Computer Science ›› 2015, Vol. 42 ›› Issue (Z6): 315-320.

Previous Articles     Next Articles

Trust Model of Cloud Computing Based on Multi-parameters Evaluation

WANG Jun, LIU Wen-fen and GAO Yan   

  • Online:2018-11-14 Published:2018-11-14

Abstract: A novel trust model was put forward to solve the trust problem of cloud resource providers.In order to help users select the safest resource in a large number of providers,trust evaluation considered five parameters in cloud service process:availability,reliability,data integrity,honesty and turnaround efficiency.These parameters make a comprehensive assessment on the resource providers with subjective evaluation and objective data.The model achieves dynamic analysis of massive data by using some methods,such as Bayesian statistics and time attenuation function,and the statistical result can reflect the quality of service in time.Due to the different degree of users relying on each parameter,the model distributes the weight value of trust factor combining the way of constructing weight vector in analytic hierarchy process(AHP) to meet the special need of individual users.The result of simulation experiment verifies the model can resist strategic attack with certain practicality.

Key words: Cloud computing,Trust evaluation,Selection of resource provider

[1] 冯登国,张敏,张妍.云计算安全研究[J].软件学报,2011,2(1):71-83
[2] Manuel P.A trust model of cloud computing based on Quality of Service[J].Annals of Operations Research,2013,4
[3] 桂小林,李小勇.信任管理与计算[M].西安:西安交通大学出版社,2011
[4] 吴鹏,吴国新,方群.一种基于概率统计方法的P2P系统信任评价模型[J].计算机研究与发展,2008,5(3):408-416
[5] 常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间的动态信任模型[J].计算机学报,2006,9(8):1301-1307
[6] 李峰,申利民,司亚利,等.基于交互感知的动态自适应的信任评估模型[J].通信学报,2012,33(10):60-70
[7] Boreale M,Celestini A.Asymptotic Risk Analysis for Trust and Reputation Systems[C]∥Springer-Verlag Berlin Heidelberg 2013,SOFSEM 2013,LNCS 7741,3.169-181
[8] Jsang A,Hayward R,Pope S.Trust network analysis with subjective logic[C]∥Proceedings of the Australasian computer science conference (ACSC’06).Hobart,2006:139-161
[9] Sun Y L,Han Z,Yu W,et al.A trust evaluation framework in distributed networks:vulnerability analysis and defense against attacks[C]∥IEEE INFOCOM.Barcelona,Spain,2006:1-13
[10] Boukerche A,Ren Y.A trust-based security system for ubiquitous and pervasive computing environments[J].Computer Communications,2008,31(18):43-51
[11] 胡春华,刘济波,刘建勋.云计算环境下基于信任演化及集合的服务选择[J].通信学报,2011,2(7):71-79
[12] 谢晓兰,刘亮,赵鹏.面向云计算基于双层激励和欺骗检测的信任模型[J].电子与信息学报,2012,4(4):812-817
[13] 熊润群,罗军舟,宋爱波,等.云计算环境下QoS偏好感知的副本选择策略[J].通信学报,2011,2(7):93-102
[14] Abbadi I M,Alawneh M.A framework for establishing trust in the cloud[J].Computers and Electrical Engineering,38(5),1073-1087
[15] Noor T H,Sheng Q Z.Trust as a service:a framework for trust management in cloud environments[C]∥Web information system engineering(WISE 2011).2011,6997:314-321
[16] 茆诗松.贝叶斯统计[M].北京:中国统计出版社,1999
[17] Das A,Islam M M.Dynamic Trust Model for Reliable Transactions inMulti-agent Systems[C]∥Proceedings of the 13th International Conference on Advanced Communication Technology.Seoul,2011:1101-1106
[18] 数学手册[M].北京:人民教育出版社,1978

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!