一种正态分布下的动态推荐信任模型
作者:
基金项目:

国家自然科学基金(60975033, 60575035, 60275022, 69985004); 安徽高校省级自然科学研究重点项目(KJ2010A272)


Normal Distribution Based Dynamical Recommendation Trust Model
Author:
  • 摘要
  • | |
  • 访问统计
  • |
  • 参考文献 [32]
  • |
  • 相似文献 [20]
  • |
  • 引证文献
  • | |
  • 文章评论
    摘要:

    建立基于连续过程的推荐信任模型,描述间接信任这种最复杂的信任关系,在保障开放环境的安全和开放系统的可靠运行方面有着重要意义.通过量化间接信任影响因素,运用分级剪枝方法过滤推荐信息,将结果作为正态过程的采样样本,计算获取后验分布期望的Bayesian 估计值.在此基础上,详细阐述信任动态演化的过程,深入探讨信任度和可信度之间的关系,给出了命题及其数学证明.实验数据表明,模型提高了抵御恶意攻击的能力,得出了更加有效和精确的结果,与相关命题的数学推导相一致.

    Abstract:

    On the basis of a continuous process, the recommendation trust model is built for depicting indirect trust, the most complicated trust relationship. The model is also significant for the security and reliability of an open environment and open systems. After the factors influencing indirect trust are quantified, the filtrated recommendations are regarded as samples from the normal process, and the Bayesian estimation value of posteriori distribution expectation is obtained from calculation. Next, after an elaborate discussion of the trust evolution and the relationship between trust value and trustworthiness along with some propositions and proofs are proposed. Experimental data show that with the capacity of resisting malicious attacks improved, the model gives a more effective and precise result, which is also consistent with mathematical deduction.

    参考文献
    [1] Blaze M, Feigenbaum J, Lacy J. Decentralized trust management. In: Dale J, Dinolt G, eds. Proc. of the 17th Symp. on Security andPrivacy. Oakland: IEEE Computer Society Press, 1996. 164-173. [doi: 10.1109/SECPRI.1996.502679]
    [2] Blaze M, Feigenbaum J, Keromytis AD. Keynote: Trust management for public-key infrastructures. In: Christianson B, Crispo B,William S, et al., eds. Proc. of the Cambridge 1998 Security Protocols Int'l Workshop. Berlin: Springer-Verglag, 1999. 59-63. [doi:10.1007/3-540-49135-X_9]
    [3] Almenárez F, Andrés A, Campo C, García RC. PTM: A pervasive trust management model for dynamic open environments. In:Proc. of the 1st Workshop on Pervasive Security, Privacy and Trust. 2004. [doi: 10.1.1.99.7607]
    [4] Almenárez F, Marín A, Díaz D, Sanchéz J. Developing a model for trust management in pervasive devices. In: Werner B, ed. Proc.of the 3rd IEEE Int'l Workshop on Pervasive Computing and Communication Security (PerSec 2006). Washington: IEEE ComputerSociety Press, 2006. 267-272. [doi: 10.1109/PERCOMW.2006.41]
    [5] Almenárez F, Marín A, Campo C, García RC. TrustAC: Trust-Based access control for pervasive devices. LNCS 450, Berlin:Springer-Verlag, 2005. 225-238. [doi: 10.1007/11414360_22]
    [6] Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In: Gollmann D, ed. Proc. of the European Symp. onResearch in Security (ESORICS). Brighton: Springer-Verlag, 1994. 3-18. [doi: 10.1007/3-540-58618-0_53]
    [7] Jameel H, Hung LX, Kalim U, Sjjad A, Lee SY, Lee YK. A trust model for ubiquitous systems based on vectors of trust values. In:Proc. of the 7th IEEE Int'l Symp. on Multimedia. Washington: IEEE Computer Society Press, 2005. 674-679. [doi: 10.1109/ISM.2005.22]
    [8] Jøsang A, Ismail R. The beta reputation system. In: Proc. of the 15th Bled Electronic Commerce Conf. 2002. [doi: 10.1.1.60. 5461]
    [9] Melaye D, Demazeau Y. Bayesian dynamic trust model. LNCS 3690, Berlin: Springer-Verlag, 2005. 480-489. [doi: 10.1007/11559221_48]
    [10] Theodorakopoulos G, Baras JS. On trust models and trust evaluation metrics for ad-hoc networks. IEEE Journal on Selected Areasin Communications, 2006,24(2):318-328. [doi: 10.1109/JSAC.2005.861390]
    [11] Theodorakopoulos G. Distributed trust evaluation in ad-hoc networks [MS. Thesis]. Maryland: University of Maryland, 2004.
    [12] Sun Y, Yu W, Han Z, Liu KJR. Information theoretic framework of trust modeling and evaluation for ad hoc networks. IEEEJournal on Selected Areas in Communications, 2006,249(2):305-319. [doi: 10.1109/JSAC.2005.861389]
    [13] Sun Y, Yu W, Han Z, Liu KJR. Trust modeling and evaluation in ad hoc networks. In: Proc. of the Global TelecommunicationsConf. (Globecom 2005). Washington: IEEE Computer Society Press, 2005. 1-10. [doi: 10.1109/GLOCOM.2005.1577971]
    [14] He R, Niu JW, Zhang GW. CBTM: A trust model with uncertainty quantification and reasoning for pervasive computing. LNCS3758. Berlin: Springer-Verlag, 2005. 541-552. [doi: 10.1007/11576235_56]
    [15] Li DY, Meng HJ, Shi XM. Membership clouds and membership clouds generator. Journal of Computer Research and Development,1995,32(6):15-20 (in Chinese with English abstract). [doi: CNKI:SUN:JFYZ.0.1995-06-002]
    [16] Song SS, Hwang K, Macwan M. Fuzzy trust integration for security enforcement in grid computing. In: Proc. of the Int'l Symp. onNetwork and Parallel Computing (NPC 2004). LNCS 3222, Berlin: Springer-Verlag, 2005. 9-21. [doi: 10.1007/978-3-540-30141-7_6]
    [17] Li XY, Gui XL. Cognitive model of dynamic trust forecasting. Journal of Software, 2010,21(1):163-176 (in Chinese with Englishabstract). http://www.jos.org.cn/1000-9825/3558.htm [doi: 10.3724/SP.J.1001.2010.03558]
    [18] Sun YX, Huang SH, Chen LJ, Xie L. Bayesian decision-making based recommendation trust revision model in ad hoc networks.Journal of Software, 2009,20(9):2574-2586. http://www.jos.org.cn/1000-9825/579.htm [doi: 10.3724/SP.J.1001.2009.00579]
    [19] Liang ZQ, Shi WS. Analysis of ratings on trust inference in open environment. Journal of Performance Evaluation, 2008,65(2):99-128. [doi: 10.1016/j.peva.2007.04.001]
    [20] Carbone M, Nielsen M, Sassone V. A formal model for trust in dynamic networks. In: Proc. of the Int'l Conf. on SoftwareEngineering and Formal Methods (SEFM 2003). IEEE, 2003. [doi: 10.1109/SEFM.2003.1236207]
    [21] Hung NQ, Shehzad A, Liaquat S, Riaz M, Lee SY. Developing context-aware ubiquitous computing systems with a unifiedmiddleware framework. In: Proc. of the 2004 Int'l Conf. on Embedded and Ubiquitous Computing. Springer-Verlag, 2004.672-681. [doi: 10.1007/978-3-540-30121-9_64]
    [22] Ashri R, Ramchurn SD, Sabater J, Luck M, Jennings NR. Trust evaluation through relationship analysis. In: Proc. of the 4th Int'lJoint Conf. on Autonomous Agents and Multi-Agent Systems. 2005. 1005-1011. [doi: 10.1145/1082473.1082625]
    [23] Ren K, Li T, Wan Z, Bao F, Deng R, Kim K. Highly reliable trust establishment scheme in ad hoc networks. Computer Networks,2004,45:687-699. [doi: 10.1016/j.comnet.2004.01.008]
    [24] Li XY, Gui XL. Research on dynamic trust model for large scale distributed environment. Journal of Software, 2007,18(6):1510-1521 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/18/1510.htm [doi: 10.1360/jos181510]
    [25] Xu F, Lü J. Research and development of trust management in Web security. Journal of Software, 2002,13(11):2057-2064 (inChinese with English abstract). http://www.jos.org.cn/ch/reader/view_abstract.aspx?flag=1&file_no=20021101&journal_id=jos
    [26] Wang Y, Lü J, Xu F, Zhang L. A trust measurement and evolution model for internetware. Journal of Software, 2006,17(4):628-690 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/17/682.htm [doi: 10.1360/jos170682]
    [27] Xu F, Lü J, Zheng W, Cao C. Design of a trust valuation model in software service coordination. Journal of Software, 2003,14(6):1043-1051 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/14/1043.htm
    [28] Yang FQ, Mei H, Lü J, Jin Z. Some discussion on the development of software technology. ACTA ELECTRONICA SINICA,2003,26(9):1104-1115 (in Chinese with English abstract). [doi: CNKI:ISSN:0372-2112.0.2002-S1-000]
    [29] 吕建,马晓星,陶先平,徐锋,胡昊.网构软件的研究与进展.中国科学(E 辑:信息科学),2006,36(10):1037-1080.
    [30] 吕建,马晓星,陶先平,曹春,黄宇,余萍.面向网构软件环境驱动模型与支撑技术研究.中国科学(E 辑:信息科学),2008,38(6):864-900.
    [31] 杨芙清,吕建,梅宏.网构软件技术体系:一种以体系结构为中心的途径.中国科学(E 辑:信息科学),2008,38(6):818-828.
    [32] 吕建,陶先平,马晓星,胡昊,徐锋,曹春.基于Agent 的网构软件模型研究.中国科学(E 辑:信息科学),2005,35(12):1233-1253.
    网友评论
    网友评论
    分享到微博
    发 布
引用本文

邵堃,罗飞,梅袅雄,刘宗田.一种正态分布下的动态推荐信任模型.软件学报,2012,23(12):3130-3148

复制
分享
文章指标
  • 点击次数:4372
  • 下载次数: 6973
  • HTML阅读次数: 0
  • 引用次数: 0
历史
  • 收稿日期:2010-12-13
  • 最后修改日期:2012-02-22
  • 在线发布日期: 2012-12-05
文章二维码
您是第19780923位访问者
版权所有:中国科学院软件研究所 京ICP备05046678号-3
地址:北京市海淀区中关村南四街4号,邮政编码:100190
电话:010-62562563 传真:010-62562533 Email:jos@iscas.ac.cn
技术支持:北京勤云科技发展有限公司

京公网安备 11040202500063号