JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (08): 111-117.doi: 10.6040/j.issn.1671-9352.0.2014.274

Previous Articles     Next Articles

Enterprises trust comprehensive evaluation based on fussy rough AHP in cloud computing

LUO hai-yan1,2, LÜ Ping1, LIU Lin-zhong2, YANG Xun1   

  1. 1. School of Economics & Management, Lanzhou Jiaotong University, Lanzhou 730070, Gansu, China;
    2. School of Traffic & Transportation, Lanzhou Jiaotong University, Lanzhou 730070, Gansu, China
  • Received:2014-06-16 Revised:2014-07-15 Published:2014-09-24

Abstract: Aiming at the shortcomings of the traditional trust evaluation model among supply chain adjoint enterprises, it establishes fussy rough AHP trust evaluation model in cloud computing and improves the flow that the former trust evaluation model can't well reflect the comprehensive weights. It builds AHP model to calculate the combination of subjective weight of trust evidence and applies the fuzzy rough set theory in defining the index objective weight, therefore calculates the comprehensive weight.Finally trust fuzzy model is established to work out enterprise comprehensive trust evaluation value. It is proved by examples that this model can be well applied in the node enterprises trust evaluation in cloud computing and it's an effective comprehensive evaluation method.

Key words: fussy rough set, supply chain, node enterprises, cloud computing, trust evaluation

CLC Number: 

  • C939
[1] 刘鹏,刘欣,陈钟.信任管理研究综述[J].计算机工程与应用,2004(32):39-43. LIU Peng, LIU Xin, CHEN Zhong. A Survey on trust management[J]. Computer Engineering and Applications, 2004(32):39-43.
[2] 冯登国,张敏,张妍, 等.云计算安全研究[J].软件学报,2011,22(1):71-83. FENG Dengguo, ZHANG Min, ZHANG Yan, et al. Study on Cloud Computing Security[J]. Journal of Software, 2011, 22(1):71-83.
[3] 王磊,黄梦醒.云计算环境下基于灰色AHP的供应商信任评估研究[J].计算机应用研究,2013,30(3):742-750. WANG Lei, HUANG Meng-xing. Research on trust evaluation of supplier based on gray AHP in cloud computing[J]. Application Research of Computers, 2013, 30(3):742-750.
[4] Beth T, Borcherding M, Klein B. Valuation of trust in open networks[C]//Proc. of ESORICS'94. Brighton: Springer-Verlag, 1994: 3-18.
[5] Josang A. A logic for uncertain probabilities[J]. International Journal of Uncertainty, Fuzziness and Knowledge-Based System, 2001, 9(3):279-311.
[6] BLAZE M, MFEIGENBAUM J, LACY J. Proceedings of 1996 IEEE Symposium on Security and Privacy[R]. Decentralized Trust Management, 1996: 164-173.
[7] Abdul-Rahman A, Hailes S. Using recommendations for managing trust in distributed systems[C]. In Proceedings of the IEEE Malaysia International Conferenceon(MICC'97). Kuala Lumpur: IEEE Press, 1997.
[8] 曹天杰,张永平.信任管理在电子商务中的实现[J].计算机应用与软件,2003,(3):15-17. Cao Tianjie, Zhang Yongping. On the implementation of trust management in electronic commerce[J]. Computer Applications and Software, 2003, (3):15-17.
[9] 唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408. TANG Wen, CHEN Zhong. Research of Subjective Trust Management Model Based on the Fuzzy Set Theory[J]. Journal of Software, 2003, 14(8):1401-1408.
[10] 谭旭光,倪雁冰.响应型供应链中供应商综合能力的评价研究[J].组合机床与自动化加工技术,2007(11):108-112. TAN Xuguang, NI Yanbing. Research on Supplier Synthesis Capability Evaluation in Responsive Supply Chain[J]. Modular Machine Tool & Automatic Manufacturing Technique, 2007(11):108-112.
[11] 张文修,吴伟志.粗糙集理论与方法[M].北京:科学出版社,2001:239-243.
[12] 谢季坚,刘承平.模糊数学方法及其应用[M].武汉:华中科技大学出版社,2005:178-182.
[13] 黎梨苗,陈志刚,邓晓衡.基于模糊理论的主观信任综合评价模型研究[J].计算机应用研究,2010,27(5):1860-1862. LI Limiao, CHEN Zhigang, DENG Xiaoheng. Research of subject trust comprehensive evaluation model based on fuzzy theory[J]. Application Research of Computers, 2010, 27(5):1860-1862.
[14] Istvn Mezgr, Ursula Rauschecker. The challenge of networked enterprises for cloud computing interoperability[J]. Computers in Industry, 2014(65):657-674.
[1] ZHANG Ke-yong, LI Jiang-xin, YAO Jian-ming, LI Chun-xia. Research on supply chain decision making of equitable retailers with fair sensitivities [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(9): 83-94.
[2] CHEN Liang, HU Jin-song. Influence of risk aversion on different types of dual-channel supply chain decision [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(5): 30-40.
[3] LIU Jing, ZHOU Yan, ZHENG Ying-jie, WANG Chao-sheng. Optimal decision-making for green supply chain considering retailers fairness concern and risk aversion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(5): 12-29.
[4] XIAO Di, JIN Wen-wen. Pricing strategy for supply chain considering horizontal competition under C2B mode [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(5): 53-60.
[5] DONG Zhen-ning, WANG Zhuo, ZHOU Xue-jun. Retailer financing and ordering decision-making with limitation on the minimum loan amount [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(5): 61-69.
[6] WANG Xiao-yan, CHEN Xing-shu, WANG Yi-tong, GE Long. Performance measurement and analysis of cloud computing network based on OpenStack [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 30-37.
[7] HAN Pan-pan, QIN Jing. Verifiable and searchable encryption scheme for outsourced database in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(9): 41-53.
[8] ZHONG Yuan, XIONG Shuang, ZHANG Cui-hua, CHEN Hui-jie. Research on fault tolerance strategies of quality improvement in supply chains with market pricing constraints [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 10-15.
[9] HUANG Yu-qing, ZHAO Bo, XIAO Yu, TAO Wei. A vTPM-VM live migration scheme based on KVM [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 69-75.
[10] DUAN Zheng-yu, ZHOU Yan, ZHANG Hua-min, XU Ming-jiao. The study of the supply chain network equilibrium model with retailers inequity aversion behavior [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(5): 58-69.
[11] CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67.
[12] YAO Ke, ZHU Bin-rui, QIN Jing. Verifiable public key searchable encryption protocol based on biometrics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 11-22.
[13] . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100.
[14] ZHAO Bin, HE Jing-sha, ZHANG Yi-xuan. The method of determining decision attribute weight based on information entropy and membership [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(3): 86-90.
[15] HE Xin-hua, HU Wen-fa, XU Chang-yan, CHEN Ji-hong. Collaborative transshipment strategy of service supply chain for emergencies based on stochastic and fuzzy simulation [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(12): 67-77.
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!