Computer Science ›› 2014, Vol. 41 ›› Issue (12): 38-42.doi: 10.11896/j.issn.1002-137X.2014.12.009

Previous Articles     Next Articles

Research on Service Trust Evaluation Approach under Cloud Computing Environment

WANG Jin-dong,WEI Bo,ZHANG Heng-wei and He Jia-jing   

  • Online:2018-11-14 Published:2018-11-14

Abstract: In cloud computing,the resources of service are widely distributed,complex and fickle.The trust relationship among service entities is hard to establish and maintain with high uncertainty.The characteristics of randomness and fuzziness of services cannot be responded by traditional trust evaluation approach comprehensively,so a service trust evaluation method based on weighted multi-attribute cloud was proposed.Time decay factor was introduced to reflect the timeliness of trust,and multi-attribute trust cloud was used to refine the evaluation granularity.In order to prevent conspiracy to defraud and malicious attacks,the reliability and weight of recommender were confirmed by similarity of eva-luation,and the trust rating was confirmed by cloud similarity calculation to provide security decisions for the user’s services selection.Simulation results show that this method can improve the success rate of services interaction obviously,and it can be applied to service trust evaluation under cloud computing environment.

Key words: Cloud service,Cloud model,Trust evaluation,Trust cloud,Trust rating

[1] Buyya R,Yeo C S,Venugopal S,et al.Cloud computing and emerging IT platforms:vision,hype,and reality for delivering computing as the 5th utility[J].Future Generation Computer Systems,2009,25(6):599-616
[2] Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58
[3] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,2(1):71-82
[4] Vivekananth P.Reputation Based Trust Model for Grid withEnhanced Reliabilty[C]∥Junior E R H,et al.,eds.INTECH 2011,CCIS.Berlin Heidelberg:Springer-Verlag,2011
[5] Josang A,Presti S.Analyzing the relationship between risk and trust[C]∥iTrust04:Proceedings of the Second International Conference on Trust Management.Berlin:Springer-Verlag,2004
[6] Ehab M,ElSalamouny.Probabilistic trust models in network security[D].University of Southampton,2011
[7] Song Shan-shan,Hwang K,Macwan M.Fuzzy Trust Integration for Security Enforcement in Grid Computing[C]∥ International Symposium on Network and Parallel Computing(NPC2004).Heidelberg:Spring Verlag,2004:9-21
[8] 王文婧,杜惠英,吕廷杰.基于第三方认证的云服务信任模型[J].系统工程理论与实践,2012,2(12):2774-2780
[9] 黄德才,陈姜倩.基于集对分析的信任评估模型及其在服务选择中的应用[J].计算机科学,2012,9(1):210-214
[10] 唐文,胡建斌,陈钟.基于模糊逻辑的主观信任模型研究[J].计算机研究与发展,2005,2(10):1654-1659
[11] 黄海生,王汝传.基隶属云理论的主观信任评估模型研究[J].通信学报,2008,9(4):13-19
[12] 王守信,张莉,李鹤松.一种基于云模型的主观信任评价方法[J].软件学报,2010,1(6):1341-1352
[13] 谢立军,朱智强,孙磊,等.基于隶属度理论的云服务行为信任评估模型研究[J].计算机应用研究,2013,0(4):1051-1054
[14] 李德毅,杜鹢.不确定性人工智能[M].北京:国防工业出版社,2005
[15] 李德毅,刘常昱.论正态云模型的普适性[J].计算机工程科学,2004,6(8):431-440
[16] Ran S.A model for Web services discovery with QoS[J].ACM SIGEcom Exchanges,2003,4(1):1-10
[17] 孟祥怡,张光卫,刘常昱,等.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,9(14):3310-3317

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!