Trust evaluation method in computing environment without central network

A central network and computing environment technology, applied in electrical components, transmission systems, etc., can solve problems such as large scale, and achieve the effect of strong feasibility, strong generalization, and easy technology

Inactive Publication Date: 2010-03-17
NANJING UNIV OF POSTS & TELECOMM
View PDF0 Cites 6 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, in a non-central network computing environment oriented to an open environment, across organizations and management domains, nodes are dynamically dispersed and often large in scale, interacting nodes may be familiar or unfamiliar, and how to evaluate each other before transactions between unfamiliar nodes It is difficult to ensure the trustworthiness of the other party

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0035] 1. Analysis of Chinese people's concept of trust

[0036] The current research shows that the composition of the current Chinese trust structure has its local and pluralistic characteristics, which is quite different from that of Westerners. Chinese society is a low-trust society that lacks universal trust, and a "relationship-based" society. The emotional connotation between the two parties included in the relationship (including blood relationship and social interaction relationship) has an obvious and important influence on the trust between Chinese people; Choose a tendency to trust each other. The people most Chinese people tend to trust are relatives and family members composed of consanguineous family relations, especially direct blood relatives; at the same time, they also trust relatives and friends who do not have consanguineous family relations but have close relationships and are outside of family members. It even exceeds relatives who do not come and go f...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

The invention relates to a trust evaluation method used in grid computing, peer-to-peer computing, cloud computing, or other open computing environments which are oriented to China and based on the Internet and do not have central networks. The method is designed in order to promote the honest and reliable interaction of every node and has distinguishing Chinese characteristics. In view of the thinking model, the subjective desire and the way of action of Chinese people, the invention designs the trust evaluation method for network nodes so as to effectively enhance the system safety stabilityand the coordination success ratio in the computing environment without a central network in China. The trust evaluation model fully considers the identifications of the nodes, the relationship amongthe nodes, the direct interaction experiences and the objective comprehensive evaluation conditions, and also considers the dynamic changes of the node trust conditions. Due to strong pertinency, popularization capacity and feasibility, the scheme has favorable reference value and practical value.

Description

technical field [0001] The present invention is used for all kinds of open and non-centralized network computing environments (such as grid computing, peer-to-peer computing and cloud computing, etc.) based on the Internet within the scope of China, and is designed to promote honest and reliable interaction of each node A set of trust assessment methods with distinct Chinese characteristics. The technology belongs to the cross-technical application field of computer network, distributed computing and information security. Background technique [0002] With the wide application of Internet technology, a series of new open network computing (Network Computing) such as grid computing (Grid Computing), peer-to-peer computing (Peer-to-Peer Computing, P2P) and cloud computing (Cloud Computing) have emerged. Technologies, platforms, and application systems have gradually become typical network computing models, and their common characteristics are that resources on the decentraliz...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 徐小龙王汝传张登银陈丹伟熊婧夷高翔梅哲滔窦孝晨
Owner NANJING UNIV OF POSTS & TELECOMM
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products