Credibility protection for resource sharing and collaborating in non-center network computing environments

作者: Xiao-long XU , Qun TU , Xin-heng WANG , Ru-chuan WANG

DOI: 10.1016/S1005-8885(14)60300-9

关键词:

摘要: Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security reliability. This article proposes a brand-new credibility protection mechanism for resource sharing collaboration in non-center environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, provides basic framework realizations identity credibility, behavior capability credibility. Next, agent technology utilized to construct model. also new comprehensive evaluation algorithm with simple, efficient, quantitative able meet requirements evaluating well. The Dempster-Shafer theory evidence combination rule are used achieve evaluated current historical performance nodes providers consumers realize more accurate prediction. Based on simulation test platform, been conducted validity proposed algorithms. Experiment analysis show that algorithms suitable large-scale, dynamic environments, maintain networks without relying central node, make gradually evolve into an orderly, stable reliable environment efficiently.

参考文章(19)
Huaimin Wang, Yangbin Tang, Gang Yin, Lei Li, Trustworthiness of Internet-based software Science in China Series F: Information Sciences. ,vol. 49, pp. 759- 773 ,(2006) , 10.1007/S11432-006-2024-4
Xicheng Lu, Huaimin Wang, Ji Wang, Jie Xu, Dongsheng Li, Internet-based Virtual Computing Environment Future Generation Computer Systems. ,vol. 29, pp. 309- 322 ,(2013) , 10.1016/J.FUTURE.2011.08.005
ChangXiang Shen, HuanGuo Zhang, HuaiMin Wang, Ji Wang, Bo Zhao, Fei Yan, FaJiang Yu, LiQiang Zhang, MingDi Xu, Research on trusted computing and its development Science in China Series F: Information Sciences. ,vol. 53, pp. 405- 433 ,(2010) , 10.1007/S11432-010-0069-X
Zheng Yan, Peng Zhang, Robert H Deng, None, TruBeRepec: a trust-behavior-based reputation and recommender system for mobile applications ubiquitous computing. ,vol. 16, pp. 485- 506 ,(2012) , 10.1007/S00779-011-0420-2
Xiaofeng Wang, Ling Liu, Jinshu Su, RLM: A General Model for Trust Representation and Aggregation IEEE Transactions on Services Computing. ,vol. 5, pp. 131- 143 ,(2012) , 10.1109/TSC.2010.56
Jun Li, Xiaolin Zheng, Deren Chen, William Wei Song, Trust Based Service Selection in Service Oriented Environment International Journal of Web Services Research. ,vol. 9, pp. 23- 42 ,(2012) , 10.4018/JWSR.2012070102
Yan Wang, Lei Li, Two-dimensional trust rating aggregations in service-oriented applications IEEE Transactions on Services Computing. ,vol. 4, pp. 257- 271 ,(2011) , 10.1109/TSC.2010.39
WeiJin Jiang, LianMei Zhang, Pu Wang, Dynamic scheduling model of computing resource based on MAS cooperation mechanism Science in China Series F: Information Sciences. ,vol. 52, pp. 1302- 1320 ,(2009) , 10.1007/S11432-009-0151-4
Huanyu Zhao, Xiaolin Li, H-trust: a group trust management system for pee-to-peer desktop grid Journal of Computer Science and Technology. ,vol. 24, pp. 833- 843 ,(2009) , 10.1007/S11390-009-9275-7