A trust-based service evaluation and selection model in pervasive computing environment

被引:3
|
作者
Chen, Zhenxiang [1 ]
Ge, Liansheng [1 ]
Wang, Haiyang [1 ]
Huang, Xianzhi [1 ]
Lin, Jinjiao [1 ]
机构
[1] Shandong Univ, Sch Comp Sci & Technol, Jinan 250100, Peoples R China
关键词
pervasive computing; universal gravitation; trust; service evaluation; service selection;
D O I
10.1109/SPCA.2006.297501
中图分类号
TP301 [理论、方法];
学科分类号
081202 ;
摘要
In pervasive computing, service evaluation and selection play an important role due to its high dynamics, complex context and catholicity characters. An effective model helps evaluating and thus selecting service efficiently. Using trust behavior experience in human society and the law of gravity in real word, this paper introduced a new concept of trust gravitation to analyze the trust relationship between pervasive interaction entities. We then built a sound system in terms of a service evaluation and selection model based on trust gravitation. The system was tested to improve the efficiency and veracity of service evaluation and selection. Experiment results show that pervasive entities can select optimum network services in time with the help of this model.
引用
收藏
页码:641 / +
页数:2
相关论文
共 50 条
  • [1] A trust-based secure service discovery (TSSD) model for pervasive computing
    Ahamed, Sheikh I.
    Sharmin, Moushumi
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4281 - 4293
  • [2] Trust Service Selection in Pervasive Computing
    Wang, Xiaoying
    Chen, Yingge
    Xu, Benlian
    [J]. MINES 2009: FIRST INTERNATIONAL CONFERENCE ON MULTIMEDIA INFORMATION NETWORKING AND SECURITY, VOL 1, PROCEEDINGS, 2009, : 173 - 176
  • [3] A Trust-Based Access Control Model for Pervasive Computing Applications
    Toahchoodee, Manachai
    Abdunabi, Ramadan
    Ray, Indrakshi
    Ray, Indrajit
    [J]. DATA AND APPLICATIONS SECURITY XXIII, PROCEEDINGS, 2009, 5645 : 307 - 314
  • [4] Trust-based security in pervasive computing environments
    Kagal, L
    Finin, T
    Joshi, A
    [J]. COMPUTER, 2001, 34 (12) : 154 - 157
  • [5] Trust management and service selection in pervasive computing environments
    Guan, Shangyuan
    Dong, Xiaoshe
    Wu, Weiguo
    Mei, Yiduo
    Liao, Shihua
    [J]. CIS WORKSHOPS 2007: INTERNATIONAL CONFERENCE ON COMPUTATIONAL INTELLIGENCE AND SECURITY WORKSHOPS, 2007, : 620 - 623
  • [6] A trust-based security system for ubiquitous and pervasive computing environments
    Boukerche, Azzedine
    Ren, Yonglin
    [J]. COMPUTER COMMUNICATIONS, 2008, 31 (18) : 4343 - 4351
  • [7] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment
    Iltaf, Naima
    Ghafoor, Abdul
    [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 669 - 672
  • [8] A fuzzy based credibility evaluation of recommended trust in pervasive computing environment
    Iltaf, Naima
    Ghafoor, Abdul
    [J]. 2013 IEEE CONSUMER COMMUNICATIONS AND NETWORKING CONFERENCE (CCNC), 2013, : 617 - 620
  • [9] A Fuzzy Based Trust Evaluation Model for Service Selection in Cloud Environment
    Priya, G.
    Jaisankar, N.
    [J]. INTERNATIONAL JOURNAL OF GRID AND HIGH PERFORMANCE COMPUTING, 2019, 11 (04) : 13 - 27
  • [10] Trust-based service composition and selection in service oriented architecture
    Jing-Jing Guo
    Jian-Feng Ma
    Xin-Xin Guo
    Xing-Hua Li
    Jun-Wei Zhang
    Tao Zhang
    [J]. Peer-to-Peer Networking and Applications, 2018, 11 : 862 - 880