JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2019, Vol. 54 ›› Issue (1): 53-59.doi: 10.6040/j.issn.1671-9352.3.2018.007

• High-end forum • Previous Articles     Next Articles

A user behavior trust evaluation combined with sliding window and recommended trust

Ze-nan WU1(),Li-qin TIAN1,2,*(),Zhi-gang WANG1   

  1. 1. School of Computer Science and Technology, Qinghai Normal University, Xining 810008, Qinghai, China
    2. School of Computer Science, North China Institute of Science and Technology, Beijing 101601, China
  • Received:2018-06-26 Online:2019-01-20 Published:2019-01-23
  • Contact: Li-qin TIAN E-mail:18511465255@163.com;tianliqin@ncist.edu.cn
  • Supported by:
    国家自然科学基金资助项目(61472137);国家重点研发计划资助项目(2017YFC0804108);青海省重点实验室、重点研发项目(2017-ZJ-752);青海省重点实验室、重点研发项目(2017-ZJ-Y21);青海省重点实验室、重点研发项目(2016-SF-130);河北省物联网监控工程技术研究中心项目(3142016020)

Abstract:

A new evaluation method of user behavior trust by adopting social characteristics of trust and computer requirements for assessment is proposed. This method improves the sliding window, and makes reasonable calculation of user behavior evidence through the initial setting of the sliding window, the size of the window, the interval of the sliding and the update of the window content, so as to improve the scalability of the user behavior evaluation. Meanwhile, combined with the recommended trust mechanism to further enhance the credibility of user behavior assessment. Finally, the trust value of the user behavior obtained is compared with the default trust evaluation standard of the system to obtain the user trust level. Finally, through the experimental data analysis, the evaluation method has the characteristics of finer granularity, the evaluation object is the user rather than the service provider, and the evaluation result is more in line with the actual situation.

Key words: sliding window, recommendation trust, user behavior trust assessment, credibility and scalability

CLC Number: 

  • TP309

Fig.1

Sliding window model"

Table 1

Trust rank list"

[0, 0.2] [0.2, 0.4] [0.4, 0.6] [0.6, 0.8] [0.8, 1.0]
U_danger U_strange U_suspicious U_ordinary U_credible

Fig.2

Multipath recommendation trust model"

Table 2

Value change of user trust"

项目 信任值
初始 1周 2周 3周 1个月
有时间衰减 0.89 0.52 0.45 0.39 0.28
无时间衰减 0.89 0.89 0.89 0.89 0.89

Table 3

Trust value "slow rise" control data analysis"

交互次数 信任值
无滑动窗口设置 有滑动窗口最小次数设置 滑动窗口+推荐信任算法
1 0.30 0.30 0.30
2 0.65 0.41 0.35
3 0.79 0.52 0.42
4 0.81 0.63 0.51
5 0.95 0.71 0.58
1 张仕斌, 许春香. 基于云模型的信任评估方法[J]. 计算机学报, 2013, 36 (2): 422- 430.
ZHANG Shibin , XU Chunxiang . Credit assessment method based on cloud model[J]. Acta Ch Computers, 2013, 36 (2): 422- 430.
2 林闯, 田立勤, 王元卓. 可信网络中用户行为可信的研究[J]. 计算机研究与发展, 2008, 45 (12): 2033- 2043.
LIN Chuang , TIAN Liqin , WANG Yuanzhuo . Research on trusted users' behavior in trusted network[J]. Journal of Computer Research and Development, 2008, 45 (12): 2033- 2043.
3 田立勤, 林闯. 基于双滑动窗口的用户行为信任评估机制[J]. 清华大学学报(自然科学版), 2010, 50 (6): 763- 767.
TIAN Liqin , LIN Chuang . User evaluation of user behavior based on double sliding windows[J]. Journal of Tsinghua University (Science and Technology), 2010, 50 (6): 763- 767.
4 孟宪佳, 马建峰, 卢笛, 等. 在社交网络中综合的信任评估模型[J]. 通信学报, 2014, 35 (12): 136- 143.
MENG Xianjia , MA Jianfeng , LU Di , et al. Comprehensive trust assessment model in social networks[J]. Journal on Communications, 2014, 35 (12): 136- 143.
5 田立勤, 李君建, 毋泽南. 权重均衡优化的Web用户行为的信任评估[J]. 北京邮电大学学报, 2016, 39 (6): 99- 103.
TIAN Liqin , LI Junjian , WU Zenan . Trust assessment of web user behavior based on weight equilibrium optimi-zation[J]. Journal of Beijing University of Posts and Telecommunications, 2016, 39 (6): 99- 103.
6 毋泽南, 田立勤, 王志刚. 基于机器学习的Web用户行为认证[J]. 网络与信息安全学报, 2018, 4 (1): 45- 51.
WU Zenan , TIAN Liqin , WANG Zhigang . Web user behavior authentication based on machine learning[J]. Journal of Network and Information Security, 2018, 4 (1): 45- 51.
7 李建, 管卫利, 刘吉强, 等. 基于信任评估的网络访问模型[J]. 信息网络安全, 2015, 36 (10): 14- 23.
doi: 10.3969/j.issn.1671-1122.2015.10.003
LI Jian , GUAN Weili , LIU Jiqiang , et al. Network access model based on trust evaluation[J]. Information Network Security, 2015, 36 (10): 14- 23.
doi: 10.3969/j.issn.1671-1122.2015.10.003
8 龚文涛, 夏凌云, 洪涛. Web服务中一种基于时间衰减和反馈的信任管理机制研究[J]. 计算机工程与科学, 2011, 33 (8): 70- 73.
doi: 10.3969/j.issn.1007-130X.2011.08.012
GONG Wentao , XIA Lingyun , HONG Tao . A trust management mechanism based on time decay and feedbac-k in web services[J]. Computer Engineering and Sciences, 2011, 33 (8): 70- 73.
doi: 10.3969/j.issn.1007-130X.2011.08.012
9 赵治国, 谭邦, 夏石莹, 等. 基于时间序列的P2P网络综合信任模型研究[J]. 计算机工程与应用, 2017, 53 (15): 127- 131.
ZHAO Zhiguo , TAN Bang , XIA Shiying , et al. Study on integrated P2P network trust model based on time series[J]. Journal of Computer Engineering and Applications, 2017, 53 (15): 127- 131.
10 LIU Wu, REN Ping, LIU Ke, et al. User cooperation trust model and its application in network security management[C]//Proc of 2011 Eighth Int Conf on Fuzzy Systems and Knowledge Discovery (FSKD). Piscataway: IEEE, 2011: 2335-2339.
11 张波, 向阳, 黄震华. 一种社交网络中的个体间推荐信任度计算方法[J]. 南京航空航天大学学报, 2013, 45 (4): 563- 568.
doi: 10.3969/j.issn.1005-2615.2013.04.021
ZHANG Bo , XIANG Yang , HUANG Zhenhua . A method to calculate the trust between individuals in social net-works[J]. Journal of Nanjing University of Aeronautics, 2013, 45 (4): 563- 568.
doi: 10.3969/j.issn.1005-2615.2013.04.021
12 NOOR T H, SHENG Q Z, ALFAZI A. Reputation attacks detection for effective trust assessment among cloud services[C]//Proc of 2013 12th IEEE International Conference on Trust, Security and Privacy in Computing and Communications. Melbourne: IEEE, 2013: 469-476.
13 邵堃, 罗飞, 梅枭雄, 等. 一种正态分布下的动态推荐信任模型[J]. 软件学报, 2012, 23 (12): 3130- 3148.
SHAO Kun , LUO Fei , MEI Xiaoxiong , et al. A dynamic recommendation trust model under normal distribution[J]. Journal of Software, 2012, 23 (12): 3130- 3148.
[1] HUANG Chong-zheng,WU Yuan-xi,CHEN Hong . An efficient algorithm for current frequent sequence mining in data stream [J]. J4, 2007, 42(11): 37-39 .
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] HE Hai-lun, CHEN Xiu-lan* . Circular dichroism detection of the effects of denaturants and buffers on the conformation of cold-adapted protease MCP-01 and  mesophilic protease BP01[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2013, 48(1): 23 -29 .
[2] ZHAO Jun1, ZHAO Jing2, FAN Ting-jun1*, YUAN Wen-peng1,3, ZHANG Zheng1, CONG Ri-shan1. Purification and anti-tumor activity examination of water-soluble asterosaponin from Asterias rollestoni Bell[J]. J4, 2013, 48(1): 30 -35 .
[3] MAO Ai-qin1,2, YANG Ming-jun2, 3, YU Hai-yun2, ZHANG Pin1, PAN Ren-ming1*. Study on thermal decomposition mechanism of  pentafluoroethane fire extinguishing agent[J]. J4, 2013, 48(1): 51 -55 .
[4] YANG Ying, JIANG Long*, SUO Xin-li. Choquet integral representation of premium functional and related properties on capacity space[J]. J4, 2013, 48(1): 78 -82 .
[5] YANG Yong-wei1, 2, HE Peng-fei2, LI Yi-jun2,3. On strict filters of BL-algebras#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 63 -67 .
[6] TANG Xiao-hong1, HU Wen-xiao2*, WEI Yan-feng2, JIANG Xi-long2, ZHANG Jing-ying2, SHAO Xue-dong3. Screening and biological characteristics studies of wide wine-making yeasts[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 12 -17 .
[7] WANG Bi-yu, CAO Xiao-hong*. The perturbation for the Browder’s theorem of operator matrix#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 90 -95 .
[8] YU Xiu-qing. (σ,τ)-expansion model of P-sets and its properties#br#[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(04): 90 -94 .
[9] GUO Lan-lan1,2, GENG Jie1, SHI Shuo1,3, YUAN Fei1, LEI Li1, DU Guang-sheng1*. Computing research of the water hammer pressure in the process of #br# the variable speed closure of valve based on UDF method[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 27 -30 .
[10] SHI Ai-ling1, MA Ming2*, ZHENG Ying2. Customer lifetime value and property with #br# homogeneous Poisson response[J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2014, 49(03): 96 -100 .