《计算机应用研究》|Application Research of Computers

基于云模型和信任链的信任评价模型研究

Study on trust evaluation model based on cloud model and trust chain

免费全文下载 (已被下载 次)  
获取PDF全文
作者 陈建钧,张仕斌
机构 成都信息工程学院 信息安全工程学院,成都 610225
统计 摘要被查看 次,已被下载
文章编号 1001-3695(2015)01-0249-05
DOI 10.3969/j.issn.1001-3695.2015.01.057
摘要 以复杂网络环境为研究背景,引入云模型理论,提出了一种基于信任链的信任评价模型,实现了信任的定性概念与定量数值之间的转换,通过评价模型识别恶意节点,减少不必要的损失。该模型将信任信息按属性分离,并转换成云数字特征参数进行传递和融合,解决了信任链过长带来的信任信息传递和融合的不合理性问题。通过仿真实验证明了该模型能有效控制最终信任评价结果的真实性,通过防恶意竞争实验,进一步证明了基于云模型和信任链的信任评价模型的可行性和合理性,为复杂网络环境下信任评价的研究提供了一个新的思路。
关键词 信任;信任链;云模型;信任传递;信任融合;恶意竞争
基金项目 四川省战略新兴产品计划项目(2013GZX0137)
成都信息工程学院学术带头人科研基金项目(J201107)
本文URL http://www.arocmag.com/article/01-2015-01-057.html
英文标题 Study on trust evaluation model based on cloud model and trust chain
作者英文名 CHEN Jian-jun, ZHANG Shi-bin
机构英文名 College of Information Security Engineering, Chengdu University of Information Technology, Chengdu 610225, China
英文摘要 Taking the complex network environment as the research background, by use of cloud model theory, this paper proposed the trust evaluation model based on trust chain. This trust evaluation model could implement the conversion between qualitative and quantitative of trust. And it could identify malicious nodes and reduce unnecessary losses through the evaluation model. It separated the trust information according to the model properties and converted into cloud digital characteristics, which being transmitted and fused in the model. The model could solve the unreasonable problems result of a long trust chain in transmitting and fusing trust information .The simulation results confirm that the model can effectively control the authenticity of the final results. The simulating experiment of preventing malicious competition further confirms the feasibility and rationality of the trust evaluation model based on cloud model and trust chain. The proposed trust evaluation model may provide a new promising method for research of trust evaluation in complex networks environment.
英文关键词 trust; trust chain; cloud model; trust transfer; trust fusion; malicious competition
参考文献 查看稿件参考文献
  [1] BETH T, BORCHERDING M, KLEIN B. Evaluation of trust in open networks[C] //Proc of European Symposium on Research in Security. Berlin:Springer-Verlag, 1994:3-18.
[2] 唐文, 陈钟. 基于模糊集合理论的主观信任管理模型研究[J] . 软件学报, 2003, 14(8):1401-1408.
[3] 张仕斌, 何大可, 遠藤誉. 基于模糊聚类的信任类型动态定义机制的研究与分析[J] . 计算机工程, 2006, 32(9):19-21.
[4] 王守信, 张莉, 李鹤松. 一种基于云模型的主观信任评价方法[J] . 软件学报, 2010, 21(6):1341-1352.
[5] 李致远, 王汝传. P2P电子商务环境下的动态安全信任管理模型[J] . 通信学报, 2011, 32(3):50-59.
[6] 昌燕, 张仕斌. 基于直觉模糊集和最优推荐的信任评价模型[J] . 计算机工程, 2012, 38(5):142-144.
[7] 莫家庆, 胡忠望, 叶雪琳. 基于模糊理论的可信计算信任评估方法研究[J] . 计算机应用, 2013, 33(1):142-145.
[8] 张兴, 黄强, 沈昌祥. 一种基于无干扰模型的信任链传递分析方法[J] . 计算机学报, 2010, 33(1):74-81.
[9] 陈珂, 胡天磊, 陈刚. 基于角色的信任证覆盖网络中高效信任链搜索[J] . 浙江大学学报:工学版, 2010, 44(12):2241-2250.
[10] 荆琦, 唐礼勇, 陈钟. 无线传感器网络中的信任管理[J] . 软件学报, 2008, 19(7):1716-1730.
[11] 田春岐, 邹仕洪, 田慧蓉. 一种基于信誉和风险评价的分布式P2P信任模型[J] . 电子与信息学报, 2007, 29(7):1628-1632.
[12] 路峰, 吴慧中. 基于云模型的信任评估研究[J] . 中国工程科学, 2008, 10(10):84-90.
[13] YAO Zhi-ying, KIM D Y, LEE I, et al. A securiy framework with trust managent for sensor networks[C] //Proc of the 1st IEEE/CREARE-NET Workshop on Security and Privacy for Emerging Areas in Communication Networks. Piscataway:IEEE Computer Society, 2005:190-198.
[14] HUR J, LEE Y, YOON H, et al. Trust evaluation model for wireless sensor networks[C] //Proc of the 7th International Comference on Advanced Communication Technology. Piscataway:IEEE Computer Socitey, 2005:491-496.
[15] PROBST M J, KASERA S K. Statistical trust establishment in wireless sensor networks[C] //Proc of the 13th International Conference on Parallet and Distributed Systems. Washington DC:IEEE Computer Society, 2007:1-8.
[16] GANERIWAL S, SRIVASTAVA M. Reputation-based framework for high integrity sensor networks[C] //Proc of the 2nd ACM Workshop on Security of Ad hoc and Sensor Networks. 2004:66-77.
[17] KIM T K, SEO H S. A trust model using fuzzy logic in wireless sensor network[C] //Proc of World Academy of Science, Engineering and Technology. 2008:63-66.
[18] 成坚, 冯仁剑, 许小丰, 等. 基于D-S证据理论的无线传感器网络信任评估模型[J] . 传感技术学报, 2009, 22(12):1802-1807.
[19] 马彬, 谢显中. 无线传感器网络云信任模型[J] . 计算机科学, 2010, 37(3):128-132.
[20] 李德毅, 刘常昱. 论正态云模型的普适性[J] . 中国工程科学, 2004, 6(8):28-34.
[21] 张仕斌, 许春香. 基于云模型的信任评估方法研究[J] . 计算机学报, 2013, 36(2):422-431.
收稿日期 2013/11/23
修回日期 2014/1/6
页码 249-253
中图分类号 TP393.08
文献标志码 A