A reliable recommendation and privacy-preserving based cross-layer reputation mechanism for mobile cloud computing

作者: Hui Lin , Li Xu , Yi Mu , Wei Wu

DOI: 10.1016/J.FUTURE.2014.10.032

关键词:

摘要: Mobile cloud computing (MCC) is gaining popularity due to anywhere anytime data access. However, at the same time it also introduces new privacy and security threats that have become an obstacle widespread use of MCC. In this paper, we propose a reliable recommendation preserving based cross-layer reputation mechanism (RP-CRM) provide secure privacy-aware communication process in wireless mesh networks (WMNs) MCC (WM-MCC). RP-CRM integrates design with reliability evaluation scheme identify manage internal malicious nodes protect against multi-layer attack, bad mouthing attack information disclosure attack. Simulation results performance analysis demonstrate can rapid accurate node identification management, protection aforementioned attacks more effectively efficiently. A (RP-CRM).The secure, efficient.Rapid detection management node.The effective rate higher than SLCRM FSLR.The successful acceptation better FSLR.

参考文章(30)
Shuhong Chen, Guojun Wang, Weijia Jia, A Trust Model Using Implicit Call Behavioral Graph for Mobile Cloud Computing International Symposium on Cyberspace Safety and Security. pp. 387- 402 ,(2013) , 10.1007/978-3-319-03584-0_29
Hui, Jianfeng, Lin, Ma, Hu, Jia, SLCRM: Subjective Logic-Based Cross-Layer Reputation Mechanism for Wireless Mesh Networks 中国通信. ,vol. 9, pp. 40- 48 ,(2012)
Jaydip Sen, Security and Privacy Issues in Wireless Mesh Networks: A Survey Signals and Communication Technology. pp. 189- 272 ,(2013) , 10.1007/978-3-642-36169-2_7
Jiyong Jang, Taekyoung Kwon, Jooseok Song, A time-based key management protocol for wireless sensor networks information security practice and experience. pp. 314- 328 ,(2007) , 10.1007/978-3-540-72163-5_24
Yining Liu, Keqiu Li, Yingwei Jin, Yong Zhang, Wenyu Qu, None, A novel reputation computation model based on subjective logic for mobile ad hoc networks Future Generation Computer Systems. ,vol. 27, pp. 547- 554 ,(2011) , 10.1016/J.FUTURE.2010.03.006
Haiying Shen, Yuhua Lin, Ze Li, Refining Reputation to Truly Select High-QoS Servers in Peer-to-Peer Networks IEEE Transactions on Parallel and Distributed Systems. ,vol. 24, pp. 2439- 2450 ,(2013) , 10.1109/TPDS.2012.338
Rajkumar Buyya, Chee Shin Yeo, Srikumar Venugopal, James Broberg, Ivona Brandic, None, Cloud computing and emerging IT platforms: Vision, hype, and reality for delivering computing as the 5th utility Future Generation Computer Systems. ,vol. 25, pp. 599- 616 ,(2009) , 10.1016/J.FUTURE.2008.12.001
Ahmed Hammam, Samah Senbel, None, A trust management system for ad-hoc mobile clouds international conference on computer engineering and systems. pp. 31- 38 ,(2013) , 10.1109/ICCES.2013.6707167
Honggang Wang, Shaoen Wu, Min Chen, Wei Wang, Security protection between users and the mobile media cloud IEEE Communications Magazine. ,vol. 52, pp. 73- 79 ,(2014) , 10.1109/MCOM.2014.6766088
Nadia Moati, Hadi Otrok, Azzam Mourad, Jean-Marc Robert, Reputation-Based Cooperative Detection Model of Selfish Nodes in Cluster-Based QoS-OLSR Protocol Wireless Personal Communications. ,vol. 75, pp. 1747- 1768 ,(2014) , 10.1007/S11277-013-1419-Y