Unlock instant, AI-driven research and patent intelligence for your innovation.

A Transmittal Trust Evaluation Method Supporting Collaborative Security in a Distributed Open Environment

A collaborative security and trustworthy technology, applied in the transmission system, electrical components, etc., can solve the problems of conservative, rough, and inability to resist malicious recommendations in pessimistic processing methods

Inactive Publication Date: 2016-06-29
WUHAN UNIV OF TECH
View PDF5 Cites 0 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0006] Through the analysis of the existing trust transfer mechanism based on the cloud model, it is found that although certain research results have been achieved, there are still deficiencies in the quantitative description of the trust transfer process and the calculation method of the transfer trust degree: (1) Using simple four arithmetic calculations to calculate the transfer trust degree cannot accurately reflect the trust decay that occurs during the transfer process; (2) Combine multiple transfer trust values ​​into a final single trust degree in the form of an average
Although this method is simple and easy to implement, it is obviously not in line with the reality, especially it cannot resist malicious recommendations; (3) the trust degree in the transfer result directly takes the transfer trust degree of the less reliable one on the transfer path, which is pessimistic. Handling is more conservative and rough

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • A Transmittal Trust Evaluation Method Supporting Collaborative Security in a Distributed Open Environment
  • A Transmittal Trust Evaluation Method Supporting Collaborative Security in a Distributed Open Environment
  • A Transmittal Trust Evaluation Method Supporting Collaborative Security in a Distributed Open Environment

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0045] The present invention will be described in further detail below in conjunction with the accompanying drawings.

[0046] Step 1: Define several concepts related to trust in the form of cloud.

[0047] Definition 1 (Trust Value Space) Let TV be a quantitative domain, which can be represented by precise numerical value. tv ∈ TV is a trust value, representing the entity E 1 to entity E 2 Quantitative assessment of credibility. Call TV a trust value space. The present invention sets TV∈[0,1]. tv is a real number, tv∈[0,1]. The larger the value of tv, the E 1 more trust E 2 .

[0048] Definition 2 (Trust concept space) A trust concept space T is a set of qualitative concepts on a trust value space TV. t∈T is a trust concept, which represents a qualitative trust level. The present invention sets T={no trust, weak trust, relatively trust, trust, very trust, absolute trust}. Each element in the set T is a trust concept.

[0049] Based on Definition 1 and Definition 2...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a subjective-trust transfer-evaluating method for supporting cooperative security in a distributed open environment. The method comprises the following concrete steps of: firstly, defining related base concepts including a trust-value space, a trust-definition space, a trust cloud, a trust-definition cloud, a honesty-value space, a honesty-definition space, a honesty-definition cloud and the like in the form of clouds; then considering p entities E1, E2, ellipsis, and Ep, and calculating the honesty of the E2 for the E1 according to the direct trust of the E1 for the E2; next, calculating the transitive trust of the E1 for the E3 according to the honesty of the E2 for the E1 and the direct trust of the E2 for the E3; and sequentially calculating the honesty of the Ej+1 for the E1 and the transitive trust of the E1 for the Ej+2 according to the steps until obtaining the transitive trust of the E1 for the Ep through calculation, wherein the j is equal to 2, 3, ellipsis, and p-2. Compared with an existing trust-transferring evaluating method, the subjective-trust transfer-evaluating method has the characteristics that the phenomenon of trust attenuation in the process of subjective-trust transferring is actually described, the transitive trust is effectively quantized, and the weak transferring property of subjective trusts is fully embodied.

Description

technical field [0001] The invention belongs to the field of computer application technology, and relates to a subjective trust transfer evaluation technology in a distributed open environment, in particular to a transfer trust degree evaluation method supporting collaborative security in a distributed open environment. Background technique [0002] A distributed open environment is a typical loosely coupled computing system composed of a large number of geographically dispersed heterogeneous resources, and usually requires multiple entities to complete a task in a collaborative manner. However, in a wide-area distributed environment, neither of the collaborating parties may have direct cooperation experience. In order to ensure the security of collaboration, two key issues need to be solved: (1) how to determine the identity of the collaborating entity; (2) how to dynamically evaluate the trustworthiness of the collaborating entity. The former involves objective trust, and...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Patents(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 杜薇孙绍荣刘伟崔国华
Owner WUHAN UNIV OF TECH