计算机科学 ›› 2014, Vol. 41 ›› Issue (12): 38-42.doi: 10.11896/j.issn.1002-137X.2014.12.009

• 第十届中国信息和通信安全学术会议 • 上一篇    下一篇

云计算环境下服务信任评估方法研究

王晋东,卫波,张恒巍,何嘉婧   

  1. 解放军信息工程大学三院 郑州450001;解放军信息工程大学三院 郑州450001;解放军信息工程大学三院 郑州450001;解放军信息工程大学三院 郑州450001
  • 出版日期:2018-11-14 发布日期:2018-11-14
  • 基金资助:
    本文受国家自然科学基金项目(61303074),河南省科技攻关计划项目(12210231003)资助

Research on Service Trust Evaluation Approach under Cloud Computing Environment

WANG Jin-dong,WEI Bo,ZHANG Heng-wei and He Jia-jing   

  • Online:2018-11-14 Published:2018-11-14

摘要: 云计算环境中,服务资源广域分布、复杂多变,服务实体之间的信任关系因不确定性强而难以有效建立与维护。传统的服务信任评估方法无法全面反映信任的随机性和模糊性特征。在研究云模型理论的基础上,提出一种基于加权多属性云的服务信任评估方法。引入时间衰减因子来反映服务信任的时效性,并以多属性信任云来细化信任评估的粒度。计算用户评价相似度,确定推荐实体的推荐可靠性和权重,防止不法分子的合谋欺骗和恶意攻击。通过云相似度计算确定服务的信任等级,为用户的服务选择提供安全决策。仿真结果表明,该方法明显提高了服务交互成功率,并能有效适用于云计算环境下的服务信任评估。

关键词: 云服务,云模型,信任评估,信任云,信任等级

Abstract: In cloud computing,the resources of service are widely distributed,complex and fickle.The trust relationship among service entities is hard to establish and maintain with high uncertainty.The characteristics of randomness and fuzziness of services cannot be responded by traditional trust evaluation approach comprehensively,so a service trust evaluation method based on weighted multi-attribute cloud was proposed.Time decay factor was introduced to reflect the timeliness of trust,and multi-attribute trust cloud was used to refine the evaluation granularity.In order to prevent conspiracy to defraud and malicious attacks,the reliability and weight of recommender were confirmed by similarity of eva-luation,and the trust rating was confirmed by cloud similarity calculation to provide security decisions for the user’s services selection.Simulation results show that this method can improve the success rate of services interaction obviously,and it can be applied to service trust evaluation under cloud computing environment.

Key words: Cloud service,Cloud model,Trust evaluation,Trust cloud,Trust rating

[1] Buyya R,Yeo C S,Venugopal S,et al.Cloud computing and emerging IT platforms:vision,hype,and reality for delivering computing as the 5th utility[J].Future Generation Computer Systems,2009,25(6):599-616
[2] Armbrust M,Fox A,Griffith R,et al.A view of cloud computing[J].Communications of the ACM,2010,53(4):50-58
[3] 冯登国,张敏,张妍,等.云计算安全研究[J].软件学报,2011,2(1):71-82
[4] Vivekananth P.Reputation Based Trust Model for Grid withEnhanced Reliabilty[C]∥Junior E R H,et al.,eds.INTECH 2011,CCIS.Berlin Heidelberg:Springer-Verlag,2011
[5] Josang A,Presti S.Analyzing the relationship between risk and trust[C]∥iTrust04:Proceedings of the Second International Conference on Trust Management.Berlin:Springer-Verlag,2004
[6] Ehab M,ElSalamouny.Probabilistic trust models in network security[D].University of Southampton,2011
[7] Song Shan-shan,Hwang K,Macwan M.Fuzzy Trust Integration for Security Enforcement in Grid Computing[C]∥ International Symposium on Network and Parallel Computing(NPC2004).Heidelberg:Spring Verlag,2004:9-21
[8] 王文婧,杜惠英,吕廷杰.基于第三方认证的云服务信任模型[J].系统工程理论与实践,2012,2(12):2774-2780
[9] 黄德才,陈姜倩.基于集对分析的信任评估模型及其在服务选择中的应用[J].计算机科学,2012,9(1):210-214
[10] 唐文,胡建斌,陈钟.基于模糊逻辑的主观信任模型研究[J].计算机研究与发展,2005,2(10):1654-1659
[11] 黄海生,王汝传.基隶属云理论的主观信任评估模型研究[J].通信学报,2008,9(4):13-19
[12] 王守信,张莉,李鹤松.一种基于云模型的主观信任评价方法[J].软件学报,2010,1(6):1341-1352
[13] 谢立军,朱智强,孙磊,等.基于隶属度理论的云服务行为信任评估模型研究[J].计算机应用研究,2013,0(4):1051-1054
[14] 李德毅,杜鹢.不确定性人工智能[M].北京:国防工业出版社,2005
[15] 李德毅,刘常昱.论正态云模型的普适性[J].计算机工程科学,2004,6(8):431-440
[16] Ran S.A model for Web services discovery with QoS[J].ACM SIGEcom Exchanges,2003,4(1):1-10
[17] 孟祥怡,张光卫,刘常昱,等.基于云模型的主观信任管理模型研究[J].系统仿真学报,2007,9(14):3310-3317

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
[1] 编辑部. 新网站开通,欢迎大家订阅![J]. 计算机科学, 2018, 1(1): 1 .
[2] 雷丽晖,王静. 可能性测度下的LTL模型检测并行化研究[J]. 计算机科学, 2018, 45(4): 71 -75 .
[3] 孙启,金燕,何琨,徐凌轩. 用于求解混合车辆路径问题的混合进化算法[J]. 计算机科学, 2018, 45(4): 76 -82 .
[4] 张佳男,肖鸣宇. 带权混合支配问题的近似算法研究[J]. 计算机科学, 2018, 45(4): 83 -88 .
[5] 伍建辉,黄中祥,李武,吴健辉,彭鑫,张生. 城市道路建设时序决策的鲁棒优化[J]. 计算机科学, 2018, 45(4): 89 -93 .
[6] 史雯隽,武继刚,罗裕春. 针对移动云计算任务迁移的快速高效调度算法[J]. 计算机科学, 2018, 45(4): 94 -99 .
[7] 周燕萍,业巧林. 基于L1-范数距离的最小二乘对支持向量机[J]. 计算机科学, 2018, 45(4): 100 -105 .
[8] 刘博艺,唐湘滟,程杰仁. 基于多生长时期模板匹配的玉米螟识别方法[J]. 计算机科学, 2018, 45(4): 106 -111 .
[9] 耿海军,施新刚,王之梁,尹霞,尹少平. 基于有向无环图的互联网域内节能路由算法[J]. 计算机科学, 2018, 45(4): 112 -116 .
[10] 崔琼,李建华,王宏,南明莉. 基于节点修复的网络化指挥信息系统弹性分析模型[J]. 计算机科学, 2018, 45(4): 117 -121 .