山东大学学报(理学版) ›› 2014, Vol. 49 ›› Issue (09): 103-108.doi: 10.6040/j.issn.1671-9352.2.2014.365
赵斌1,2, 何泾沙1,3, 张伊璇1, 翟鹏2, 刘公政1, 周世义3
ZHAO Bin1,2, HE Jing-sha1,3, ZHANG Yi-xuan1, ZHAI Peng2, LIU Gong-zheng1, ZHOU Shi-yi3
摘要: 信任模型是解决开放式网络环境中信任问题的有效方式,信任度量是可信管理中亟待解决的关键问题。根据信任模型设计原则,针对信任计算中动态适应能力和信任有效聚合不足等问题,在提出的信任计算模型中引入奖惩因子、推荐实体的评价可信度和平衡权重等多影响因子来提高信任的可靠程度和精度,并给出了各影响因子的设计。最后,通过Matlab软件仿真实现了奖惩函数和平衡权重的选取分析。仿真实验结果表明,该信任计算模型有较好的聚合速度。
中图分类号:
[1] GRIFFIN J, JAEGER T, PEREZ R. Trusted virtual domains: toward secure distributed services[C]//Proceedings of the 1st Workshop on Hot Topics in Systems Dependability. Yokohama: IEEE Press, 2005: 1-6. [2] FENG Fujun, CHUANG Lin, PENG Dongsheng, et al. A trust and context based access control model for distributed systems[C]//Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications(HPCC'08).Washington: IEEE Computer Society, 2008: 629-634. [3] HAN Guangjie, JIANG Jinfang, SHU Lei, et al. Management and applications of trust in wireless sensor networks: a survey[J]. Journal of Computer and System Sciences, 2014, 80(3): 602-617. [4] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 1996: 164-173. [5] KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The EigenTrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International World Wide Web Conference(WWW'03).New York: ACM Press, 2003: 640-651. [6] ZHOU Runfang, HWANG K. Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473. [7] SABATER J, SIERRA C. REGRET:a reputation model for gregarious societies[C]//Proceedings of the 4th International Workshop on Deception.Bologna:[s.n.], 2001: 61-69. [8] SONG Shanshan, HWANG K, ZHOU Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005, 9(6): 24-34. [9] 陈佩剑,杨岳湘,唐川.基于信任度量机制的分布式入侵检测系统[J].山东大学学报:理学版,2011, 46(9):77-80. CHEN Peijian, YANG Yuexiang, TANG Chuan. Honesty-rate measuring based distributed intrusion detection system[J]. Journal of Shandong University: Natural Science, 2011, 46(9): 77-80. [10] 陈珊珊.P2P网络中基于权重因素的信任模型[J].计算机应用,2013, 33(6):1612-1614. CHEN Shanshan. Trust model based on weight factor in P2P network[J]. Journal of Computer Applications, 2013, 33(6): 1612-1614. [11] 梁洪泉,吴巍.基于动态贝叶斯网络的可信度量模型研究[J].通信学报,2013, 34(9):70-78. LIANG Hongquan, WU Wei. Research of trust evaluation model based on dynamic Bayesian network[J]. Journal on Communications, 2013, 34(9): 70-78. [12] MA Shunan, HE Jingsha, SHUAI Xunbo. An access control method based on scenario trust[J]. International Journal of Computational Intelligence Systems, 2012, 5(5): 942-952. [13] SCHLOSSER M T, CONDIE T E, KAMVAR S D. Simulating a file sharing P2P network[C]//Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing Budapest. Hungary: [s.n.], 2003: 69-80. |
[1] | 蒋伟进, 许宇晖, 郭宏, 许宇胜. 基于多智能体的多维证据动态信任计算模型[J]. 山东大学学报(理学版), 2015, 50(01): 1-11. |
[2] | 黄亮,杜永萍. 基于信任关系的潜在好友推荐方法[J]. J4, 2013, 48(11): 73-79. |
|