JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 103-108.doi: 10.6040/j.issn.1671-9352.2.2014.365

Previous Articles     Next Articles

Analysis of multi-factor in trust evaluation of open network

ZHAO Bin1,2, HE Jing-sha1,3, ZHANG Yi-xuan1, ZHAI Peng2, LIU Gong-zheng1, ZHOU Shi-yi3   

  1. 1. School of Software Engineering, Beijing University of Technology, Beijing 100124, China;
    2. Department of Computer Science, Jining University, Qufu 273155, Shangdong, China;
    3. Information Technology Department, Beijing Development Area Co., Ltd, Beijing 100176, China
  • Received:2014-06-15 Revised:2014-08-27 Online:2014-09-20 Published:2014-09-30

Abstract: Trust model is an effective way of resolving trust problems in open networks in which trust evaluation is a key issue to be addressed in trust management. According to the design rules of trust models, the problems of lacking dynamic adaptability in trust evaluation and the lack of effective methods for the aggregation of trust, the multiple factors that include the bonus-penalty factor, evaluation reliability of the recommending entities and balanced weight were introduced into trust evaluation to improve the realiblity and accuracy of trust. The design of the bonus-penalty function was also presented. Finally, the balanced weight factor and an analysis was carried out through the Matlab software.The experimental results show that the proposed trust model can achieve a better aggregation speed.

Key words: Multi-factor, simulation analysis, open network, trust evaluation

CLC Number: 

  • TP393
[1] GRIFFIN J, JAEGER T, PEREZ R. Trusted virtual domains: toward secure distributed services[C]//Proceedings of the 1st Workshop on Hot Topics in Systems Dependability. Yokohama: IEEE Press, 2005: 1-6.
[2] FENG Fujun, CHUANG Lin, PENG Dongsheng, et al. A trust and context based access control model for distributed systems[C]//Proceedings of the 10th IEEE International Conference on High Performance Computing and Communications(HPCC'08).Washington: IEEE Computer Society, 2008: 629-634.
[3] HAN Guangjie, JIANG Jinfang, SHU Lei, et al. Management and applications of trust in wireless sensor networks: a survey[J]. Journal of Computer and System Sciences, 2014, 80(3): 602-617.
[4] BLAZE M, FEIGENBAUM J, LACY J. Decentralized trust management[C]//Proceedings of the IEEE Symposium on Security and Privacy. Washington: IEEE Computer Society, 1996: 164-173.
[5] KAMVAR S D, SCHLOSSER M T, GARCIA-MOLINA H. The EigenTrust algorithm for reputation management in P2P networks[C]//Proceedings of the 12th International World Wide Web Conference(WWW'03).New York: ACM Press, 2003: 640-651.
[6] ZHOU Runfang, HWANG K. Powertrust: a robust and scalable reputation system for trusted peer-to-peer computing[J]. IEEE Transactions on Parallel and Distributed Systems, 2007, 18(4): 460-473.
[7] SABATER J, SIERRA C. REGRET:a reputation model for gregarious societies[C]//Proceedings of the 4th International Workshop on Deception.Bologna:[s.n.], 2001: 61-69.
[8] SONG Shanshan, HWANG K, ZHOU Runfang, et al. Trusted P2P transactions with fuzzy reputation aggregation[J]. IEEE Internet Computing, 2005, 9(6): 24-34.
[9] 陈佩剑,杨岳湘,唐川.基于信任度量机制的分布式入侵检测系统[J].山东大学学报:理学版,2011, 46(9):77-80. CHEN Peijian, YANG Yuexiang, TANG Chuan. Honesty-rate measuring based distributed intrusion detection system[J]. Journal of Shandong University: Natural Science, 2011, 46(9): 77-80.
[10] 陈珊珊.P2P网络中基于权重因素的信任模型[J].计算机应用,2013, 33(6):1612-1614. CHEN Shanshan. Trust model based on weight factor in P2P network[J]. Journal of Computer Applications, 2013, 33(6): 1612-1614.
[11] 梁洪泉,吴巍.基于动态贝叶斯网络的可信度量模型研究[J].通信学报,2013, 34(9):70-78. LIANG Hongquan, WU Wei. Research of trust evaluation model based on dynamic Bayesian network[J]. Journal on Communications, 2013, 34(9): 70-78.
[12] MA Shunan, HE Jingsha, SHUAI Xunbo. An access control method based on scenario trust[J]. International Journal of Computational Intelligence Systems, 2012, 5(5): 942-952.
[13] SCHLOSSER M T, CONDIE T E, KAMVAR S D. Simulating a file sharing P2P network[C]//Proceedings of the 1st Workshop on Semantics in P2P and Grid Computing Budapest. Hungary: [s.n.], 2003: 69-80.
[1] ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90.
[2] LUO hai-yan, LÜ Ping, LIU Lin-zhong, YANG Xun. Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(08): 111-117.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!