Trust evaluation system based on privacy protection and construction method thereof

An evaluation system and privacy protection technology, applied in the field of trust model construction system based on privacy protection, can solve problems such as malicious recommendation, collusion fraud, and trust evaluation results that cannot objectively reflect the trust relationship

Active Publication Date: 2014-04-23
汉兴同衡科技集团有限公司
View PDF2 Cites 26 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0004] The above part briefly introduces the current research status of trust models, and its analysis can be concluded that most of the existing models are trust mechanisms based on feedback. Although they can improve the comprehensiveness of trust evaluation, they are easily affected by the subjective influence of recommended entities. There are risks such as collusion fraud and malicious recommendation, which leads to the final trust evaluation result not being able to objectively reflect the trust relationship between entities

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Trust evaluation system based on privacy protection and construction method thereof
  • Trust evaluation system based on privacy protection and construction method thereof
  • Trust evaluation system based on privacy protection and construction method thereof

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0022] Referring to the accompanying drawings, through the description of the embodiments, the specific implementation of the present invention, such as the interaction process of information between trust nodes, the evaluation method of each trust value, the update method of trust value, etc., will be further described in detail to help the present invention Those skilled in the art have a more complete, accurate and in-depth understanding of the inventive concepts and technical solutions of the present invention, and the specific implementation methods are as follows:

[0023] Such as figure 1 As shown in , a trust evaluation agent node is established between the cloud user and the cloud service provider, that is, the agent is trusted to be a trusted third party for measuring the trust relationship between nodes in the evaluation system. User nodes and service nodes are isolated by trust evaluation agent nodes, and the task of trust evaluation is managed by trust evaluation ...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

PUM

No PUM Login to view more

Abstract

A trust evaluation system based on privacy protection and a construction method thereof relate to the field of dependable computing in information safety. The system comprises a service node, a trust evaluation proxy node and a user node. The trust evaluation proxy node dynamically deploys a trust evaluation method to measure the trust relationship between the user node and the service node. The user node and the trust evaluation proxy node transmit and receive information mutually and evaluate the service node. The system and its construction method aim to objectively, accurately and justly quantify the trust relationship between the user node and the service node, effectively inhibit malicious acts such as conspired fraud, malevolent recommendation and the like, raise interactive success rate of the user node and the service node and meet requirements of user node individuation to the maximum.

Description

technical field [0001] The invention relates to the trusted computing field in information security, in particular to a method for building a system based on a privacy-protected trust model. Background technique [0002] Since Google first proposed the concept of cloud computing in 2006, cloud computing has attracted more and more attention from today's academia and industry. It organizes a large number of idle resources and uses virtualization technology to form a "virtual resource pool". Users request individuality through the network. resources. Cloud computing adheres to the purpose of "providing cheap on-demand services for enterprises and other end users". It not only saves the cost of using computer resources for ordinary users, but also meets the needs of management and analysis of massive data for enterprises to use its powerful computing capabilities. Undoubtedly, cloud computing will become an inevitable trend to deal with massive data. However, while enterpris...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to view more

Application Information

Patent Timeline
no application Login to view more
Patent Type & Authority Applications(China)
IPC IPC(8): H04L29/06H04L29/08
Inventor 罗永龙刘飞马苑左开中陈付龙郭良敏孙丽萍
Owner 汉兴同衡科技集团有限公司
Who we serve
  • R&D Engineer
  • R&D Manager
  • IP Professional
Why Eureka
  • Industry Leading Data Capabilities
  • Powerful AI technology
  • Patent DNA Extraction
Social media
Try Eureka
PatSnap group products