balanced weight factor and an analysis was carried out through the Matlab software.The experimental results show that the proposed trust model can achieve a better aggregation speed.

Key words: Multi-factor, simulation analysis, open network, trust evaluation

中图分类号: 

  • TP393
[1] GRIFFIN J, JAEGER T, PEREZ R. Trusted virtual domains: toward secure distributed services[C]//Proceedings of the 1st Workshop on Hot Topics in Systems Dependability. Yokohama: IEEE Press, 2005: 1-6.
[2] FENG Fujun, CHUANG Lin, PENG Dongsheng, et al. A trust and context based access control model for distributed systems[C]//Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications(HPCC'08).Washington: IEEE Computer Society, 2008: 629-634.
[3] HAN Guangjie, JIANG Jinfang, SHU Lei, et al. Management and applications of trust in wireless sensor networks: a survey[J]. Journal of Computer and System Sciences, 2014, 80(3): 602-617.
[4] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 1996: 164-173.
[5] KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The EigenTrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International World Wide Web Conference(WWW'03).New York: ACM Press, 2003: 640-651.
[6] ZHOU Runfang, HWANG K. Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473.
[7] SABATER J, SIERRA C. REGRET:a reputation model for gregarious societies[C]//Proceedings of the 4th International Workshop on Deception.Bologna:[s.n.], 2001: 61-69.
[8] SONG Shanshan, HWANG K, ZHOU Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005, 9(6): 24-34.
[9] 陈佩剑,杨岳湘,唐川.基于信任度量机制的分布式入侵检测系统[J].山东大学学报:理学版,2011, 46(9):77-80. CHEN Peijian, YANG Yuexiang, TANG Chuan. Honesty-rate measuring based distributed intrusion detection system[J]. Journal of Shandong University: Natural Science, 2011, 46(9): 77-80.
[10] 陈珊珊.P2P网络中基于权重因素的信任模型[J].计算机应用,2013, 33(6):1612-1614. CHEN Shanshan. Trust model based on weight factor in P2P network[J]. Journal of Computer Applications, 2013, 33(6): 1612-1614.
[11] 梁洪泉,吴巍.基于动态贝叶斯网络的可信度量模型研究[J].通信学报,2013, 34(9):70-78. LIANG Hongquan, WU Wei. Research of trust evaluation model based on dynamic Bayesian network[J]. Journal on Communications, 2013, 34(9): 70-78.
[12] MA Shunan, HE Jingsha, SHUAI Xunbo. An access control method based on scenario trust[J]. International Journal of Computational Intelligence Systems, 2012, 5(5): 942-952.
[13] SCHLOSSER M T, CONDIE T E, KAMVAR S D. Simulating a file sharing P2P network[C]//Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing Budapest. Hungary: [s.n.], 2003: 69-80.
[1] 蒋伟进, 许宇晖, 郭宏, 许宇胜. 基于多智能体的多维证据动态信任计算模型[J]. 山东大学学报(理学版), 2015, 50(01): 1-11.
[2] 黄亮,杜永萍. 基于信任关系的潜在好友推荐方法[J]. J4, 2013, 48(11): 73-79.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!