Public cloud credibility evaluation method and evaluation system thereof which can resist malicious evaluation
A credible and credible technology, applied in the field of cloud service security, can solve problems such as failure to take into account malicious user evaluations, failure to take into account the uncertainty of subjective evaluations, and reduced system accuracy.
- Summary
- Abstract
- Description
- Claims
- Application Information
AI Technical Summary
Problems solved by technology
Method used
Image
Examples
Embodiment Construction
[0064] The technical solutions of the present invention will be described in detail below, but the protection scope of the present invention is not limited to the embodiments.
[0065] Such as figure 1 and figure 2 As shown, a public cloud credibility evaluation method that can resist malicious evaluation in this embodiment includes the following steps:
[0066] Step S10, system initialization and service request;
[0067] Step S20, QoS monitoring and objective reliability assessment;
[0068] Step S30, user malicious evaluation detection;
[0069] Step S40, subjective credibility assessment;
[0070] Step S50, calculating the comprehensive reliability.
[0071] The invention aims at evaluating the credibility of the public cloud by using a trusted third party under the cloud service environment. Such as image 3 As shown, the trusted third party has the following four modules:
[0072] (1) System information storage module, which is responsible for storing informatio...
PUM
Login to View More Abstract
Description
Claims
Application Information
Login to View More 


