|本期目录/Table of Contents|

[1]张蕾,黄文芝.点对点网络中运用云理论的信任域模型[J].武汉工程大学学报,2012,(10):39-72.[doi:103969/jissn16742869201210017]
 ZHANG Lei,HUANG Wen zhi.Trust domain model in peertopeer network by using cloud theory[J].Journal of Wuhan Institute of Technology,2012,(10):39-72.[doi:103969/jissn16742869201210017]
点击复制

点对点网络中运用云理论的信任域模型(/HTML)
分享到:

《武汉工程大学学报》[ISSN:1674-2869/CN:42-1779/TQ]

卷:
期数:
2012年10期
页码:
39-72
栏目:
机电与信息工程
出版日期:
2012-11-06

文章信息/Info

Title:
Trust domain model in peertopeer network by using cloud theory
文章编号:
16742869(2012)10006904
作者:
张蕾黄文芝
武汉工程大学计算机科学与工程学院,湖北 武汉 430074
Author(s):
ZHANG Lei HUANG Wenzhi
School of Computer Science and Engineering, Wuhan Institute of Technology,Wuhan 430074, China
关键词:
点对点网络云理论信任模型可信度
Keywords:
peertopeer network cloud theory domain trust model trust degree
分类号:
TP393
DOI:
103969/jissn16742869201210017
文献标志码:
A
摘要:
针对点对点网络中信任的模糊性和随机性难以刻画和计算的特点,首先运用域的概念设计一个信任模型,包括可信度的管理、传递和表示.在计算对等点的全局可信度时引入动态权重函数,再运用云理论将每个已存在的可信度映射为定量的可细微变化的不同云滴,并计算不同权值下其云的数字特征.在Microsoft Visual C++和Matlab环境下,计算与标准概念云的相似度,相似度最大的云最大限度地保留了点对点网络中信任的随机度和模糊度,其所对应的权重最终确定了请求对等点的可信度.结果表明,运用域的概念和云理论的信任模型较好地表征和计算了点对点网络中的信任,具有较强的抗攻击能力.
Abstract:
As the fuzziness and uncertainty of trust could not be described and calculated exactly in peertopeer network, a trust model using domain concept was designed firstly, including management, transmission and expression of trust degree. In the calculation of the peer global trust value, dynamic weight function was introduced. Then, each qualitative existed trust degree was mapped to quantitative and variable cloud droplet by using cloud theory, and numerical characteristics of every cloud were calculated with different weight. In Matlab and Microsoft Visual C++, similarity with standard cloud was calculated, the cloud which was the most similar to the standard kept furthest fuzziness and uncertainty of trust in peertopeer network, and ultimately the request peer trust degree was determined. The result shows that the trust model based on domain concept and cloud theory describes and calculates the trust in peertopeer network, and it also has strong ability against the attack.

参考文献/References:

[1]Kamver S D, Schlosser M T, GarciaMolina H. The Eigentrust Algorithm for Reputation Management in P2P Networks\[C\]//Proc. of the 12th Int’1 World Wide Web Conference.Hungary:Budapest, ACM Press, 2003: 640651.
[2]李景涛, 荆一楠, 肖晓春, 等.基于相似度加权推荐的P2P环境下的信任模型\[J\]. 软件学报, 2007, 18(1): 157167.
[3]李小勇, 桂小林. 可信网络中基于多维决策属性的信任量化模型\[J\]. 计算机学报, 2009, 32(3): 405416.
[4]宋远骏, 杨孝宗, 李德毅, 等.考虑环境因素的计算机可靠性云模型评价\[J\]. 计算机研究与发展, 2001, 38(5): 631636.
[5]司聿宣,苏远兴,杨正芳. 分布式环境实时语音通讯系统的设计与实现\[J\]. 武汉工程大学学报, 2012, 34(5): 6063.
[6]王守信, 张莉, 李鹤松. 一种基于云模型的主观信任评价方法\[J\]. 软件学报, 2010, 2l(6): 13411352.
[7]Wu D, Mendel J M. A comparative study of ranking methods, similarity measures and uncertainty measures for interval type2 fuzzy sets\[J\]. Information Sciences, 2009, 179(8): 11691192.
[8]Li Deyi, Liu Chang Yu, Gan Wenyan. A new cognitive model: Cloud model \[J\]. International Journal of Intelligent Systems, 2009, 24(4): 357375.
[9]Li Tao. An immunity based network security risk estimation \[J\]. Science in China Series F: Information Sciences, 2005, 48(5): 557578.
[10]Wang Shouxin, Zhang Li, Li Hesong. Evaluation approach of subjective trust based on cloud model\[J\].Journal of Software, 2010, 21(6): 13411352.
[11]Li Deyi, Du Yi. Artificial intelligence with uncertainty \[M\].Beijing: National Defense Industry Press, 2005: 178186.
[12]雷建云,余涵,蒋天发,等. 自动信任协商中的敏感信息保护方案\[J\]. 武汉理工大学学报, 2012,34(3):137140.
[13]田春岐, 邹仕洪, 王文东, 等. 一种基于推荐证据的有效抗攻击P2P网络信任模型\[J\]. 计算机学报, 2008, 31(2): 270281.

相似文献/References:

备注/Memo

备注/Memo:
收稿日期:20120830作者简介:张蕾(1982),女,河南信阳人,讲师,硕士.研究方向:可信度计算,密码算法等.
更新日期/Last Update: