Computer Science ›› 2016, Vol. 43 ›› Issue (8): 105-109.doi: 10.11896/j.issn.1002-137X.2016.08.022

Previous Articles     Next Articles

Dynamic Trust Model Based on DS Evidence Theory under Cloud Computing Environment

SHU Jian and LIANG Chang-yong   

  • Online:2018-12-01 Published:2018-12-01

Abstract: Cloud computing technology faces the new security problems of privacy disclosure and information lost.How to identify and manage the trust degree of nodes in cloud system becomes a important research area of cloud security.Then the trust model can provide a new idea to solve it.Considering that the architecture of cloud computing is a distributed system,combining with the DS evidence theory and trust mechanism,a dynamic trust model based on DS theory was built under the cloud environment.In the model, subjective and objective trust values are merged into a integrated trust-value to describe the safety and credibility of the cloud nodes.The problems of trust value initialization and updating,malicious nodes punishment and load balancing were discussed.Simulation experiment proves the effectiveness,balance and robustness of the model.Finally,the summary and the prospects for future research were put forward.

Key words: Cloud computing,Information security,Trust mechanism,DS evidence theory

[1] Lin C,Su W B,Meng K,et al.Cloud Computing Security:Architecture Mechanism and Modeling [J].Chinese Journal of Computer,2013,36(9):1765-1784(in Chinese) 林闯,苏文博,孟坤,等.云计算安全:架构,机制与模型评价[J].计算机学报,2013,36(9):1765-1784
[2] Kirthica S,Sridhar R.Solution for Traversal Vulnerability and an Encryption-Based Security Solution for an Inter-cloud Environment [M]∥Computational Intelligence in Data Mining.Vo-lume 2,Springer India,2015:283-291
[3] Yu Neng-hai,et al.Review of cloud computing security[J].Acta Electronica Sinica,2013,1(2):371-381(in Chinese) 俞能海,等.云安全研究进展综述[J].电子学报,2013,1(2):371-381
[4] Feng Chao-sheng,et al.Key Techniques of Access Control for Cloud Computing[J].Acta Electronica Sinica,2015,43(2):312-319(in Chinese) 冯朝胜,等.云计算环境下访问控制关键技术[J].电子学报,2015,3(2):312-319
[5] Zacharia G,Moukas A,Maes P.Collaborative reputation mechanisms for electronic market places[J].Decision Support Systems,2000,9(4):371-388
[6] Li Xiao-yong,Gui Xiao-lin.Research on Dynamic Trust Model for Large Scale Distributed Environment[J].Journal of Software,2007(6):1510-1521(in Chinese) 李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007(6):1510-1521
[7] Blaze M,et al.Decentralized Trust Management[C]∥Procee-dings of 1996 IEEE Symposium on Security and Privacy.IEEE,1996:164-173
[8] Yang M H,Wang Z P,Yao J J.Research on a new cloud trust model and its defense abilities [J].Manufacturing and Enginee-ring Technology,2014,1(1):399-405
[9] Jaiganesh M,Aarthi M,Kumar A V A.Fuzzy ART-Based User Behavior Trust in Cloud Computing[M]∥Artificial Intelligence and Evolutionary Algorithms in Engineering Systems.Springer India,2015:341-348
[10] Kumar T S,Pandey S.Customization of Recommendation System Using Collaborative Filtering Algorithm on Cloud Using Mahout[M]∥Intelligent Distributed Computing.Springer International Publishing,2015:1-10
[11] Zhu Rui,Wang Huai-min,Feng Da-wei.Trustworthy ServicesSelection Based on Preference Recommendation[J].Journal of Software,2011(5):852-864(in Chinese) 朱锐,王怀民,冯大为.基于偏好推荐的可信服务选择[J].软件学报,2011(5):852-864
[12] Moghaddam M G,Mustapha N.AgeTrust:A New TemporalTrust-Based Collaborative Filtering Approach[C]∥Preceedings of 2014 International Conference on Information Science and Applications(ICISA).2014:1-4
[13] Song Guo-feng,Liang Chang-yong.A cloud security access control model based on user behavior trust[C]∥The 15th China Management Science Academic Essays.2013(in Chinese) 宋国峰,梁昌勇.一种基于用户行为信任的云安全访问控制模型[C]∥第十五届中国管理科学学术年会论文集 (下).2013
[14] Dempster A P.Upper and lower probabilities induced by a multiple valued mapping[J].The Annals of Mathematical Statistics,1967,38(2):325-339
[15] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton University Press,1976
[16] 段新生.证据理论与决策、人工智能[M].北京:中国人民大学出版社,1990:13-35
[17] Sevastianov P,Dymova L,Bartosiewicz P.A framework for rule-base evidential reasoning in the interval setting applied to diagnosing type 2 diabetes[J].Expert Systems with Applications,2012,39(4):4190-4200
[18] Dempster A.Upper and Lower Probabilities Induced by Multivalued Mapping [J].Annalys of Mathematical Statistics,1967,38(2):325-339
[19] Shafer G.A mathematical theory of evidence[M].Princeton:Princeton university press,1976
[20] Zhu Jun-mao,et al.A Grid & P2P trust model based on recommendation evidence reasoning.Journal of Computer Research and Development,2005,42(5):797-803(in Chinese) 朱唆茂,等.Grid与P2P混合计算环境下基于推荐证据推理的信任模型[J].计算机研究与发展,2005,42(5):797-803

No related articles found!
Viewed
Full text


Abstract

Cited

  Shared   
  Discussed   
No Suggested Reading articles found!