Computer Science ›› 2015, Vol. 42 ›› Issue (Z11): 386-389.

Previous Articles     Next Articles

Improved Design for Trust Model on Domain Entity of Computing Grid

YANG Zhang-wei, WANG Li-ping and LAI Wen-ping   

  • Online:2018-11-14 Published:2018-11-14

Abstract: Traditional trust model of computing grid based on trusted domains has less secure,which uses the number of entity as the only parameter of trust value calculation complexity.The paper proposed an improved autonomous entity trust model based on existing model of computing grid,introduced the time decay and penalty factor and established a direct and recommendation trust model of GSP for user.The simulation results show that the proposed model has a higher defense capabiliy to Whitewashing attack.

Key words: Computing grid,Trust model,UTA,GSP,Whitewashing attack

[1] Yang Zhang-wei.Research on trust model inautonomous domain of campus grid[C]∥Proceedings of 2011 International Confe-rence on Computer Science and Service System.IEEE Computer Society,2011
[2] 马礼,郑纬民.信息网格环境下的综合信任度评价模型[J].清华大学学报(自然科学版),2009(4):599-603
[3] Rahman A A,Hailes S.Supporting Trust in Virtual Communities[C]∥Proceedings of the 33rd Hawaii International Conference on System Sciences.Washington DC,USA:[s.n.],2000:6007-6016
[4] Josang A,Knapskog S J.A metric for trusted systems[C]∥Proceedings of the 21st National Security Conference.NSA,1998
[5] Azzedin F,Maheswaran M.Towards Trust-Aware ResourceManagement in Grid Computing Systems[C]∥Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid.2002:1-6
[6] 李小勇,桂小林.可信网络中基于多维决策属性的信任量化模型[J].计算机学报,2009,2(3):405-416
[7] Josang A,Hird S,Faccer E.Simulating the Effect of Reputation Systems on e-Markets[C]∥the Proceedings of the First International Conference on Trust Management.Creece,2003:179-194

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] . [J]. Computer Science, 2018, 1(1): 1 .
[2] LEI Li-hui and WANG Jing. Parallelization of LTL Model Checking Based on Possibility Measure[J]. Computer Science, 2018, 45(4): 71 -75, 88 .
[3] XIA Qing-xun and ZHUANG Yi. Remote Attestation Mechanism Based on Locality Principle[J]. Computer Science, 2018, 45(4): 148 -151, 162 .
[4] LI Bai-shen, LI Ling-zhi, SUN Yong and ZHU Yan-qin. Intranet Defense Algorithm Based on Pseudo Boosting Decision Tree[J]. Computer Science, 2018, 45(4): 157 -162 .
[5] WANG Huan, ZHANG Yun-feng and ZHANG Yan. Rapid Decision Method for Repairing Sequence Based on CFDs[J]. Computer Science, 2018, 45(3): 311 -316 .
[6] SUN Qi, JIN Yan, HE Kun and XU Ling-xuan. Hybrid Evolutionary Algorithm for Solving Mixed Capacitated General Routing Problem[J]. Computer Science, 2018, 45(4): 76 -82 .
[7] ZHANG Jia-nan and XIAO Ming-yu. Approximation Algorithm for Weighted Mixed Domination Problem[J]. Computer Science, 2018, 45(4): 83 -88 .
[8] WU Jian-hui, HUANG Zhong-xiang, LI Wu, WU Jian-hui, PENG Xin and ZHANG Sheng. Robustness Optimization of Sequence Decision in Urban Road Construction[J]. Computer Science, 2018, 45(4): 89 -93 .
[9] LIU Qin. Study on Data Quality Based on Constraint in Computer Forensics[J]. Computer Science, 2018, 45(4): 169 -172 .
[10] ZHONG Fei and YANG Bin. License Plate Detection Based on Principal Component Analysis Network[J]. Computer Science, 2018, 45(3): 268 -273 .