CN103078850A - Transitive-trust evaluating method for supporting cooperative security in distributed open environment - Google Patents

Transitive-trust evaluating method for supporting cooperative security in distributed open environment Download PDF

Info

Publication number
CN103078850A
CN103078850A CN2012105862528A CN201210586252A CN103078850A CN 103078850 A CN103078850 A CN 103078850A CN 2012105862528 A CN2012105862528 A CN 2012105862528A CN 201210586252 A CN201210586252 A CN 201210586252A CN 103078850 A CN103078850 A CN 103078850A
Authority
CN
China
Prior art keywords
degree
trust
belief
honest
calculate
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN2012105862528A
Other languages
Chinese (zh)
Other versions
CN103078850B (en
Inventor
杜薇
孙绍荣
刘伟
崔国华
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Wuhan University of Technology WUT
Original Assignee
Wuhan University of Technology WUT
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Wuhan University of Technology WUT filed Critical Wuhan University of Technology WUT
Priority to CN201210586252.8A priority Critical patent/CN103078850B/en
Publication of CN103078850A publication Critical patent/CN103078850A/en
Application granted granted Critical
Publication of CN103078850B publication Critical patent/CN103078850B/en
Expired - Fee Related legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Images

Abstract

The invention discloses a subjective-trust transfer-evaluating method for supporting cooperative security in a distributed open environment. The method comprises the following concrete steps of: firstly, defining related base concepts including a trust-value space, a trust-definition space, a trust cloud, a trust-definition cloud, a honesty-value space, a honesty-definition space, a honesty-definition cloud and the like in the form of clouds; then considering p entities E1, E2, ellipsis, and Ep, and calculating the honesty of the E2 for the E1 according to the direct trust of the E1 for the E2; next, calculating the transitive trust of the E1 for the E3 according to the honesty of the E2 for the E1 and the direct trust of the E2 for the E3; and sequentially calculating the honesty of the Ej+1 for the E1 and the transitive trust of the E1 for the Ej+2 according to the steps until obtaining the transitive trust of the E1 for the Ep through calculation, wherein the j is equal to 2, 3, ellipsis, and p-2. Compared with an existing trust-transferring evaluating method, the subjective-trust transfer-evaluating method has the characteristics that the phenomenon of trust attenuation in the process of subjective-trust transferring is actually described, the transitive trust is effectively quantized, and the weak transferring property of subjective trusts is fully embodied.

Description

Support the transmission degree of belief appraisal procedure of cooperation safety in the Distributed Open Environments
Technical field
The invention belongs to the Computer Applied Technology field, the subjective trust that relates in the Distributed Open Environments transmits assessment technology, particularly supports the transmission degree of belief appraisal procedure of cooperation safety in a kind of Distributed Open Environments.
Background technology
Distributed Open Environments is the typical Loosely coupled computing system that is made of the heterogeneous resource that disperses on a large amount of geography, usually needs a plurality of entities jointly to accomplish a task in the mode of cooperation.Yet in the wide-area distribution type environment, the cooperation both sides may be all less than the experience of directly cooperating.For the safety that guarantees to cooperate, need to solve two key issues: the identity of (1) how to confirm cooperation entity; (2) credibility of dynamic evaluation cooperation entity how.The former relates to objective trust, just can confirm mutual both sides' identity by traditional identity identifying technology.And the latter needs subjective trust is estimated.As cooperation both sides during without direct interaction experiences, can be by having the recommendation (transmission of namely trusting of the entity of direct interaction experiences with cooperation part, the credibility assessment that forms by direct interaction becomes direct degree of belief), therefore the credibility (namely transmitting degree of belief) of assessment cooperation part is to support the matter of utmost importance that security cooperation need solve in Distributed Open Environments to the calculating of transmitting degree of belief.
Subjective trust is based on the human cognitive phenomenon of conviction, and certain ability or behavior for assessment of entity have extremely strong uncertainty, is difficult to describe exactly and quantize.By the firm academician of Li De in last century the nineties at the cloud model that the basis of traditional fuzzy mathematics and probability statistics proposes, be the exchange model between qualitative language and its quantificational expression, also be a kind of effective tool of describing uncertain concept.Cloud is this theoretical core, by three numerical characteristics---and expectation Ex, entropy En and super entropy He characterize a concept.Different according to concrete methods of realizing, cloud has polytype.Wherein, normal cloud model is the brand-new model that grows up on normal distribution and bell membership function basis, has preferably universality.
At present, domestic and international trust pass through mechanism research based on cloud model mainly contains:
The people such as the He Rui of BJ University of Aeronautics ﹠ Astronautics [1,2,3]The people such as Lu Feng with Institutes Of Technology Of Nanjing [4,5]All adopt the Ex after the mode that a plurality of Ex on the trust chain are simply multiplied each other is calculated merging.The people such as the Meng Xiangyi of BJ University of Aeronautics ﹠ Astronautics [6,7]Design a kind of wall scroll spare single criterion logical operator and processed the trust transmission that causes by recommending.Passing through special parameter---" accepting the factor " reflection importance of recommendation paths and trust evaluation side are to the degree of recognition of each recommendation paths.The people such as the Zhang Changlun of Beijing Jiaotong University [8]Use basic cloud and " the accepting the factor " of trusting processed the recommendation of trusting.
By the analysis of existing trust pass through mechanism based on cloud model is found, although obtained certain achievement in research, but to the quantificational description of trust transfer with transmit on the computational methods of degree of belief still Shortcomings part: (1) uses simple arithmetic to calculate and transmits degree of belief, can't accurately reflect the trust decay that occurs with transmittance process; (2) in the mode of mean value a plurality of transmission trust values are merged into final single degree of belief.Although the method is simple, obviously do not meet reality, particularly can't resist Malicious recommendation; (3) degree of belief among the transmission result is directly got the transmission degree of belief of confidence level smaller on the bang path, and this pessimistic processing mode is conservative and coarse.
List of references
[1]R.He,J.W.Niu,M.Yuan,et?al.A?novel?cloud-based?trust?model?for?pervasive?computing.Proceedings?of?the?4th?International?Conference?on?Computer?and?Information?Technology(CIT’04),Wuhan,China,September14-16,2004,IEEE?Press,693-700
[2]R.He,J.W.Niu?and?G.W.Zhang.CBTM:A?trust?model?with?uncertainty?quantification?and?reasoning?for?pervasive?computing.Proceedings?of?the?3rd?International?Symposium?on?Parallel?and?Distributed?Processing?and?Applications(ISPA’05),Nanjing,China,November2-5,2005,LNCS?3758,Springer-Verlag,541-552
[3]R.He,J.W.Niu?and?K.Hu.A?novel?approach?to?evaluate?trustworthiness?and?uncertainty?of?trust?relationships?in?Peer-to-Peer?computing.Proceedings?of?the?5th?International?Conference?on?Computer?and?Information?Technology(CIT’05),Shanghai,China,September21-23,2005,IEEE?Press,382-388
[4] peak, road, Wu Huizhong. based on the trust evaluation research of cloud model, Chinese engineering science, 2008,10 (10): 84-90
[5] peak, road, Wu Huizhong. under the grid environment based on trust evaluation and the Research of Decision of cloud model. Journal of System Simulation, 2009,21 (2): 421-426
[6] Meng Xiangyi, Zhang Guangwei, Liu Changyu etc. based on the Subjective Trust Management Model research of cloud model. Journal of System Simulation, 2007,19 (14): 3310-3317
[7]X.Y.Meng,G.W.Zhang,J.C.Kang,et?al.A?new?subjective?trust?model?based?on?cloud?model.Proceedings?of?the?5th?International?Conference?on?Networking,Sensing?and?Control(ICNSC’08),Hainan,China,April?6-8,2008,IEEE?Press,1125-1130
[8]C.L.Zhang?and?Y.Liu.A?cloud-based?discrete?metric?trust?management?model?in?open?networks.Journal?of?Internet?Technology,2009,10(1):79-82
Summary of the invention
The purpose of this invention is to provide a kind of trust relaxation phenomenon that can truly describe in the subjective trust transmittance process, can effectively quantize to transmit degree of belief again, support the transmission degree of belief appraisal procedure of cooperation safety in the Distributed Open Environments of the weak transitivity of embodiment subjective trust, to overcome the deficiencies in the prior art.
To achieve these goals, technical scheme of the present invention is:
Support the transmission degree of belief appraisal procedure of cooperation safety in a kind of Distributed Open Environments, may further comprise the steps:
Step 1: definition trust value space TV, trust concept space T, trust cloud TC (Ex, En, He), trust concept cloud TCC (Ex, En, He), honest value space S V, honest concept space S and honest concept cloud SCC (Ex, En, He) basic conception;
Step 2: consider p entity E 1, E 2..., E pThe trust transitive relation, only have adjacent two entities to know well (experience that direct interaction is namely arranged), i.e. E iWith E I+1Know well, 1≤i≤p-1, other entities be strange (experience that does not namely have direct interaction) mutually, works as E pRequest and E 1During cooperation, E 1Need to pass through by E 2, E 3..., E P-1The information evaluation E that the recommendation paths that consists of provides pCredibility, E iWith E I+1The experience that direct interaction is arranged, E iTo E I+1Direct degree of belief Known, E then iCan be according to trusting cloud
Figure BDA00002675178100032
How decision treats E I+1To E I+2Recommendation, for convenience of description, at first according to E 1To E 2Direct degree of belief calculate E 2With respect to E 1Honest degree;
Step 3: according to E 2To E 1Honest degree and E 2To E 3Direct degree of belief calculate E 1To E 3The transmission degree of belief;
Step 4: according to the method for step 2 and step 3, calculate successively E J+1With respect to E 1Honest degree and E 1To E J+2The transmission degree of belief, j=2,3 ... p-2, until calculate E 1To E pThe transmission degree of belief.
Described step 2 is according to following process computation E 2With respect to E 1Honest degree σ 1,2:
(2.1) with E 1To E 2Direct degree of belief
Figure BDA00002675178100033
Three numerical characteristic Ex, En and He bring equation (1) and equation (2) repeatedly into, it is different to calculate N
Figure BDA00002675178100034
1≤i≤N;
En ~ ~ N ( En , ( He ) 2 ) - - - ( 1 )
v ~ N ( Ex , ( En ~ ) 2 ) - - - ( 2 )
(2.2) will trust the concept cloud
Figure BDA00002675178100038
Figure BDA00002675178100039
With
Figure BDA000026751781000310
It is different repeatedly to bring N of equation (1) generation into
Figure BDA000026751781000311
(2.3) will
Figure BDA000026751781000312
With Repeatedly bring equation (3) into and generate N different ud Ki, this value has embodied Water dust
Figure BDA000026751781000315
To cloud
Figure BDA000026751781000316
The degree of certainty of the honest concept of representative;
ud = exp [ - 1 2 ( v - Ex ) 2 / ( En ~ ) 2 ] - - - ( 3 )
At last, calculate N different ud according to formula (4) KiArithmetic mean σ k:
σ k = 1 N Σ i = 1 N u d ki - - - ( 4 )
σ kIt is larger,
Figure BDA00002675178100042
More can embody
Figure BDA00002675178100043
Feature, then make σ 1,2=max{ σ 1, σ 2..., σ L, i.e. E 2With respect to E 1Honest degree.
Described step 3 is according to following process computation E 1To E 3The transmission degree of belief:
(3.1) according to E 2To E 1Honest degree σ 1,2And E 2To E 3Direct degree of belief
Figure BDA00002675178100044
Calculate E 1To E 3The transmission degree of belief
Figure BDA00002675178100045
In
Figure BDA00002675178100046
Ex E 1 E 3 = σ 1,2 Ex 2 TC ;
(3.2) according to E 2To E 1Honest degree σ 1,2And E 2To E 3Direct degree of belief Calculate E 1To E 3The transmission degree of belief In En E 1 E 3 = ( 1 + σ 1,2 ) En 2 TC ;
(3.2) according to E 2To E 1Honest degree σ 1,2And E 2To E 3Direct degree of belief
Figure BDA000026751781000412
Calculate E 1To E 3The transmission degree of belief
Figure BDA000026751781000413
In
Figure BDA000026751781000414
He E 1 E 3 = ( 1 + σ 1,2 ) He 2 TC .
Described step 4 is according to following process computation E 1To E pThe transmission degree of belief
Figure BDA000026751781000416
(4.1) honest degree computational methods according to claim 2 are calculated E successively J+1With respect to E 1Honest degree σ 1, j+1, j=2,3 ... p-2;
(4.2) transmission degree of belief computational methods according to claim 3 are calculated E successively 1To E J+2The transmission degree of belief
Figure BDA000026751781000417
Concrete grammar is:
Ex E 1 E j + 2 = σ 1 , j + 1 Ex j + 1 TC , En E 1 E j + 2 = ( 1 + σ 1 , j + 1 ) En j + 1 TC , He E 1 E j + 2 = ( 1 + σ 1 , j + 1 ) He j + 1 TC , j = 2,3 , . . . p - 2
Until calculate E 1To E pThe transmission degree of belief
Figure BDA000026751781000421
The present invention has following three characteristics.At first, the present invention with the formal definition of cloud with trust relevant some concepts.The application of cloud model has embodied its uncertain feature preferably so that these definition can consider ambiguity and the randomness of subjective trust, has explained rightly subjective trust.Secondly, by cloud tolerance trusting relationship, very naturally realize the mutual conversion between qualitativing concept and the quantitative expression, supported for the transmission with quantification manner research subjective trust provides effectively, reasonably solved the metric question that transmits trusting relationship.At last, the transmission degree of belief appraisal procedure of proposition utilizes the honest degree factor to reflect the decay in the trust transfer, has described more realistically the weak transitivity of trusting.The transmission degree of belief appraisal procedure that theory analysis and the present invention of the simulation experiment result proof propose can obtain the result in linear session, be efficiently, rationally and effectively.
Description of drawings
Fig. 1 is that the present invention is from entity E 1To entity E pTrust transmission (p among the figure 〉=3) scene schematic diagram.
Fig. 2 is method flow diagram of the present invention (p among the figure 〉=4).
Embodiment
The present invention is described in further detail below in conjunction with accompanying drawing.
Step 1: with the formal definition of the cloud some concepts relevant with trust.
Definition 1(trust value space) establishing TV is a quantitative domain, available perfect number value representation.Tv ∈ TV is a trust value, presentation-entity E 1To entity E 2The qualitative assessment of credibility.Claim that TV is a trust value space.The present invention sets TV ∈ [0,1].Tv is a real number, tv ∈ [0,1].The value of tv is larger, expression E 1More trust E 2
Definition 2(trust concept space) a trust concept space T is a qualitativing concept set on the TV of trust value space.T ∈ T is one and trusts concept, represents a kind of qualitatively reliability rating.The present invention sets T={ and distrusts, weak trust is trusted, and trusts, and trusts very much utmost good faith }.Each element among the set T is one and trusts concept.
Based on definition 1 and definition 2, the subjective trust that the present invention adopts definition 3 to describe based on cloud model.
Definition 3(trust cloud) establishing TV is a trust value space, and tv ∈ TV.T is one and trusts concept space, and t ∈ T.If trust value tv is a Stochastic implementation of trusting concept t, and tv is the random number that steady tendency is arranged to degree of certainty μ (tv) ∈ [0,1] of t, namely
μ:TV→[0,1]
∀ tv ∈ TV , tv → μ ( tv )
Then claim tv on TV, to be distributed as the trust cloud, claim that each tv is a water dust.For simplicity of exposition, tv is designated as ud to the degree of certainty μ (tv) of t.
Based on definition 3, the present invention adopts One-Dimensional Normal to trust cloud
Figure BDA00002675178100052
Presentation-entity E 1To entity E 2Subjective trust.
Normal state is trusted cloud also can be used for the trust concept that concept space is trusted in quantificational description.Claim this trust cloud for trusting the concept cloud, be designated as TCC (Ex, En, He).Ex among the TCC (Ex, En, He), the implication of En and He and presentation-entity trusting relationship
Figure BDA00002675178100053
Similar.
The honest value of definition 4(space) establishing SV is a quantitative domain, can use the perfect number value representation.Sv ∈ SV is a honest value, embodies entity E 1To entity E 2The qualitative assessment of recommendation information.Claim that SV is a honest value space.The present invention sets SV ∈ [0,1].Sv is the real number of value between 0 to 1.The value of sv is larger, expression E 1More can accept E 2The recommendation information that provides.
The honest concept space of definition 5() a honest concept space S is a qualitativing concept set on the honest value space S V.S ∈ S is a honest concept, represents a kind of qualitatively honest grade.It is dishonest that the present invention sets S={, and weak honesty is honest, and honesty is very honest, and is absolute honest }.Each element in the S set is a honest concept.
With trust the concept varieties of clouds seemingly, the present invention represents honest concept with honest concept cloud SCC (Ex, En, He).Usually, if honest concept space S is made of L honest concept, then wherein certain concept can be used
Figure BDA00002675178100061
Expression, 1≤k≤L, and
Figure BDA00002675178100062
According to definition 5, herein L=6.
Step 2: consider p entity E 1, E 2..., E p, it trusts transitive relation as shown in Figure 1.In this scene, only have adjacent two entities to know well (experience that direct interaction is namely arranged), i.e. E iWith E I+1Know well 1≤i≤p-1.Other entities are strange (experience that does not namely have direct interaction) mutually.Work as E pRequest and E 1During cooperation, E 1Need to pass through by E 2, E 3..., E P-1The information evaluation E that the recommendation paths that consists of provides pCredibility.Obviously, E iTo E I+1Degree of belief be E iEstimate E I+2The important evidence of credibility.E iWith E I+1The experience that direct interaction is arranged, E iTo E I+1Direct degree of belief Known, E then iCan be according to trusting cloud
Figure BDA00002675178100064
How decision treats E I+1To E I+2Recommendation.Similar with " trust ", E iTo E I+1The attitude of recommendation information also is a kind of probabilistic qualitativing concept of being with.The present invention adopts language word " honesty " to describe this concept, the honest value of definition space S V, honest concept space S and honest concept cloud SCC (Ex, En, He), E iTo E I+1The attitude of recommendation information is called E I+1With respect to E iHonest degree.
For convenience of description, at first according to E 1To E 2Direct degree of belief Calculate E 2With respect to E 1Honest degree σ 1,2, need to be with cloud
Figure BDA00002675178100066
Be converted to certain the honest concept among the S.Because the degree of certainty of a water dust can reflect that it is under the jurisdiction of the degree of certain qualitativing concept, utilization of the present invention Definite degree of middle water dust is realized above-mentioned conversion, and detailed process is as follows:
At first, will
Figure BDA00002675178100068
Three numerical characteristic Ex, En and He bring equation (1) and equation (2) repeatedly into, it is different to calculate N
Figure BDA00002675178100069
Figure BDA000026751781000610
Wherein, equation (1) expression as expected value and standard deviation, utilizes statistical calculation method to produce a normal random number with En and He
Figure BDA000026751781000611
Equation (2) expression with Ex and
Figure BDA000026751781000612
As expected value and standard deviation, utilize statistical calculation method to produce a normal random number v.
En ~ ~ N ( En , ( He ) 2 ) - - - ( 1 )
v ~ N ( Ex , ( En ~ ) 2 ) - - - ( 2 )
Then, will
Figure BDA00002675178100072
With It is different repeatedly to bring N of equation (1) generation into
Figure BDA00002675178100075
(1≤i≤N).
Then, will With
Figure BDA00002675178100077
Repeatedly bring equation (3) into and generate N different ud Ki, this value has embodied
Figure BDA00002675178100078
Water dust
Figure BDA00002675178100079
To cloud
Figure BDA000026751781000710
The degree of certainty of the honest concept of representative.
ud = exp [ - 1 2 ( v - Ex ) 2 / ( En ~ ) 2 ] - - - ( 3 )
At last, calculate N different ud according to formula (4) KiArithmetic mean σ k:
σ k = 1 N Σ i = 1 N ud ki - - - ( 4 )
σ kIt is larger,
Figure BDA000026751781000713
More can embody
Figure BDA000026751781000714
Feature, then make σ 1,2=max{ σ 1, σ 2..., σ L, i.e. E 2With respect to E 1Honest degree.
Step 3: according to E 2To E 1Honest degree σ 1,2And E 2To E 3Direct degree of belief Calculate E 1To E 3The transmission degree of belief
Figure BDA000026751781000716
Concrete grammar is,
Ex E 1 E 3 = σ 1,2 Ex 2 TC , En E 1 E 3 = ( 1 + σ 1,2 ) En 2 TC , He E 1 E 3 = ( 1 + σ 1,2 ) He 2 TC
Step 4: repeated execution of steps two and step 3, calculate successively E J+1With respect to E 1Honest degree σ 1, j+1And E 1To E J+2The transmission degree of belief
Figure BDA000026751781000720
Concrete grammar is,
Ex E 1 E j + 2 = σ 1 , j + 1 Ex j + 1 TC , En E 1 E j + 2 = ( 1 + σ 1 , j + 1 ) En j + 1 TC , He E 1 E j + 2 = ( 1 + σ 1 , j + 1 ) He j + 1 TC , j = 2,3 , . . . p - 2
Until calculate E 1To E pThe transmission degree of belief
Figure BDA000026751781000724
The content that is not described in detail in this specification belongs to the known prior art of this area professional and technical personnel.

Claims (1)

1. support the transmission degree of belief appraisal procedure that cooperation is safe in a Distributed Open Environments, specifically may further comprise the steps:
Step 1: definition trust value space TV, trust concept space T, trust cloud TC (Ex, En, He), trust concept cloud TCC (Ex, En, He), the basic conception of honest value space S V, honest concept space S and honest concept cloud SCC (Ex, En, He);
Step 2: consider p entity E 1, E 2..., E pThe trust transitive relation, only have adjacent two entities to know well, i.e. E iWith E I+1Know well, 1≤i≤p-1, other entities are mutually strange, work as E pRequest and E 1During cooperation, E 1Need to pass through by E 2, E 3..., E P-1The information evaluation E that the recommendation paths that consists of provides pCredibility, E iWith E I+1The experience that direct interaction is arranged, E iTo E I+1Direct degree of belief
Figure FDA00002675178000011
Known, E then iAccording to trusting cloud
Figure FDA00002675178000012
How decision treats E I+1To E I+2Recommendation, at first according to E 1To E 2Direct degree of belief calculate E 2With respect to E 1Honest degree σ 1,2, be specially:
(2.1) with E 1To E 2Direct degree of belief
Figure FDA00002675178000013
Three numerical characteristic Ex, En and He bring equation (1) and equation (2) repeatedly into, it is different to calculate N
Figure FDA00002675178000014
Figure FDA00002675178000015
En ~ ~ N ( En , ( He ) 2 ) - - - ( 1 )
v ~ N ( Ex , ( En ~ ) 2 ) - - - ( 2 )
(2.2) will trust the concept cloud
Figure FDA00002675178000018
Figure FDA00002675178000019
With
Figure FDA000026751780000110
It is different repeatedly to bring N of equation (1) generation into
Figure FDA000026751780000111
(2.3) will
Figure FDA000026751780000112
With
Figure FDA000026751780000113
Repeatedly bring equation (3) into and generate N different ud Ki, this value has embodied
Figure FDA000026751780000114
Water dust
Figure FDA000026751780000115
To cloud
Figure FDA000026751780000116
The degree of certainty of the honest concept of representative;
ud = exp [ - 1 2 ( v - Ex ) 2 / ( En ~ ) 2 ] - - - ( 3 )
At last, calculate N different ud according to formula (4) KiArithmetic mean σ k:
σ k = 1 N Σ i = 1 N u d ki - - - ( 4 )
σ kIt is larger,
Figure FDA000026751780000119
More can embody
Figure FDA000026751780000120
Feature, then make σ 1,2=max{ σ 1, σ 2..., σ L, i.e. E 2With respect to E 1Honest degree;
Step 3: according to E 2To E 1Honest degree and E 2To E 3Direct degree of belief calculate E 1To E 3The transmission degree of belief, be specially:
(3.1) according to E 2To E 1Honest degree σ 1,2And E 2To E 3Direct degree of belief
Figure FDA00002675178000021
Calculate E 1To E 3The transmission degree of belief
Figure FDA00002675178000022
In
Figure FDA00002675178000023
Ex E 1 E 3 = σ 1,2 Ex 2 TC ;
(3.2) according to E 2To E 1Honest degree σ 1,2And E 2To E 3Direct degree of belief Calculate E 1To E 3The transmission degree of belief
Figure FDA00002675178000026
In
Figure FDA00002675178000027
En E 1 E 3 = ( 1 + σ 1,2 ) En 2 TC ;
(3.2) according to E 2To E 1Honest degree σ 1,2And E 2To E 3Direct degree of belief
Figure FDA00002675178000029
Calculate E 1To E 3The transmission degree of belief
Figure FDA000026751780000210
In
Figure FDA000026751780000211
He E 1 E 3 = ( 1 + σ 1,2 ) He 2 TC ;
Step 4: according to the method for step 2 and step 3, calculate successively E J+1With respect to E 1Honest degree and E 1To E J+2The transmission degree of belief, j=2,3 ... p-2, until calculate E 1To E pThe transmission degree of belief
Figure FDA000026751780000213
Be specially:
(4.1) according to the described honest degree computational methods of step 2, calculate successively E J+1With respect to E 1Honest degree σ 1, j+1, j=2,3 ... p-2;
(4.2) according to the described transmission degree of belief of step 3 computational methods, calculate successively E 1To E J+2The transmission degree of belief
Figure FDA000026751780000214
Concrete grammar is:
Ex E 1 E j + 2 = σ 1 , j + 1 Ex j + 1 TC , En E 1 E j + 2 = ( 1 + σ 1 , j + 1 ) En j + 1 TC , He E 1 E j + 2 = ( 1 + σ 1 , j + 1 ) He j + 1 TC , j = 2,3 , . . . p - 2
Until calculate E 1To E pThe transmission degree of belief
Figure FDA000026751780000218
CN201210586252.8A 2012-12-28 2012-12-28 Distributed Open Environments is supported the transmission Trust Values Asses method of cooperation safety Expired - Fee Related CN103078850B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201210586252.8A CN103078850B (en) 2012-12-28 2012-12-28 Distributed Open Environments is supported the transmission Trust Values Asses method of cooperation safety

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201210586252.8A CN103078850B (en) 2012-12-28 2012-12-28 Distributed Open Environments is supported the transmission Trust Values Asses method of cooperation safety

Publications (2)

Publication Number Publication Date
CN103078850A true CN103078850A (en) 2013-05-01
CN103078850B CN103078850B (en) 2016-06-29

Family

ID=48155254

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201210586252.8A Expired - Fee Related CN103078850B (en) 2012-12-28 2012-12-28 Distributed Open Environments is supported the transmission Trust Values Asses method of cooperation safety

Country Status (1)

Country Link
CN (1) CN103078850B (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103561047A (en) * 2013-07-31 2014-02-05 南京理工大学 P2P network trust cloud model calculating method based on interest groups
CN105471844A (en) * 2015-11-15 2016-04-06 北京工业大学 Cloud service dynamic combination method based on trust synthesis
CN106411707A (en) * 2016-09-29 2017-02-15 重庆工商大学 Dual-scale trust perception method based on aid decision making in social network

Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070124579A1 (en) * 2005-11-28 2007-05-31 Jochen Haller Method and system for online trust management using statistical and probability modeling
CN101261717A (en) * 2008-04-09 2008-09-10 北京航空航天大学 Subjective trust evaluation method based on cloud model
EP2131552A2 (en) * 2008-06-05 2009-12-09 Deutsche Telekom AG A method for creating community of strangers using trust based reputation methods
CN102148829A (en) * 2011-03-29 2011-08-10 苏州市职业大学 Calculation method for entity node reliability under grid environment
CN102193861A (en) * 2011-03-15 2011-09-21 北京邮电大学 Software credibility measurement and estimation method based on data mining

Patent Citations (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20070124579A1 (en) * 2005-11-28 2007-05-31 Jochen Haller Method and system for online trust management using statistical and probability modeling
CN101261717A (en) * 2008-04-09 2008-09-10 北京航空航天大学 Subjective trust evaluation method based on cloud model
EP2131552A2 (en) * 2008-06-05 2009-12-09 Deutsche Telekom AG A method for creating community of strangers using trust based reputation methods
CN102193861A (en) * 2011-03-15 2011-09-21 北京邮电大学 Software credibility measurement and estimation method based on data mining
CN102148829A (en) * 2011-03-29 2011-08-10 苏州市职业大学 Calculation method for entity node reliability under grid environment

Non-Patent Citations (4)

* Cited by examiner, † Cited by third party
Title
XIANGYI.MENG等: "《A new subjective trust model based on cloud model》", 《PROCEEDINGS OF THE 5TH INTERNATIONAL CONFERENCE ON NETWORKING,SENSING AND CONTROL(ICNSC’08) IEEE》, 8 April 2008 (2008-04-08) *
刘伟等: "《协同环境下基于委托的动态信任模型》", 《第五届中国信息和通信安全学术会议》, 1 July 2007 (2007-07-01) *
杜薇: "《面向分布式开放环境的信任管理机制及其应用研究》", 《华中科技大学博士学位论文》, 31 December 2011 (2011-12-31) *
杜薇等: "《An Uncertainty Enhanced Trust Evolution Strategy for e-Science》", 《JOURNAL OF COMPUTER SCIENCE AND TECHNOLOGY》, vol. 25, no. 6, 30 November 2010 (2010-11-30) *

Cited By (5)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN103561047A (en) * 2013-07-31 2014-02-05 南京理工大学 P2P network trust cloud model calculating method based on interest groups
CN105471844A (en) * 2015-11-15 2016-04-06 北京工业大学 Cloud service dynamic combination method based on trust synthesis
CN105471844B (en) * 2015-11-15 2018-05-25 北京工业大学 A kind of cloud service dynamic composition method based on trust combination
CN106411707A (en) * 2016-09-29 2017-02-15 重庆工商大学 Dual-scale trust perception method based on aid decision making in social network
CN106411707B (en) * 2016-09-29 2019-03-26 重庆工商大学 Double scale trust-aware methods in social networks based on aid decision

Also Published As

Publication number Publication date
CN103078850B (en) 2016-06-29

Similar Documents

Publication Publication Date Title
Zeng et al. Dependability analysis of control center networks in smart grid using stochastic petri nets
CN102799822B (en) Software running security measurement and estimation method based on network environment
Qu et al. Method for quantitative estimation of the risk propagation threshold in electric power CPS based on seepage probability
CN103177186B (en) A kind of electric loop probability of malfunction Forecasting Methodology
CN102323469B (en) System for monitoring state of harmonic load
CN107730044A (en) A kind of hybrid forecasting method of renewable energy power generation and load
CN109767352A (en) A kind of power information physics emerging system safety situation evaluation method
CN103077447A (en) Subway construction safety management decision-making method based on Bayesian network
CN107332889A (en) A kind of high in the clouds information management control system and control method based on cloud computing
Peng et al. Reliability analysis in interdependent smart grid systems
CN104133143B (en) A kind of Guangdong power system diagnostic system and method calculating platform based on Hadoop cloud
CN107180148A (en) A kind of reliability analyzing method based on generalized regression nerve networks and response phase method
CN103078850A (en) Transitive-trust evaluating method for supporting cooperative security in distributed open environment
CN106202707A (en) A kind of structural stress Strength Interference Model set analysis method for reliability based on Lycoperdon polymorphum Vitt confidence interval
CN107370633A (en) Network safety evaluation method based on node weights
Qu et al. Research on short‐term output power forecast model of wind farm based on neural network combination algorithm
Wang et al. False data injection attack detection based on interval affine state estimation
CN107918920B (en) Output correlation analysis method for multiple photovoltaic power stations
CN102662848B (en) Bayesian software reliability checking and testing method and computer aided tool thereof
Liu et al. Reliability analysis of a random fuzzy repairable parallel system with two non-identical components
Chan Agent-based and regression models of social influence
CN106550387B (en) A kind of wireless sensor network routing layer QoS evaluating method
Liu et al. Production and construction quality management system of prefabricated buildings based on BIM technology
CN101714198A (en) System based on Bayesian estimation for evaluating credibility of countermeasure information of computer network
Haikun et al. Application of big data technology in emergency decision system

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
C14 Grant of patent or utility model
GR01 Patent grant
CF01 Termination of patent right due to non-payment of annual fee

Granted publication date: 20160629

Termination date: 20181228

CF01 Termination of patent right due to non-payment of annual fee