Research On A Trust Model Based On the Qos and Malicious Node Deletion

被引:0
|
作者
Jing, Jiang [1 ]
Yu Yonghong [1 ]
机构
[1] Nan Jing Univ Sci & Technol, Dept Comp Sci & Technol, Nanjing, Peoples R China
关键词
option; discounting; consensus; trust model; triangular fuzzy number;
D O I
10.1109/CBD.2018.00045
中图分类号
TP [自动化技术、计算机技术];
学科分类号
0812 ;
摘要
In cloud environment the nodes provide services with QoS guarantee, so how to choose a credible service is a critical problem. In this paper it is proposed that a kind of mechanism how to construct basic probability assignment based on the Qos constraints that the services provide, and in the process of building the basic probability assignment a partial relation is inducted in order to remove the worthless history information and considering the uncertain information. And based on the discounting operator and the consensus cooperator, the reputation options from different grid nodes can be integrated. In order to prevent being cheating by the malicious nodes, the method of triangular fuzzy number is used to sort the different nodes. Then the deferring operator is inducted to compute the reputation opinion. Simulation tests prove that the model can tackle the trust problem in a simple and efficient way.
引用
收藏
页码:208 / 214
页数:7
相关论文
共 50 条
  • [31] Service Recommendation Model Based on Trust and QoS for Social Internet of Things
    Zhang, Shaozhong
    Zhang, Dingkai
    Wu, Yaohui
    Zhong, Haidong
    IEEE TRANSACTIONS ON SERVICES COMPUTING, 2023, 16 (05) : 3736 - 3750
  • [32] Uncertain Rule Based Fuzzy Logic QoS Trust Model in MANETs
    Sirisala, Nageswararao
    Bindu, C. Shoba
    2015 INTERNATIONAL CONFERENCE ON ADVANCED COMPUTING AND COMMUNICATIONS (ADCOM), 2015, : 55 - 60
  • [33] SECURE TRUST: a blockchain-enabled trust and reputation system for malicious node detection in IOT networks
    Simpson S.V.
    Ravi Raju Y.
    Bhanu Rajesh Naidu K.
    Venu G.
    International Journal of Information Technology, 2023, 15 (8) : 4323 - 4336
  • [34] Research on dynamic trust model based on recommendation trust iteration
    Li, Fengyin
    Zhao, Shuang
    Zhou, Jian
    INTERNATIONAL JOURNAL OF COMPUTING SCIENCE AND MATHEMATICS, 2016, 7 (01) : 20 - 28
  • [35] Research on Malicious URL Detection Technology Based on BERT Model
    Chang, Weiling
    Du, Fei
    Wang, Yijing
    2021 IEEE 9TH INTERNATIONAL CONFERENCE ON INFORMATION, COMMUNICATION AND NETWORKS (ICICN 2021), 2021, : 340 - 345
  • [36] A Novel Trust Model Based on Node Recovery Technique for WSN
    Qi, Ping
    Wang, Fucheng
    Hong, Shu
    SECURITY AND COMMUNICATION NETWORKS, 2019, 2019
  • [37] Reputation Based Malicious Node Detection in OppNets
    Ahmad, Asma'a
    Alajeely, Majeed
    Doss, Robin
    2016 13TH INTERNATIONAL JOINT CONFERENCE ON COMPUTER SCIENCE AND SOFTWARE ENGINEERING (JCSSE), 2016, : 493 - 498
  • [38] Node Behavior Trust Evaluation Model Based on Sliding Window
    Zhu, Qi
    MECHANICAL ENGINEERING AND GREEN MANUFACTURING II, PTS 1 AND 2, 2012, 155-156 : 138 - 142
  • [39] Optimized Blockchain Sharding Model Based on Node Trust and Allocation
    Zhang, PeiYun
    Guo, WeiFeng
    Liu, ZiJie
    Zhou, Mengchu
    Huang, Bo
    Sedraoui, Khaled
    IEEE TRANSACTIONS ON NETWORK AND SERVICE MANAGEMENT, 2023, 20 (03): : 2804 - 2816
  • [40] RESEARCH ON KEY-BASED TRUST MODEL
    Wang, Jianjun
    Li, Jianping
    Ma, Chongming
    Peng, Jing
    2013 10TH INTERNATIONAL COMPUTER CONFERENCE ON WAVELET ACTIVE MEDIA TECHNOLOGY AND INFORMATION PROCESSING (ICCWAMTIP), 2013, : 153 - 157