Unlock instant, AI-driven research and patent intelligence for your innovation.

Public cloud credibility evaluation method and evaluation system thereof which can resist malicious evaluation

A credible and credible technology, applied in the field of cloud service security, can solve problems such as failure to take into account malicious user evaluations, failure to take into account the uncertainty of subjective evaluations, and reduced system accuracy.

Active Publication Date: 2018-12-11
ANHUI UNIVERSITY
View PDF8 Cites 2 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

[0005] (2) Subjective aspects: Z.xu, Q.He et al. proposed a user feedback method to score cloud services. This method relies on the reputation of the evaluator itself, and the uncertainty of the subjective evaluation itself is also high. greatly affect the accuracy of the system
However, the scheme proposed in this article does not take into account the uncertainty of subjective evaluation and the accuracy of the system will be greatly reduced when there are a large number of malicious user evaluations.
[0007] (4) Zhou Guosheng, Lin Hanchao and others proposed a public cloud credibility evaluation method based on TOPSIS and cloud model. They applied TOPSIS and cloud model to the evaluation process of objective and subjective credibility respectively, but the scheme also did not Considering the impact of malicious comments from users

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Public cloud credibility evaluation method and evaluation system thereof which can resist malicious evaluation
  • Public cloud credibility evaluation method and evaluation system thereof which can resist malicious evaluation
  • Public cloud credibility evaluation method and evaluation system thereof which can resist malicious evaluation

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0064] The technical solutions of the present invention will be described in detail below, but the protection scope of the present invention is not limited to the embodiments.

[0065] Such as figure 1 and figure 2 As shown, a public cloud credibility evaluation method that can resist malicious evaluation in this embodiment includes the following steps:

[0066] Step S10, system initialization and service request;

[0067] Step S20, QoS monitoring and objective reliability assessment;

[0068] Step S30, user malicious evaluation detection;

[0069] Step S40, subjective credibility assessment;

[0070] Step S50, calculating the comprehensive reliability.

[0071] The invention aims at evaluating the credibility of the public cloud by using a trusted third party under the cloud service environment. Such as image 3 As shown, the trusted third party has the following four modules:

[0072] (1) System information storage module, which is responsible for storing informatio...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a public cloud trust evaluation method capable of resisting malicious evaluation and an evaluation system thereof, comprising the following steps: a system initialization and service request step, a QoS monitoring and objective reliability evaluation step, a user malicious evaluation detection step, a subjective reliability evaluation step and a comprehensive reliability evaluation step. The invention introduces a trusted third party to evaluate the subjective credibility and the objective credibility of the public cloud.

Description

technical field [0001] The invention belongs to cloud service security technology, and in particular relates to a public cloud credibility evaluation method and evaluation system that can resist malicious evaluation. Background technique [0002] Cloud computing is a new computing model that has developed rapidly after grid computing, parallel computing and P2P computing. As an important part of cloud computing, public cloud is widely used due to its advantages of low cost, high performance, and dynamic scalability. Well-known IT companies at home and abroad, such as Amazon, Google, Tencent, and Ali, have successively launched public cloud service platforms. The ensuing security issues have gradually become a hot spot of concern, and the survey shows that more than half of potential cloud users remain skeptical about the reliability of public clouds. Therefore, the research on public cloud credibility is particularly important. [0003] The current research work on public...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
Patent Type & Authority Applications(China)
IPC IPC(8): H04L12/24H04L29/06H04L29/08
CPCH04L41/5009H04L41/5032H04L63/0245H04L43/55H04L67/53
Inventor 仲红邹建忠许艳崔杰陈志立应作斌
Owner ANHUI UNIVERSITY