CN103731494B - Method for service selection based on fuzzy theory in cloud computing - Google Patents
Method for service selection based on fuzzy theory in cloud computing Download PDFInfo
- Publication number
- CN103731494B CN103731494B CN201310751971.5A CN201310751971A CN103731494B CN 103731494 B CN103731494 B CN 103731494B CN 201310751971 A CN201310751971 A CN 201310751971A CN 103731494 B CN103731494 B CN 103731494B
- Authority
- CN
- China
- Prior art keywords
- service
- information
- privacy
- cloud
- cloud computing
- Prior art date
- Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
- Expired - Fee Related
Links
Abstract
Method for service selection based on fuzzy theory in the cloud computing that the present invention is provided, is related to computer network security technology field, including input cloud user privacy information collection;Output cloud specific service is obtained;Service preferences matrix initialisation, default value is 1:Privacy information be 0 value when service preferences be 1 all, privacy information be 1 when service preferences be 0;If cloud user is AiX after ∈ Ai∈ X are estimated, and obtain matrix R=(rax)m×nThat is service preferences;Calculate each information type x to be selectediWeight coefficient wi;Draw comprehensive preference valueRepresent service preferences value of the privacy information to information type;Specifying information set is obtained by comprehensive preference using the equivalent mappings relation of fuzzy number, algorithm terminates.The technical problems to be solved by the invention are to provide in a kind of cloud computing the method for service selection based on fuzzy theory, for solving user individual demand for services and the controllability of service in cloud computing environment, the purpose of privacy of user protection are reached with this.
Description
Technical field
The present invention relates to computer network security technology field, more particularly in cloud computing, the service based on fuzzy theory is selected
Selection method.
Background technology
Cloud computing service pattern is widely applied the highest attention that prospect is increasingly subject to academia and industrial quarters with it, with it
Distinctive mode changes people's life, however, the extensive computation of cloud computing is concentrated shared pattern and used with storage resource
The characteristics such as family end resource-constrained, movement bring bigger new challenge to user data privacy and integrality.
Service Source in cloud platform is extremely huge, how to combine closely cloud computing service the characteristics of with user individual
Demand for services, the service that is variable, can fitting for studying customer-centric is polymerized and intelligent coordinated method on demand, is formed safely controllable
User's request service-domain it is urgently to be resolved hurrily.
Therefore, need at present those skilled in the art solve a technical problem be exactly:How to propose that one kind is effectively arranged
Impose the greater demand for meeting practical application.
The content of the invention
The technical problems to be solved by the invention are to provide the method for service selection based on fuzzy theory in a kind of cloud computing,
For solving user individual demand for services and the controllability of service in cloud computing environment, the mesh of privacy of user protection is reached with this
's.
In order to solve the above problems, the present invention provides the method for service selection based on fuzzy theory in a kind of cloud computing, bag
Include:
Input cloud user privacy information collection;
Output cloud specific service is obtained;
Service preferences matrix initialisation, default value is 1:Service preferences are 1 whole, privacy letter when privacy information is 0 value
Cease for 1 when service preferences be 0;
If cloud user is AiX after ∈ Ai∈ X are estimated, and obtain matrix R=(rax)m×nThat is service preferences;
Calculate each information type x to be selectediWeight coefficient wi;Draw comprehensive preference value Represent hidden
Personal letter ceases the service preferences value to information type;
Specifying information set is obtained by comprehensive preference using the equivalent mappings relation of fuzzy number, algorithm terminates.
Further, it is separate between the privacy information collection.
Further, each element occupies a line in the matrix in the privacy information.
Further, each element in information type occupies the row in matrix.
To sum up, medium cloud user of the present invention protects the safety of privacy information using the selection of privacy information;Comprehensive preference
Obtaining can be with increasing for privacy information more precisely, and user also more refines to the selection for servicing of course simultaneously, is reached with this
To the demand of safely controllable service.
Brief description of the drawings
Fig. 1 is the schematic flow sheet of the method for service selection based on fuzzy theory in cloud computing of the invention;
Fig. 2 is the schematic diagram for being obtained by algorithm and specifically quantifying services selection of the invention.
Specific embodiment
In order to make the purpose , technical scheme and advantage of the present invention be clearer, below in conjunction with the accompanying drawings with example to this
Invention is described in further detail.But example is not as a limitation of the invention.
It is special that the distinctive service offer pattern of cloud computing also brings it while bringing incomparable excellent Consumer's Experience
Extensive Service Source provides the lance of personalized demand for services controllable with user under some safety problems, wherein cloud computing environment
Shield is an important issue.The method such as existing personalized access control and access filtering can not be fully solved controllable of cloud user
Property demand for services problem.
Experienced to preferably protect cloud privacy of user to lift user's cloud service application, with cloud computing user to the need that service
Ask --- safely controllable is starting point, proposes a kind of method for service selection based on fuzzy theory.
Specifically as shown in figure 1, the present invention provides a kind of flow of the method for service selection based on fuzzy theory in cloud computing
Schematic diagram, including:
Input cloud user privacy information collection;
Output cloud specific service is obtained;
Service preferences matrix initialisation, default value is 1:Service preferences are 1 whole, privacy letter when privacy information is 0 value
Cease for 1 when service preferences be 0;
If cloud user is AiX after ∈ Ai∈ X are estimated, and obtain matrix R=(rax)m×nThat is service preferences;
Calculate each information type x to be selectediWeight coefficient wi;Draw comprehensive preference value Represent hidden
Personal letter ceases the service preferences value to information type;
Specifying information set is obtained by comprehensive preference using the equivalent mappings relation of fuzzy number, algorithm terminates.
Preferably, it is separate between the privacy information collection.
Preferably, each element occupies a line in the matrix in the privacy information.
Preferably, each element in information type occupies the row in matrix.
The present invention proposes a kind of method for service selection based on fuzzy theory.In the method cloud user as policymaker according to
Service preferences are given according to the privacy information collection of oneself, then become the preference information of each information collection according to certain assembly rule set
Comprehensive preference, in this, as the ultimate criterion of selection information service.Related definition and process are as follows:
U is all specifying information set, privacy information collection in cloud service(Fuzzy subset)By A1,A2,...,AnComposition, it
Between it is separate, under the scene for receiving information service, original state A is the i.e. A of cloud user profile set1∪A2,...,
An-1∪An→U;xiRefer to cloud service information type X={ x1,x2,...xnConstitute the information service collection that our cloud users obtain
Close;Service preferences can be expressed as a matrix R=(rax)m×n, raxEach element in ∈ [0,1] wherein privacy information collection A
The a line in matrix is occupied, each element in information type X occupies the row in matrix, then each element in matrix
R [a, x] is then represented by, the default value for noting matrix is 1.
Input:Cloud user privacy information collection
Output:Cloud specific service is obtained
Method for service selection based on fuzzy theory
Step 1. service preferences matrix initialisation, default value is 1:Privacy information be 0 value when service preferences be 1 whole,
Service preferences are 0 when privacy information is 1;
It is A that step 2. sets cloud useriX after ∈ Ai∈ X are estimated, and obtain matrix R=(rax)m×nThat is service preferences;
Step 3. calculates each information type x to be selectediWeight coefficient wi;Draw comprehensive preference value
Represent service preferences value of the privacy information to information type;
Step 4. obtains specifying information set using the equivalent mappings relation of fuzzy number by comprehensive preference, and algorithm terminates.
Explanation:This method employs the related thought of access control based roles:User, authority, role divide herein
Dui Ying not specifying information, privacy information collection, information category.Privacy information collection describes the privacy information of user, each privacy information
Set pair information category all possesses corresponding selection authority;Information category such as entertains class, news category etc.;During cloud computing service is provided
Specific information, belongs to information category.I.e. privacy information collection is mapped to corresponding information category, that is, have specifying information
Right to choose.
More specifically, in order to verify validity of this method to service quantification, an application example for algorithm is given:It is false
It is located in cloud computing information service scene, cloud user discharges 3 kinds of privacy informations successively.Privacy information includes sex, age, duty
Industry;Information type is respectively news, physical culture, amusement, health.Cloud user prepares to select this 5 class to believe according to this 3 kinds of privacy informations
Specifying information, service preferences such as table 1 in breath type.
0.2 | 0.1 | 0.4 | 0.3 | — | |
0.3 | 0.1 | 0.2 | 0.4 | — | |
0.4 | 0.3 | 0.1 | 0.2 | — | |
— | 1 | 1 | 1 | 1 | 1 |
— | 1 | 1 | 1 | 1 | 1 |
Table 1:Service preferences
Specifically quantization services selection such as Fig. 2 can be obtained by algorithm, as can be seen from Figure 2 privacy is believed in the method for the invention
Cease has clear and definite influence power to the selection for servicing, and with the rising that privacy information is provided, service offer amount is reduced therewith, finally
Trend is to tend to definite value, reflects psychological needs of the cloud user to information service.This demand is related to cater to needs, secret protection
Deng the conflict in field.
Further, the method for service selection application cloud user based on rough set proposed by the present invention to service preference,
The decision-making of services selection is made, and the privacy information that service preferences depend entirely on user is provided, and as privacy information is provided
Increase, services selection is more fine.The method receives the Scenario Design of information service for cloud user, but is also applicable in other
Similar occasion.
Analysis shows, the method medium cloud user protects the safety of privacy information using the selection of privacy information;It is comprehensive inclined
Good acquisition can be with increasing for privacy information more precisely, and user also more refines to the selection for servicing of course simultaneously, with
This reaches the demand of safely controllable service.
The foregoing description of the disclosed embodiments, enables professional and technical personnel in the field to realize or uses the present invention.
Various modifications to these embodiments will be apparent for those skilled in the art, as defined herein
General Principle can be realized in other embodiments without departing from the spirit or scope of the present invention.Therefore, the present invention
The embodiments shown herein is not intended to be limited to, and is to fit to and principles disclosed herein and features of novelty phase one
The scope most wide for causing.
Claims (4)
1. the method for service selection of fuzzy theory is based in a kind of cloud computing, including:
Input cloud user privacy information collection;
Output specifying information collection;
Service preferences matrix initialisation, default value is 1:Service preferences are that 1, privacy information is serviced when being 1 when privacy information is 0 value
Preference is 0;
If cloud user is Ai∈ A and Xi∈ X are estimated, and obtain matrix R=(rax)m×nThat is service preferences;Wherein:A is cloud user
Privacy information collection, AiIt is i-th element in privacy information collection A, X is information type, XiIt is i-th yuan in information type X
Element, raxIt is each element in matrix R, m × n represents the matrix that service preferences R is m × n;
Calculate each information type X to be selectediWeight coefficient wi;Draw comprehensive preference value Represent privacy information
To the service preferences value of information type;
Specifying information set is obtained by comprehensive preference using the equivalent mappings relation of fuzzy number, specifying information set is cloud user clothes
It is engaged in the result of selection, algorithm terminates.
2. the method for service selection of fuzzy theory is based in cloud computing as claimed in claim 1, it is characterised in that the privacy
It is separate between information collection.
3. the method for service selection of fuzzy theory is based in cloud computing as claimed in claim 1, it is characterised in that the privacy
Each element occupies a line in the matrix in information.
4. the method for service selection of fuzzy theory is based in cloud computing as claimed in claim 1, it is characterised in that information type
In each element occupy row in matrix.
Priority Applications (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310751971.5A CN103731494B (en) | 2013-12-31 | 2013-12-31 | Method for service selection based on fuzzy theory in cloud computing |
Applications Claiming Priority (1)
Application Number | Priority Date | Filing Date | Title |
---|---|---|---|
CN201310751971.5A CN103731494B (en) | 2013-12-31 | 2013-12-31 | Method for service selection based on fuzzy theory in cloud computing |
Publications (2)
Publication Number | Publication Date |
---|---|
CN103731494A CN103731494A (en) | 2014-04-16 |
CN103731494B true CN103731494B (en) | 2017-06-23 |
Family
ID=50455416
Family Applications (1)
Application Number | Title | Priority Date | Filing Date |
---|---|---|---|
CN201310751971.5A Expired - Fee Related CN103731494B (en) | 2013-12-31 | 2013-12-31 | Method for service selection based on fuzzy theory in cloud computing |
Country Status (1)
Country | Link |
---|---|
CN (1) | CN103731494B (en) |
Families Citing this family (1)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN110930747B (en) * | 2018-09-20 | 2021-11-19 | 上海丰豹商务咨询有限公司 | Intelligent internet traffic service system based on cloud computing technology |
Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102411735A (en) * | 2011-09-09 | 2012-04-11 | 河海大学常州校区 | Evaluation method of reconfiguration planning scheme of reconfigurable assembly system |
CN102624835A (en) * | 2011-11-03 | 2012-08-01 | 李宗诚 | Internet ECH/ICT balance configuration method |
CN102930350A (en) * | 2012-10-25 | 2013-02-13 | 合肥工业大学 | Uncertainty optimization decision-making method for green product design scheme |
CN103077177A (en) * | 2012-08-28 | 2013-05-01 | 华南理工大学 | Fuzzy QoS (Quality of Service) selection method for web service in combination with expert opinion and user preference |
CN103268420A (en) * | 2013-05-24 | 2013-08-28 | 河海大学 | Method for evaluating risks of high rock slope |
-
2013
- 2013-12-31 CN CN201310751971.5A patent/CN103731494B/en not_active Expired - Fee Related
Patent Citations (5)
Publication number | Priority date | Publication date | Assignee | Title |
---|---|---|---|---|
CN102411735A (en) * | 2011-09-09 | 2012-04-11 | 河海大学常州校区 | Evaluation method of reconfiguration planning scheme of reconfigurable assembly system |
CN102624835A (en) * | 2011-11-03 | 2012-08-01 | 李宗诚 | Internet ECH/ICT balance configuration method |
CN103077177A (en) * | 2012-08-28 | 2013-05-01 | 华南理工大学 | Fuzzy QoS (Quality of Service) selection method for web service in combination with expert opinion and user preference |
CN102930350A (en) * | 2012-10-25 | 2013-02-13 | 合肥工业大学 | Uncertainty optimization decision-making method for green product design scheme |
CN103268420A (en) * | 2013-05-24 | 2013-08-28 | 河海大学 | Method for evaluating risks of high rock slope |
Non-Patent Citations (1)
Title |
---|
基于上下文和用户行为的移动用户偏好获取系统的设计与实现;张德英;《中国优秀硕士学位论文全文数据库信息科技辑》;20120831;正文第3-4章 * |
Also Published As
Publication number | Publication date |
---|---|
CN103731494A (en) | 2014-04-16 |
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Wu | Analysis of parameter selections for fuzzy c-means | |
Winter | Algorithmic discrimination: Big data analytics and the future of the Internet | |
CN105528248B (en) | Intelligent perception incentive mechanism under multitask collaboration application | |
US20140330760A1 (en) | Content distribution | |
Waggoner et al. | Person perception by active versus passive perceivers | |
Gan | COUSIN: A network-based regression model for personalized recommendations | |
Gundecha et al. | User vulnerability and its reduction on a social networking site | |
Friedewald et al. | Technology and privacy | |
Grünewald et al. | The trust gap: Social perceptions of privacy data for energy services in the United Kingdom | |
US10031534B1 (en) | Providing set point comparison | |
CN108090082A (en) | Information processing method and information processing unit | |
Katarya et al. | Restaurant recommender system based on psychographic and demographic factors in mobile environment | |
CN103731494B (en) | Method for service selection based on fuzzy theory in cloud computing | |
Hindia et al. | A novel scheduling algorithm based on game theory and multicriteria decision making in LTE network | |
Beach et al. | q-Anon: Rethinking anonymity for social networks | |
Salah et al. | DeviantArt in spotlight: A network of artists | |
Menasria et al. | The purpose driven privacy preservation for accelerometer-based activity recognition | |
Kayes et al. | Out of the wild: On generating default policies in social ecosystems | |
史艳翠 et al. | Adaptive learning approach of contextual mobile user preferences | |
Li et al. | Protecting private geosocial networks against practical hybrid attacks with heterogeneous information | |
Liu et al. | Collaborative filtering recommendation algorithm based on user attributes and item score | |
Jeong et al. | Hybrid food recommendation system using auto-generated user profiles | |
Sung et al. | Future trends of blockchain and crypto currency: Challenges, opportunities, and solutions | |
Wang et al. | User heterogeneity and individualized recommender | |
Qiao et al. | Personalized recommendation algorithm based on situation awareness |
Legal Events
Date | Code | Title | Description |
---|---|---|---|
C06 | Publication | ||
PB01 | Publication | ||
C10 | Entry into substantive examination | ||
SE01 | Entry into force of request for substantive examination | ||
GR01 | Patent grant | ||
GR01 | Patent grant | ||
TR01 | Transfer of patent right | ||
TR01 | Transfer of patent right |
Effective date of registration: 20180515 Address after: 810000 Qinghai University Science Park, No. 97 Ning Zhang Road, Chengbei District, Xining, Qinghai Patentee after: Qinghai city cloud Big Data Technology Co., Ltd. Address before: No. 100, Chaoyang District flat Park, Beijing, Beijing Patentee before: Beijing University of Technology |
|
CF01 | Termination of patent right due to non-payment of annual fee | ||
CF01 | Termination of patent right due to non-payment of annual fee |
Granted publication date: 20170623 Termination date: 20191231 |