计算机科学 ›› 2018, Vol. 45 ›› Issue (11): 13-28.doi: 10.11896/j.issn.1002-137X.2018.11.002

• 综述 • 上一篇    下一篇

网络信任研究进展

刘建生1, 游真旭1, 乐光学1,2, 王结太2, 刘建华2   

  1. (江西理工大学理学院 江西 赣州341000)1
    (嘉兴学院数理与信息工程学院 浙江 嘉兴314000)2
  • 收稿日期:2018-01-05 发布日期:2019-02-25
  • 作者简介:刘建生 男,副教授,CCF会员,主要研究方向为深度学习;游真旭 女,硕士生,CCF学生会员,主要研究方向为复杂网络理论;乐光学 男,教授,CCF会员,主要研究方向为复杂网络、协同服务等,E-mail:guangxueyue@163.com(通信作者);王结太 男,博士,主要研究方向为无线网络技术;刘建华 男,副教授,主要研究方向为网络安全。
  • 基金资助:
    本文受国家自然科学基金项目(61462036,61572014,61702224),浙江省自然科学基金项目(LY16F020028,LQ15F010008,LY15F020040)资助。

Research Progress of Network Trust

LIU Jian-sheng1, YOU Zhen-xu1, YUE Guang-xue1,2, WANG Jie-tai2, LIU Jian-hua2   

  1. (Department of Science,Jiangxi University of Science and Technology,Ganzhou,Jiangxi 341000,China)1
    (Department of Mathematics and Information Engineering,Jiaxing University,Jiaxing,Zhejiang 314000,China)2
  • Received:2018-01-05 Published:2019-02-25

摘要: 网络的迅速发展为人们提供了自由、开放的交互方式,互联网服务已经成为大众日常生活的重要组成部分,如何评价表征节点交互的可信度已成为网络应用的核心问题之一。由于开放式网络环境具有匿名性、随机性和动态性等特点,用户在网络中选择目标节点进行交互时面临诸多风险,因此基于节点交互行为的信任评价机制成为抑制网络恶意虚假行为的有效策略机制。首先,概述信任的相关性质,根据网络节点间的交互行为及其产生的信任关系特征,形式化定义与构建信任网络。其次,分析信任机制的框架体系,依次讨论信任机制在P2P网络、电子商务、社会网络中的研究要点与安全威胁。最后,重点对比分析不同领域中的典型信任模型,详述其抗攻击效用与不足,从改进模型算法、提高模型抗攻击能力等方面指出信任机制在未来的研究方向。

关键词: 恶意攻击, 网络交互, 信任机制, 信任模型

Abstract: The rapid development of Internet provides people with a free and open way of interaction.Internet services have become an important part of populace’s daily life.How to evaluate the trustworthiness of characterizing node interaction has become one of the core issues in network applications.Due to the anonymity,randomness and dynamic characteristics of open network environment,users face many risks in choosing the target node in the network for interaction.The trust evaluation mechanism based on node interaction becomes an effective strategy mechanism to suppress the malicious and fake behaviors of network.First of all,this paper outlined the related properties of trust,and formally defined and constructed the trust network according to the interactive behavior among network nodes and the characte-ristics of their trust relationship.Then,this paper analyzed the framework of trust mechanism,and discussed the research focuses and security threats of trust mechanism in P2P networks,e-commerce and social networks.At last,this paper focused on the comparison and analysis of typical trust models in different fields,detailed the effectiveness and shortcomings of anti-attack,and proposed the research direction of future trust mechanisms in terms of improving the model algorithm and enhancing the anti-attack capability of model.

Key words: Malicious attack, Network interaction, Trust mechanism, Trust model

中图分类号: 

  • TP393
[1]BEATTY P,REAY I,DICK S,et al.Consumer trust in e-commerce web sites:A meta-study[J].Acm Computing Surveys,2011,43(3):1-46.
[2]YOU J,SHANGGUAN J L,XU S K,et al.Distributed dynamic trust management model based on trust reliability[J].Journal of Software,2017,28(9):2354-2369.(in Chinese)
游静,上官经伦,徐守坤,等.考虑信任可靠度的分布式动态信任管理模型[J].软件学报,2017,28(9):2354-2369.
[3]ROUSSEAU D M,SITKIN S B,BURT R S,et al.Not so diffe- rent after all:Across-discipline view of trust [J].Academy of Management Review,1998,23(3):393-404.
[4]MCKNIGHT D H,CHERVANY N L.The meanings of trust [R].University of Minnesota,1996.
[5]MCKNIGHT D H,CHOUDHURY V,KACMAR C.Trust in e-commerce vendors:a two-stage model[C]∥Twenty First In-ternational Conference on Information Systems.DBLP,2000:532-536.
[6]MCKNIGHT D H,CHERVANY N L.What trust means in ecommerce customer relationship:an interdisciplinary concep-tual typology [J].International Journal of Electronic Commerce,2001,6(2):35-59.
[7]GAMBETTA D.Can we trust trust [J].Trust:Making and Breaking Cooperative Relations,2000,1(13):213-237.
[8]SHERCHAN W,NEPAL S,PARIS C.A survey of trust in social networks [J].ACM Computing Surveys (CSUR),2013,45(4):1-33.
[9]SCHOORMAN F D,MAYER R C,DAVIS J H.An integrative model of organizational trust:Past,present,and future[J].Academy of Management Review,1995,20(3):709-734.
[10]JSANG A,ISMAIL R,BOYD C.A survey of trust and reputation systems for online service provision [J].Decision Support Systems,2007,43(2):618-644.
[11]WANG X F.Research on the tactics representation and quantitative model of trust management [D].Changsha:National University of Defense Technology,2009.(in Chinese)
王晓峰.信任管理的策略表示与量化模型研究[D].长沙:国防科学技术大学,2009.
[12]HUANG J,FOX M S.An ontology of trust:formal semantics and transitivity[C]∥International Conference on Electronic Commerce:the New E-Commerce-Innovations for Conquering Current Barriers,Obstacles and Limitations to Conducting Successful Business on the Internet.DBLP,2006:259-270.
[13]LI X Y,GUI X L.Research on dynamic trust model for large scale distributed environment[J].Journal of Software,2007,18(6):1510-1521.(in Chinese)
李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510-1521.
[14]LI Y J,DAI Y F.Research on trust mechanism for peer-to-peer network[J].Chinese Journal of Computers,2010,33(3):390-405.(in Chinese)
李勇军,代亚非.对等网络信任机制研究[J].计算机学报,2010,33(3):390-405.
[15]LIANG Z Q,SHI W S.PET:A Personalized trust model with reputation and risk evaluation for P2P resource sharing[C]∥Proceeding of 38th Annual Hawaii International Conference on System Sciences.Piscataway:IEEE Computer Society,2005:201-211.
[16]TANG W,CHEN Z.Research of subjective trust management model based on the fuzzy set theory[J].Journal of Software,2003,14(8):1401-1408.(in Chinese)
唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401-1408.
[17]AUDUN J.Alogic for uncertain probabilities[J].International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2001,9(3):279-311.
[18]XU J.A Survey of Trust Modeling of Uncertainty Theory[J].Microcomputer Systems,2017,38(1):100-106.(in Chinese)
徐军.不确定性理论的信任建模研究综述[J].小型微型计算机系统,2017,38(1):100-106.
[19]GAN Z B,ZENG C,LI K,et al.Construction and optimization of trust network in e-commerce environment[J].Chinese Journal of Computers,2012,35(1):27-37.
[20]GAN Z B,ZENG C,MA Y,et al.C2C e-commerce trust algorithm based on trust network[J].Journal of Software,2015,26(8):1946-1959.(in Chinese)
甘早斌,曾灿,马尧,等.基于信任网络的C2C电子商务信任算法[J].软件学报,2015,26(8):1946-1959.
[21]WANG J P,SUN B,NIU X X,et al.Distributed trust model based on parameter modeling [J].Journal on Communications,2013,34(4):47-59.(in Chinese)
汪京培,孙斌,钮心忻,等.基于参数建模的分布式信任模型[J].通信学报,2013,34(4):47-59.
[22]MARSH S P.Formalising trust as a computational concept [D].Stirling:University of Stirling,1994.
[23]BLAZE M,FEIGENBAUM J,LACY J.Decentralized trust management[C]∥17’th Symposium on Security and Privacy.IEEE Computer Society Press,1996:164-173.
[24]WINSBOROUGH W H,SEAMONS K E,JONES V E.Automated Trust Negotiation[M].North Carolina State University at Raleigh,2000.
[25]WINSBOROUGH W H,LI N.Towards practical automated trust negotiation[C]∥Michael J B,ed.International Workshop on Policies for Distributed Systems and Networks.Washington:IEEE Computer Society Press,2002:92-103.
[26]LIAO Z S,JIN H,LI C S,et al.Automated trust negotiation and its development trend[J].Journal of Software,2006,17(9):1933-1948.(in Chinese)
廖振松,金海,李赤松,等.自动信任协商及其发展趋势[J].软件学报,2006,17(9):1933-1948.
[27]LI J X,HUAI J P,LI X X.Research on automated trust negotiation[J].Journal of Software,2006,17(1):124-133.(in Chinese)
李建欣,怀进鹏,李先贤.自动信任协商研究[J].软件学报,2006,17(1):124-133.
[28]DUMA C,SHAHMEHRI N,CARONNI G.Dynamic trust metrics for peer-to-peer systems[C]∥Sixteenth International Workshop on Database and Expert Systems Applications,2005.IEEE,2005:776-781.
[29]ZHANG H B,WANG Y,ZHANG X Z.Transaction similarity-based contextual trust evaluation in e-commerce and e-service environments[C]∥Proc.of the 9th Int’l Conf.on Web Service.Washington:IEEE Computer Society Press,2011:500-507.
[30]LIU Y C,LIANG Y H.P2P Dynamic Trust Model Based on Contextual Factors [J].Journal of Communication,2016,37(8):34-45.(in Chinese)
刘义春,梁英宏.基于上下文因素的P2P动态信任模型[J].通信学报,2016,37(8):34-45.
[31]DELLAROCAS C.Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior[C]∥ACM Conference on Electronic Commerce.ACM,2000:150-157.
[32]WHITBY A,JOSANG A,INDULSKA J.Filtering out unfair ratings in Bayesian reputation systems [J].The Icfain Journal of Management Research,2005,4(2):48-64.
[33]JIANSHU W,CHUNYAN M,ANGELA G.An entropy-based approach to protecting rating systems from unfair testimonies [J].Ieice Transactions on Information and Systems,2006,89(9):2502-2511.
[34]YANG Y,SUN Y L,REN J,et al.Building trust in online rating systems through signal modeling[C]∥IEEE ICDCS Workshop Trust Reputat.Manage,Toronto,ON,Canada,2007.
[35]LAURETI P,MORET L,ZHANG Y C,et al.Information filtering via iterative refinement [J].EPL(Europhysics Letters),2006,75(6):1006.
[36]ZHANG J,COHEN R.A personalized approach to address unfair ratings in multiagent reputation systems[C]∥AAMAS06 Workshop on Trust in Multi agent Systems.May 2006.
[37]YANG Y,SUN Y L,KAY S,et al.Defending online reputation systems against collaborative unfair raters through signal mode-ling and trust[C]∥ACM Symposium on Applied Computing.ACM,2009:1308-1315.
[38]LIU Y,SUN Y.Anomaly Detection in Feedback-based Reputation Systems through Temporal and Correlation Analysis[C]∥IEEE Second International Conference on Social Computing.IEEE,2010:65-72.
[39]YOU W,LIU L,XIA M.Reputation inflation detection in a Chinese C2C market [J].Electronic Commerce Research and Applications,2011,10(5):510-519.
[40]KARL A,ZORAN D.Managing trust in a Peer-2-Peer information system[C]∥Proceeding of the 10th International Confe-rence on Information and Knowledge Management.Atlanta,Georgia,USA,2001:310-317.
[41]HUANG J N,SONG J X,LIU W D,et al.A Survey of Peer-to-Peer Network Reputation Mechanisms[J].Small Microcomputer Systems,2006,27(7):1175-1181.(in Chinese)
黄金能,宋佳兴,刘卫东,等.对等网络信誉机制研究综述[J].小型微型计算机系统,2006,27(7):1175-1181.
[42]KAMVAR S.The EigenTrust algorithm for reputation management in P2P networks [C]∥12th International World Wide Web Conference.2003:640-651.
[43]ZHOU R F,KAI H W.PowerTrust:a robust and scalable reputation system for trusted peer-to-peer computing [J].IEEE Transaction on Parallel and Distributed Systems,2007,18(4):460-473.
[44]XIONG L,LIU L.PeerTrust:supporting reputation-based trust for peer-to-peer electronic communities [J].IEEE Transactions on Knowledge Data Engineering,2004,16(7):843-857.
[45]WANG Y,VASSILEVA J.Bayesian network trust model in peer-to-peer networks[C]∥Moro G,ed.Proc.of the 2nd Int’l workshop on Agents and Peer-to-Peer Computing.Berlin:Springer Verlag,2004:23-34.
[46]BETH T,BORCHERDING M,KLEIN B.Valuation of trust in open network[C]∥European Symposium on Research in Security (ESORICS).Springer Verlag,1994:3-18.
[47]TIAN C Q,ZOU S H,TIAN H R,et al.A new trust model based on reputation and risk evaluation for P2P networks[J].Journal of Electronics & Information Technology,2007,29(7):1628-1632.(in Chinese)
田春岐,邹仕洪,田慧蓉,等.一种基于信誉和风险评价的分布式P2P信任模型[J].电子与信息学报,2007,29(7):1628-1632.
[48]MA X,GAN Z B,LU H W,et al.A method of predicting potential trust relationships in e-commerce[J].Computer Science,2014,12(41):138-142.(in Chinese)
马霄,甘早斌,鲁宏伟,等.电子商务中的一种潜在信任关系预测方法[J].计算机科学,2014,12(41):138-142.
[49]YU B,SINGH M P.An evidential model of distributed reputation management [C]∥Proceedings of the First International Joint Conference on Autonomous Agents and Multi-Agent Systems:Part 1.ACM,2002:294-301.
[50]ZHANG S B,XU C X.Study on the trust evaluation approach based on cloud model[J].Chinese Journal of Computers,2013,36(2):422-431.
[51]GAN Z B,DING Q,LI K,et al.Reputation-based multi-dimensional trust algorithm[J].Journal of Software,2011,22(10):2401-2411.(in Chinese)
甘早斌,丁倩,李开,等.基于声誉的多维度信任计算算法[J].软件学报,2011,22(10):2401-2411.
[52]MA Y.Research on trust network discovery and trust fusion in online social networks [D].Wuhan:Huazhong University of Science and Technology,2014.(in Chinese)
马尧.在线社会网络的信任网络发现与信任融合研究[D].武汉:华中科技大学,2014.
[53]AL-OUFI S,KIM H N,SADDIK A E.A group trust metric for identifying people of trust in online social networks[J].Expert Systems with Applications,2012,39(18):13173-13181.
[54]WANG G,GUI X L.Selection of trading nodes in social net- works and calculation of trust relationship [J].Journal of Computer,2013,36(2):368-383.(in Chinese)
王刚,桂小林.社会网络中交易节点的选取及其信任关系计算方法[J].计算机学报,2013,36(2):368-383.
[55]QIAO X Q,YANG C,LI X F,et al.A Method for Computing Trust Based on User Context in Social Networks [J].Journal of Software,2011,34(12):2403-2412.(in Chinese)
乔秀全,杨春,李晓峰,等.社交网络中一种基于用户上下文的信任度计算方法[J].软件学报,2011,34(12):2403-2412.
[56]TIAN J F,WU L J.Multinomial subjective logic based extended trust propagation model [J].Journal on Communications,2013,34(5):12-19.
[57]LIU G,YANG Q,WANG H,et al.Assessment of multi-hop interpersonal trust in social networks by three-valued subjective logic[C]∥Proceedings of the International Conference on Computer Communications.IEEE,2014:1698-1706.
[58]CERUTTI F,TONIOLO A,OREN N,et al.Subjective logic ope- rators in trust assessment:an empirical study[J].Information Systems Frontiers,2015,17(4):743-762.
[59]XU J,ZHONG Y S,ZHU W Q.A Multidimensional Trust Transfer Model Based on Intuitionistic Fuzzy Theory[J].Journal of Chinese Computer Systems,2015,36(12):2714-2718.(in Chinese)
徐军,钟元生,朱文强.一种基于直觉模糊理论的多维信任传递模型[J].小型微型计算机系统,2015,36(12):2714-2718.
[60]ZHANG B,ZHANG H,LI M Z,et al.Trust Traversal:A trust link detection scheme in social network [J].Computer Networks,2017,120:105-125.
[61]CHEN T,ZHU Q,ZHOU M,et al.Trust-Based recommendation algorithm in social network[J].Journal of Software,2017,28(3):721-731.(in Chinese)
陈婷,朱青,周梦,等.社交网络环境下基于信任的推荐算法[J].软件学报,2017,28(3):721-731.
[62]WANG R Q,JIANG Y L,LI Y X,et al.A Collaborative Filtering Recommendation Algorithm Based on Multiple Social Trusts [J].Journal of Computer Research and Development,2016,53(6):1389-1399.(in Chinese)
王瑞琴,蒋云良,李一啸,等.一种基于多元社交信任的协同过滤推荐算法[J].计算机研究与发展,2016,53(6):1389-1399.
[1] 黄婷婷, 冯锋.
无线传感器网络异构数据融合模型优化研究
Study on Optimization of Heterogeneous Data Fusion Model in Wireless Sensor Network
计算机科学, 2020, 47(11A): 339-344. https://doi.org/10.11896/jsjkx.200100109
[2] 曲广强, 孙斌.
基于区块链的实验教学经费可信任回溯机制研究
Study on Trustworthy Backtracking Mechanism of Experimental Teaching Fund Based on Blockchain
计算机科学, 2019, 46(11A): 553-556.
[3] 朱文强.
面向O2O服务的移动社交网络个性化可信群体识别模型
Personalized Trustworthy Group Identifying Model Based on O2O Service-oriented Mobile Social Network
计算机科学, 2018, 45(6): 76-83. https://doi.org/10.11896/j.issn.1002-137X.2018.06.013
[4] 廖新考,王力生,刘晓建,许晓洁.
网络环境下的个性化信任模型PTM
Personalized Trust Model in Network Environment
计算机科学, 2017, 44(8): 100-106. https://doi.org/10.11896/j.issn.1002-137X.2017.08.019
[5] 徐雪飞,李建华,杨迎辉,郭蓉.
基于云模型的军事航空通信频谱共享信任机制研究
Military Aeronautical Communication Spectrum Sharing Trust Mechanism Based on Cloud Model
计算机科学, 2016, 43(9): 169-174. https://doi.org/10.11896/j.issn.1002-137X.2016.09.033
[6] 束柬,梁昌勇.
基于DS理论的多源证据融合云安全信任模型
Dynamic Trust Model Based on DS Evidence Theory under Cloud Computing Environment
计算机科学, 2016, 43(8): 105-109. https://doi.org/10.11896/j.issn.1002-137X.2016.08.022
[7] 游静,冯辉,孙玉强.
云环境下基于协同推荐的信任评估与服务选择
Trust Evaluation and Service Selection Based on Collaborative Recommendation for Cloud Environment
计算机科学, 2016, 43(5): 140-145. https://doi.org/10.11896/j.issn.1002-137X.2016.05.026
[8] 李道全,吴兴成,郭瑞敏.
一种基于二层节点和客观风险的电子商务交易信任模型
Electronic Commerce Transaction Trust Model Based on Two Layers Nodes and Objective Risk
计算机科学, 2016, 43(5): 117-121. https://doi.org/10.11896/j.issn.1002-137X.2016.05.022
[9] 彭浩,赵丹丹,于运杰,吴震东,吴松洋.
一种面向分布式异构网络的基于可信计算的信任模型
Trust Model Based on Trusted Computing for Distributed Heterogeneous Networks
计算机科学, 2016, 43(10): 66-69. https://doi.org/10.11896/j.issn.1002-137X.2016.10.012
[10] 杨章伟,王立平,赖文萍.
改进的计算网格域内实体信任模型设计
Improved Design for Trust Model on Domain Entity of Computing Grid
计算机科学, 2015, 42(Z11): 386-389.
[11] 吴春琼,黄榕宁.
基于动态线性相关的访问控制模型研究
Dynamic Linear Relevance Based Access Control Model
计算机科学, 2015, 42(9): 94-96. https://doi.org/10.11896/j.issn.1002-137X.2015.09.019
[12] 邬海琴,王良民.
基于信任距离的车联网恶意节点检测方法
Trust Distance Based Malicious Nodes Detection Method in Vehicular Ad Hoc Network
计算机科学, 2015, 42(8): 157-160.
[13] 曹晓梅,胡文捷.
基于动态角色属性的MP2P信任模型
Dynamic Role Property Based Trust Model for MP2P Networks
计算机科学, 2015, 42(8): 106-111.
[14] 徐培,廉 彬,邵 堃,陈 俊,安 宁.
面向决策的信任融合模型研究
Research on Fusion Trust Model for Decision-making
计算机科学, 2015, 42(12): 157-161.
[15] 陈卫东,李敏强,赵庆展.
基于P2P环境下的Web服务选择信任模型研究
Research of Web Service Selection Trust Model on P2P Environment
计算机科学, 2015, 42(1): 113-118. https://doi.org/10.11896/j.issn.1002-137X.2015.01.027
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!