• 中国精品科技期刊
  • CCF推荐A类中文期刊
  • 计算领域高质量科技期刊T1类
Advanced Search
Jiang Liming, Zhang Kun, Xu Jian, Zhang Hong. A New Evidential Trust Model Based on Graph Theory for Open Computing Systems[J]. Journal of Computer Research and Development, 2013, 50(5): 921-931.
Citation: Jiang Liming, Zhang Kun, Xu Jian, Zhang Hong. A New Evidential Trust Model Based on Graph Theory for Open Computing Systems[J]. Journal of Computer Research and Development, 2013, 50(5): 921-931.

A New Evidential Trust Model Based on Graph Theory for Open Computing Systems

More Information
  • Published Date: May 14, 2013
  • An important challenge regarding entity’s trust valuation in open computing systems, such as P2P systems, grid, semantic web, and ad hoc networks, etc., is how to cope with trust transitivity and trust aggregation in the encounter of a large number of malicious entities existing in the system efficiently.However,the trust models employed by the existing systems have some certain disadvantages in the accuracy and reliability of trust metric. Firstly, they ignore the feedback trust measurement on the direct recommender in the process of trust transitivity. Secondly, they contain the problems of information loss or repetitive calculation for their limits in analysis and disposal of the dependent relationships among referral chains. The above reasons also make the deviation between the trust measurement result and actual trust degree increasing. A novel evidential trust model, namely GTETM, a graph theory based evidential trust model, is presented in this paper, and the problems existing in current methods for transferring and aggregating trust relationships are addressed by combning D-S evidence with graph theory. It can be seen from the simulation results that compared with the existing trust metrics, GTETM is more robust on defending against malicious attacks for various strategy cheating and collusion, and has more remarkable enhancements in the accuracy of trust metric.
  • Related Articles

    [1]Xia Nu, Li Wei, Lu You, Jiang Jian, Shan Feng, Luo Junzhou. A Trust Model for the Inter-Domain Routing System[J]. Journal of Computer Research and Development, 2016, 53(4): 845-860. DOI: 10.7544/issn1000-1239.2016.20151121
    [2]Li Xiaoqing, Li Hui, Yang Kai, and Ma Jianfeng. A Secure Routing Protocol Based on D-S Evidence Theory in Ad Hoc Networks[J]. Journal of Computer Research and Development, 2011, 48(8): 1406-1413.
    [3]Luo Junhai, Fan Mingyu. A Subjective Trust Management Model Based on Certainty-Factor for MANETs[J]. Journal of Computer Research and Development, 2010, 47(3): 515-523.
    [4]Tong Xiangrong, Huang Houkuan, Zhang Wei. Prediction and Abnormal Behavior Detection of Agent Dynamic Interaction Trust[J]. Journal of Computer Research and Development, 2009, 46(8): 1364-1370.
    [5]Luo Junhai and Fan Mingyu. Research on Trust Model Based on Game Theory in Mobile Ad-Hoc Networks[J]. Journal of Computer Research and Development, 2008, 45(10): 1704-1710.
    [6]Ye Ayong, Ma Jianfeng. A Trust Valuation Model in MANET[J]. Journal of Computer Research and Development, 2008, 45(5): 765-771.
    [7]Li Xiaoyong, Han Zhen, Shen Changxiang. Transitive Trust and Performance Analysis in Windows Environment[J]. Journal of Computer Research and Development, 2007, 44(11): 1889-1895.
    [8]Lin Jianning, Wu Huizhong. Research on a Trust Model Based on the Subjective Logic Theory[J]. Journal of Computer Research and Development, 2007, 44(8): 1365-1370.
    [9]Tang Wen, Hu Jianbin, and Chen Zhong. Research on a Fuzzy Logic-Based Subjective Trust Management Model[J]. Journal of Computer Research and Development, 2005, 42(10): 1654-1659.
    [10]Zhu Junmao, Yang Shoubao, Fan Jianping, Chen Mingyu. A Grid & P2P Trust Model Based on Recommendation Evidence Reasoning[J]. Journal of Computer Research and Development, 2005, 42(5): 797-803.

Catalog

    Article views (818) PDF downloads (503) Cited by()

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return