A Trust Evaluation Mechanism based on Certified Trust and Fuzzy-derived Reputation

被引:3
|
作者
Yang Zan [1 ]
Liu Xiao-ming [1 ]
Yang Lin [2 ]
Wang Jian-xin [2 ]
Ma Lin-ru [2 ]
机构
[1] PLAUST, Inst Command Automat, Nanjing, Jiangsu, Peoples R China
[2] Inst EESEC China, Beijing, Peoples R China
关键词
trust evaluation; certified trust; reputation; fuzzy synthetic evaluation; SYSTEMS;
D O I
10.1109/MINES.2012.52
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
introducing the trust evaluation into the access control for the service requester in a distributed network environment could be helpful for enhancing the precision and security of authorization decisions, special to the strange requesters. The existing researches of the trust evaluation could be divided into the objective means and the subjective means. The subjective evaluations could be used to dynamically measure the user's trust degree according to the reputation based on its past actions. But it cannot work when the interaction experience with the user is absence. Compared with other subjective evaluation models using the probability theory, the fuzzy based model could exactly depict the unsure and fuzzy phenomena in process. But the existing fuzzy method based on the fuzzy synthetic evaluation needs to do complex calculations between trust vectors. And the chosen operators are not enough accurate. In this paper we promote a comprehensive trust evaluation framework was a fusion of objective and subjective means. An initial trust view for user is provided based on the certified trust and a reputation is derived by the fuzzy synthetic evaluation method based on user's past actions. The proposed fuzzy method can avoid complex calculations between trust vectors, and adopts a more accurate operator to avert the information wastage.
引用
收藏
页码:934 / 938
页数:5
相关论文
共 50 条
  • [41] TRM-IoT: A Trust Management Model Based on Fuzzy Reputation for Internet of Things
    Chen, Dong
    Chang, Guiran
    Sun, Dawei
    Li, Jiajia
    Jia, Jie
    Wang, Xingwei
    COMPUTER SCIENCE AND INFORMATION SYSTEMS, 2011, 8 (04) : 1207 - 1228
  • [42] POSTER: On Trust Evaluation with Missing Information in Reputation Systems
    Gong, Xi
    Yu, Ting
    Lee, Adam J.
    PROCEEDINGS OF THE 18TH ACM CONFERENCE ON COMPUTER & COMMUNICATIONS SECURITY (CCS 11), 2011, : 773 - 775
  • [43] An Improved Routing Mechanism based on Trust Value Evaluation
    Zhang, Lingling
    Zhang, Hong
    Lv, Jianhui
    PROCEEDINGS OF THE 28TH CHINESE CONTROL AND DECISION CONFERENCE (2016 CCDC), 2016, : 2300 - 2305
  • [44] A trust evaluation system based on reputation data in Mobile edge computing network
    Xiaoheng Deng
    Jin Liu
    Leilei Wang
    Zhihui Zhao
    Peer-to-Peer Networking and Applications, 2020, 13 : 1744 - 1755
  • [45] A trust evaluation system based on reputation data in Mobile edge computing network
    Deng, Xiaoheng
    Liu, Jin
    Wang, Leilei
    Zhao, Zhihui
    PEER-TO-PEER NETWORKING AND APPLICATIONS, 2020, 13 (05) : 1744 - 1755
  • [46] On the evaluation of reputation and trust-based schemes in mobile ad hoc networks
    Abbas, Sohail
    Merabti, Madjid
    Llewellyn-Jones, David
    SECURITY AND COMMUNICATION NETWORKS, 2015, 8 (18) : 4041 - 4052
  • [47] Trust Evaluation Model in Cloud Using Reputation, Recommendation and QOS Based Approach
    Dey, Sharmistha
    Sen, Santanu Kumar
    2018 IEEE INTERNATIONAL CONFERENCE ON RESEARCH IN INTELLIGENT AND COMPUTING IN ENGINEERING (RICE III), 2018,
  • [48] Behavior trust fuzzy evaluation model
    Zhang, Guanghua
    Zhang, Yuqing
    Liu, Xuefeng
    Yan, Jingbo
    Xi'an Dianzi Keji Daxue Xuebao/Journal of Xidian University, 2015, 42 (01): : 29 - 34
  • [49] Peer Trust based Trust and Reputation Model for Wireless Sensor Networks to Protect Border
    Aseeri, Mohammed
    Ahmed, Muhammad R.
    Al Ghamdind, Ahmed
    AlMorqi, Sultan
    INTERNATIONAL JOURNAL OF COMPUTER SCIENCE AND NETWORK SECURITY, 2014, 14 (08): : 14 - 21
  • [50] A Survey of Reputation and Trust Mechanism in Peer-to-Peer Network
    Gong Shang-Fu
    Zhu Jian-Lei
    2012 INTERNATIONAL CONFERENCE ON INDUSTRIAL CONTROL AND ELECTRONICS ENGINEERING (ICICEE), 2012, : 116 - 119