高级检索
    蒋黎明, 张 琨, 徐 建, 张 宏. 一种基于图论方法的开放计算系统证据信任模型[J]. 计算机研究与发展, 2013, 50(5): 921-931.
    引用本文: 蒋黎明, 张 琨, 徐 建, 张 宏. 一种基于图论方法的开放计算系统证据信任模型[J]. 计算机研究与发展, 2013, 50(5): 921-931.
    Jiang Liming, Zhang Kun, Xu Jian, Zhang Hong. A New Evidential Trust Model Based on Graph Theory for Open Computing Systems[J]. Journal of Computer Research and Development, 2013, 50(5): 921-931.
    Citation: Jiang Liming, Zhang Kun, Xu Jian, Zhang Hong. A New Evidential Trust Model Based on Graph Theory for Open Computing Systems[J]. Journal of Computer Research and Development, 2013, 50(5): 921-931.

    一种基于图论方法的开放计算系统证据信任模型

    A New Evidential Trust Model Based on Graph Theory for Open Computing Systems

    • 摘要: 基于图论方法提出了一种新的证据信任模型(graph theory based evidential trust model, GTETM),解决了现有证据信任模型中普遍存在的在信任聚合过程中缺少对信任链之间依赖关系的有效处理等引起的模型性能下降问题.同时,GTETM在建模实体的信任度时区分实体的服务信任度与反馈信任度,并在证据理论框架下提出两种不同的信任传递方法,增强了模型抵抗恶意推荐攻击的能力.仿真实验表明,与已有信任度量模型相比,GTETM具有更强的抑制策略欺骗及共谋行为的能力,在信任度量准确性方面也有较大提高.

       

      Abstract: An important challenge regarding entity’s trust valuation in open computing systems, such as P2P systems, grid, semantic web, and ad hoc networks, etc., is how to cope with trust transitivity and trust aggregation in the encounter of a large number of malicious entities existing in the system efficiently.However,the trust models employed by the existing systems have some certain disadvantages in the accuracy and reliability of trust metric. Firstly, they ignore the feedback trust measurement on the direct recommender in the process of trust transitivity. Secondly, they contain the problems of information loss or repetitive calculation for their limits in analysis and disposal of the dependent relationships among referral chains. The above reasons also make the deviation between the trust measurement result and actual trust degree increasing. A novel evidential trust model, namely GTETM, a graph theory based evidential trust model, is presented in this paper, and the problems existing in current methods for transferring and aggregating trust relationships are addressed by combning D-S evidence with graph theory. It can be seen from the simulation results that compared with the existing trust metrics, GTETM is more robust on defending against malicious attacks for various strategy cheating and collusion, and has more remarkable enhancements in the accuracy of trust metric.

       

    /

    返回文章
    返回