A Proactive Trust Evaluation System for Secure Data Collection Based on Sequence Extraction

被引:1
|
作者
Huang, Mingfeng [1 ,2 ]
Li, Zhetao [3 ]
Liu, Anfeng [1 ]
Zhang, Xinglin [4 ]
Yang, Zhemin [5 ]
Yang, Min
机构
[1] Cent South Univ, Sch Elect Informat, Changsha 410017, Peoples R China
[2] Changsha Univ Sci & Technol, Sch Comp & Commun Engn, Changsha 410000, Peoples R China
[3] Jinan Univ, Coll Informat Sci & Technol, Natl & Local Joint Engn Res Ctr Network Secur Dete, Guangdong ProvincialKey Lab Data Secur & Privacy P, Guangzhou 510632, Peoples R China
[4] South China Univ Technol, Sch Comp Sci & Engn, Guangzhou 510006, Peoples R China
[5] Fudan Univ, Sch Comp Sci, Shanghai 201203, Peoples R China
基金
中国国家自然科学基金;
关键词
Data models; Computational modeling; Accuracy; Predictive models; Cloud computing; Bayes methods; Analytical models; Internet of Things; trust mechanism; data security; sequence extraction; evaluation accuracy; PRIVACY;
D O I
10.1109/TDSC.2024.3424448
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
As a collaborative and open network, billions of devices can be free to join the IoT-based data collection network for data perception and transmission. Along with this trend, more and more malicious attackers enter the network, they steal or tamper with data, and hinder data exchange and communication. To address these issues, we propose a Proactive Trust Evaluation System (PTES) for secure data collection by evaluating the trust of mobile data collectors. Specifically, PTES guarantees evaluation accuracy from trust evidence acquisition, trust evidence storage, and trust value calculation. First, PTES obtains trust evidence based on active detection of drones, feedbacks from interacted objects, and recommendations from trusted third parties. Then, these trust evidences are stored according to interaction time by adopting a sliding window mechanism. After that, credible, untrustworthy, and uncertain evidence sequences are extracted from the storage space, and assigned with positive, negative, and tendentious trust values, respectively. Consequently, the final normalized trust is obtained by combining the three trust values. Finally, extensive experiments conducted on a real-world dataset demonstrate PTES is superior to benchmark methods in terms of detection accuracy and profit.
引用
收藏
页码:997 / 1010
页数:14
相关论文
共 50 条
  • [21] A Scheme to Secure Instant Community Data Access Based on Trust and Contexts
    Yan, Zheng
    Wang, Mingjun
    Zhang, Peng
    2014 IEEE INTERNATIONAL CONFERENCE ON COMPUTER AND INFORMATION TECHNOLOGY (CIT), 2014, : 646 - 651
  • [22] A Novel Trust-Based Secure Data Aggregation for Internet of Things
    Liu, Yanbing
    Gong, Xuehong
    Xing, Congcong
    2014 PROCEEDINGS OF THE 9TH INTERNATIONAL CONFERENCE ON COMPUTER SCIENCE & EDUCATION (ICCSE 2014), 2014, : 435 - 439
  • [23] THE IMPLEMENTATION OF WEB BASED PLASMA PROPERTIES REFERENCE DATA COLLECTION AND EVALUATION SYSTEM
    Park, Jun-Hyoung
    Hwang, Sung-Ha
    Yoon, Jung-Sik
    FUSION SCIENCE AND TECHNOLOGY, 2011, 60 (1T) : 64 - 68
  • [24] Secure Data Sequence Query Framework Based on Multiple Fogs
    Gu, Ke
    Wu, Na
    Yin, Bo
    Jia, Weijia
    IEEE TRANSACTIONS ON EMERGING TOPICS IN COMPUTING, 2021, 9 (04) : 1883 - 1900
  • [25] Ghostor: Toward a Secure Data-Sharing System from Decentralized Trust
    Hu, Yuncong
    Kumar, Sam
    Popa, Raluca Ada
    PROCEEDINGS OF THE 17TH USENIX SYMPOSIUM ON NETWORKED SYSTEMS DESIGN AND IMPLEMENTATION, 2020, : 851 - 877
  • [26] A Secure Sensing Data Collection Mechanism Based on Perturbed Compressed Sensing
    Lu, Xiaomeng
    Xu, Wenjing
    Hao, Jie
    Yuan, Xiaoming
    WIRELESS ALGORITHMS, SYSTEMS, AND APPLICATIONS, WASA 2021, PT III, 2021, 12939 : 582 - 593
  • [27] A Secure Data Collection Method Based on Credibility in Wireless Sensor Networks
    Zhu Gengming
    Zhang Dandan
    Liu Yizhi
    2016 3RD INTERNATIONAL CONFERENCE ON INFORMATION SCIENCE AND CONTROL ENGINEERING (ICISCE), 2016, : 1240 - 1244
  • [28] Compressive sensing and paillier cryptosystem based secure data collection in WSN
    Samir Ifzarne
    Imad Hafidi
    Nadia Idrissi
    Journal of Ambient Intelligence and Humanized Computing, 2023, 14 : 6243 - 6250
  • [29] Proactive Attribute-based Secure Data Schema for Mobile Cloud in Financial Industry
    Gai, Keke
    Qiu, Meikang
    Thuraisingham, Bhavani
    Tao, Lixin
    2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1332 - 1337
  • [30] Compressive sensing and paillier cryptosystem based secure data collection in WSN
    Ifzarne, Samir
    Hafidi, Imad
    Idrissi, Nadia
    JOURNAL OF AMBIENT INTELLIGENCE AND HUMANIZED COMPUTING, 2021, 14 (5) : 6243 - 6250