CN104092564A - Cloud storage service credit evaluation method - Google Patents

Cloud storage service credit evaluation method Download PDF

Info

Publication number
CN104092564A
CN104092564A CN201410283074.0A CN201410283074A CN104092564A CN 104092564 A CN104092564 A CN 104092564A CN 201410283074 A CN201410283074 A CN 201410283074A CN 104092564 A CN104092564 A CN 104092564A
Authority
CN
China
Prior art keywords
node
trust value
server node
trust
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201410283074.0A
Other languages
Chinese (zh)
Other versions
CN104092564B (en
Inventor
毛剑
李腾
王瑞珑
陈杰
王培人
伍前红
刘建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201410283074.0A priority Critical patent/CN104092564B/en
Publication of CN104092564A publication Critical patent/CN104092564A/en
Application granted granted Critical
Publication of CN104092564B publication Critical patent/CN104092564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)
  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)

Abstract

A cloud storage service credit evaluation method comprises two stages and six steps. At the first stage, server node credit evaluation is conducted, and the method includes the specific steps that first, the direct trust value TD (Ci, Sj) of Ci to Sj is calculated; second, the recommendation trust value TR (Ci, Sj) of Ci to Sj is calculated; third, the finial trust value T (Ci, Sj) of Ci to Sj is calculated; fourth, the system trust value T (Sj) of a server node Sj is calculated at the stage. At the second stage, user node credit evaluation is conducted, and the method includes the specific steps that fifth, the system trust value T (Ci) of a user node Ci is calculated; sixth, trust value updating is carried out. According to the cloud storage service credit evaluation method, technological evidence is used as a trust evaluation source, credit evaluation is conducted on the user node based on user behavior, the data integrity verification result is used as a CSP storage service trust characteristic so that the CSP storage service can be measured, and therefore the objective fairness and verifiability of the trust measurement are guaranteed.

Description

A kind of cloud stores service credit assessment method
Technical field
The present invention relates to a kind of cloud stores service credit assessment method, under cloud storage environment, by data integrity, detect server node and user node are carried out to credit rating, belong to cloud computing field.
Background technology
Cloud storage is a kind of online memory module, be that user's (client) and server (high in the clouds) are by certain agreement, the outsourcing data of oneself are stored in to high in the clouds, and this emerging storage mode, has flexibility, low cost, the extensibility of cloud computing.User can access high in the clouds whenever and wherever possible, obtains the data of oneself; User pays according to the own actual memory space using, and has reduced the maintenance of data and the cost of purchase memory device, and can expand according to the needs of storage., there is increasing cloud service provider (Cloud Service Provider, CSP) in the development along with cloud storage, a large amount of dissimilar cloud stores service is being provided.Because user is stored in high in the clouds by data, lost physically the control to data, the data that are stored in high in the clouds may be tampered, and delete etc.Therefore, the quality of the prestige of cloud service provider and the cloud storage that they provide becomes the emphasis that user is concerned about, so the cloud stores service that need to provide according to CSP is carried out just credit rating to them.
The method of the existing credit appraisal for cloud stores service is divided into two kinds substantially: a kind of is by the capacity of cloud storage, speed, and the features such as price are analyzed contrast, propose corresponding evaluation method and mark to CSP; Another kind be user used CSP to provide cloud service after give a mark or vote, then these subjective assessments are carried out to polymerization analysis.There are some defects in these evaluation methods: 1) user is subjective assessment to the evaluation of CSP to a certain extent, merely subjective assessment carried out to polymerization analysis and will certainly have evaluation prejudice; 2) only considered the evaluation of user to CSP, and mostly ignored user, also may have the situation of dishonest conduct, for example malice is evaluated, false ballot, lazy node etc.; 3) do not relate to the core of CSP stores service tolerance: the integrality that is stored in high in the clouds data.So propose a kind of cloud stores service credit assessment method of objective and fair, seem particularly important.
In order to realize the fair appraisal to cloud stores service, the present invention utilizes objective technology evidence as the source of trust evaluation, and the behavior based on user is simultaneously carried out credit rating to user node.We utilize the core feature that cloud stores service is measured: the result of data integrity checking is measured CSP stores service as the trust feature of CSP stores service, thereby guarantee the objectivity of trust metrics.By analysis user, the participative behavior in trust evaluation reciprocal process is evaluated the prestige of user node simultaneously, to prevent maliciously evaluating and detect lazy node etc., guarantees the fairness of credit rating, objectivity and verifiability.
Summary of the invention
(1) goal of the invention
The object of the invention is to propose a kind of cloud stores service credit assessment method, according to the core feature of CSP stores service tolerance, the result of data integrity checking carries out as the source of trust evaluation the credit appraisal that can verify to CSP; Meanwhile, the behavior based on user is carried out credit rating to user node, can effectively resist false evaluation, lazy node, guarantees fairness, objectivity and the verifiability of credit rating.
(2) technical scheme
In order to achieve the above object, the source that the present invention has used the result of data integrity checking to calculate as trust value, its technical scheme is as follows.
The cloud storage trust model the present invention relates to comprises two network entities: 1) store data in individual or the enterprise institution in high in the clouds, i.e. user; 2) there is the cloud service provider of special resource and computing capability.
According to the execution phase, it can divide two stages: the stage one in the present invention: server node credit rating is the CSP stores service credit appraisal stage; Stage two: user node credit rating is the user node credit rating stage based on user behavior.
A kind of cloud stores service of the present invention credit assessment method, the technical scheme of the method is as follows:
Stage one: server node credit rating: comprise step 1~step 4, respectively computing client end node C ito server node S jdirect trust value (only pass through C iself and S jthe trust value that interactive computing obtains) T d(C i, S j) and recommendation trust (by other nodes and S jthe trust value that interactive computing obtains) T r(C i, S j); By direct trust value and recommendation trust, calculate C ito S jfinal trust value T (C i, S j); The all client node of polymerization is to S again jtrust value obtain server node S jsystem trust value T (S j).
Step 1: calculate C ito S jdirect trust value T d(C i, S j): to carry out each time the result (provide { 0,1} evaluates, and 1 represents to be verified, and data are complete, and 0 represents that checking do not pass through, and data are imperfect) of data integrity checking, be input, the desired value characteristic of utilizing beta to distribute completes C ito S jdirect trust value tolerance.
Step 2: calculate C ito S jrecommendation trust T r(C i, S j): by with server node S jmutual other client nodes C crossing r∈ ID (S j, C i) to server node S jthe comprehensive measurement of trusting degree calculate C ito S jrecommendation trust: we are with C rto S jdirect trust value T d(C r, S j) as C rto S jtrusting degree, trust weight is defined as to C rand C ithe similarity of the server node of their common mutual mistake being carried out to the result of data integrity checking, the data integrity evaluation result that they provide is more similar, and the trusting degree between them is just higher, with root mean square RMS (C r, C i) identify.
Step 3: calculate C ito S jfinal trust value T (C i, S j): the direct trust value that step 1 and 2 is obtained and recommendation trust carry out polymerization and calculate C ito S ifinal trust value.
Step 4: calculation server node S jsystem trust value T (S j): by all client node C i(i=1to m) is to S jtrust value T (C i, S j) carry out polymerization, its weight definition is C itrust value T (C i), finally obtain all S jthe system trust value of (j=1to n).
Stage two: user node credit rating: the credit value of the server node calculating according to the first stage, arranges a decision threshold T thjudge S jwhether be honest server node.Then according to the behavior of user node, its prestige is added up, accumulative total rule is: carrying out integrity verification result with honest server node is 1 and to carry out integrity verification result with dishonest server node be 0 to be all considered as dishonest behavior, interbehavior trust value accumulative total; Other are all considered as dishonest conduct, and interbehavior trust value does not add up.The trust value of server node and user node is carried out to iteration renewal simultaneously, make it reach stable state.
Step 5: calculate user node C isystem trust value T (C i): first determine and C iset I (the C of the mutual server node of crossing i), then judge C iwith I (C i) in the history of each element interactions, according to mutual trust accumulative total rule, trust value add up, then will trust aggregate-value and server node and utmost good faith/non-honest degree of closeness P jcarry out product weighting, just can calculate user node C isystem trust value T (C i).
Step 6: belief updating: in step 4, we will use the user node C also not calculating isystem trust value T (C i), still be provided with T (C i) initial value T default.In this step, we need to calculate the server node of stable state and the trust value of user node according to above calculation procedure the mode by iterative computation, constantly the system trust value of server node and user node is carried out to iterative computation, make its value reach convergence.
Wherein, at " the calculating C described in step 1 ito S jdirect trust value T d(C i, S j) ", its computational process is as follows: n wherein ijfor client node C iwith server node S jcarry out the total degree of integrity verification; F pDP(C i, S j, k) be client node C iwith server node S jcarry out the result of the k time integrity verification; VEF (C i, S j, k) be client node C iwith server node S jenvirment factor while carrying out the k time integrity verification.
Wherein, at " the calculating C described in step 2 ito S jrecommendation trust T r(C i, S j) ", its computational process is as follows: T R ( C i , S j ) = Σ C r ∈ ID ( S j , C i ) T D ( C r , S j ) · RMS ( C r , C i ) Σ C q ∈ ID ( S j , C i ) RMS ( C q , C i ) , ID (S wherein j, C i) be I (S j) remove C in set ithe set of node; RMS (C r, C i) be root mean square, be used for being expressed as C ito C rtrusting degree, its computational methods are as follows: RMS ( C r , C i ) = 1 - Σ y ∈ SS ( C r , C i ) ( Σ k = 1 N ( C r , y ) F PDP ( C r , y , k ) N ( C r , y ) - Σ k = 1 N ( C i , y ) F PDP ( C i , y , k ) N ( C i , y ) ) 2 | SS ( C r , C i ) | , SS (C wherein r, C i) be and client node C rand C iall carried out the server node set of integrity verification.
Wherein, at " the calculating C described in step 3 ito S jfinal trust value T (C i, S j) ", its computational process is as follows: T (C i, S j)=α T d(C i, S j)+β T r(C i, S j), wherein α and β are respectively the weight of direct trust value and recommendation trust.
Wherein, at " the calculation server node S described in step 4 jsystem trust value T (S j) ", its computational process is as follows: T ( S j ) = Σ i = 1 m T ( C i , S j ) · T ( C i ) Σ j = 1 m T ( C j ) .
Wherein, at " the calculating user node C described in step 5 isystem trust value T (C i) ", its computational process is as follows: i (C wherein i) be and C ithe set of the mutual server node of crossing; ? be a set, in set, the number of element is | I (C i) |, representative is and C respectively ithe numbering of mutual server node; a ijfor client node C iwith server node S jcan be to T (C in interaction results i) accumulative total trust value; P jfor server node and utmost good faith/non-honest degree of closeness.
(3) advantage and effect
A kind of cloud stores service of the present invention credit assessment method, its advantage with effect is: 1) compare with existing Cloud Server credit rating model, this model not only can carry out credit rating to Cloud Server node, also can carry out credit rating to user node, can avoid false and evaluate, resist lazy node; 2) different from the reputation model based on subjective assessment, the present invention is based on objective technology evidence, and the result that data integrity detects is carried out the calculating of trust value, makes model have stronger objectivity and fairness; 3) model finally can reach stable state, and the trust value of each node calculating all reaches convergence, makes model have correctness and stability; 4) be provided with communication environment factor variable, for the significance level difference of data integrity proof procedure each time, the weight of this communication be weighted, can effectively avoid malice evaluation.
Accompanying drawing explanation
Fig. 1 is FB(flow block) of the present invention
Fig. 2 is system architecture diagram of the present invention
Embodiment
The present invention includes two entities, user and cloud server.Below with reference to accompanying drawing, described data are held to effective verification method and be described in detail, Fig. 1 is FB(flow block) of the present invention; Fig. 2 is system architecture diagram of the present invention;
Main symbol and algorithmic translation:
(1) F pDP(C i, S j, k): client node C iwith server node S jcarry out the k time PDP (Provable Data Possession, the data property held proves) the result;
(2) N (C i, S j): client node C iwith server node S jcommunicate the total degree of (PDP checking), can note by abridging as n ij;
N ij1: client node C iwith server node S jcarrying out PDP checking, to provide the result be 1 number of times
N ij2: client node C iwith server node S jcarrying out PDP checking, to provide the result be 0 number of times
N ij3: client node C iwith server node S jtherefore carrying out PDP checking, to provide the result be that the number of times of NULL has: n ij=n ij1+ n ij2+ n ij3;
(3) VEF (C i, S j, k): Verification Environment Factor, client node C iwith server node S jenvirment factor while carrying out the k time PDP checking.Effect: can preventing malice attack, for example very sincere in little transaction, promotes own prestige, thereby and in concluding the business greatly non-honest profit;
(4) I (S j): with server node S jcarried out the set of the client node of PDP checking;
(5) ID (S j, C i): I (S j) remove C in set ithe set of node;
(6) RMS (C r, C i): root-mean-square, root mean square, is used for comparison node C iand C revaluation difference to the server node of their common mutual mistake, is expressed as C ito C rtrusting degree, if evaluation situation is similar, their root-mean-square value is high, trusting degree is high, otherwise trusting degree is low;
(7) SS (C r, C i): with client node C rand C iall carried out the server node set of PDP checking;
(8) I (C i): with C ithe set of the mutual server node of crossing;
(9) i.e. definition be a set, in set, the number of element is | I (C i) |, representative is and C respectively ithe numbering of mutual server node;
(10) a ij = n ij 1 n ij , if T ( S j ) &GreaterEqual; T th n ij 2 n ij , if T ( S j ) < T th : define a ijfor client node C iwith server node S jcan be to T (C in interaction results i) accumulative total trust value;
(11) P j = T ( S j ) , if T ( S j ) &GreaterEqual; T th 1 - T ( S j ) , if T ( S j ) < T th : P jfor server node and utmost good faith/non-honest degree of closeness.
Technical scheme can be divided into server node credit rating and two stages of user node credit rating.A kind of cloud stores service of the present invention credit assessment method, the method concrete steps (comprising specific formula for calculation and algorithm) are as follows:
The 1.CSP stores service credit appraisal stage
Step 1: calculate C ito S jdirect trust value T d(C i, S j)
Calculating direct trust value should be by client node C iwith server node S jinteractive history obtain, due to client node C iwith server node S jmay be alternately repeatedly, so will carry out each time result (provide { 0, the 1} evaluation) F of PDP checking pDP(C i, S j, k) be multiplied by verification environment factor VEF (C each time i, S j, k), then carry out polymerization and normalized.If refusal provides PDP the result, { 0,1} evaluates, so this result F pDP(C i, S j, k) be designated as 0, that is to say while being only verified client node C ito server node S jdirect trust value just add up, checking not by or refusal provide the result, direct trust value does not add up.
In this programme, we utilize beta to distribute to measure C ito S jdirect trust value, it is the posterior probability of binary file that beta distributes, what its expectation was described is the probability that after observing, result system event occurs, so the desired value that we distribute with beta is as internodal direct trust value.We use represent the parameter alpha in beta distribution ij, use n ijijrepresent the parameter beta in beta distribution ij, the expectation of the beta probability distribution of carrying out with such parameter is expressed as client node C ito server node S jdirect trust value.
f ( X | &alpha; , &beta; ) = X &alpha; ij - 1 ( 1 - X ) &beta; ij - 1 B ( &alpha; ij , &beta; ij ) , where a ij = &Sigma; k = 1 n ij F PDP ( C i , S j , k ) &CenterDot; VEF ( C i , S j , k ) , &beta; if = n ij - &alpha; ij
B (α wherein ij, β ij) be beta function, its expression formula is so client node C ito server node S jdirect trust value be:
T D ( C i , S j ) = E ( X ) = &alpha; ij &alpha; ij + &beta; ij = 1 n ij &Sigma; k = 1 n ij F PDP ( C i , S j , k ) &CenterDot; VEF ( C i , S j , k )
Step 2: calculate C ito S jrecommendation trust T r(C i, S j)
Computing client end node C ito server node S jrecommendation trust should by with server node S jmutual other client nodes C crossing r∈ ID (S j, C i) to server node S jtrusting degree comprehensive, so we are with C rto S jdirect trust value as C rto S jtrusting degree, weight should be C so ito C rtrusting degree, and do not communicate by letter mutually between client node, therefore its trusting degree can be by analyzing client node C rand C ithe similarity of the evaluation of the server node of their common mutual mistake being carried out to the result of PDP checking compares, if they are very similar to the result that these server nodes carry out PDP checking, trust value between them is just high so, on the contrary with regard to low (Things of a kind come together).If be made with like this benefit, be exactly that a node belongs to malicious node set, and a node belongs to good will node set, so they to provide the similarity of result just very low, trust value between them is just very low, has so just avoided to a certain extent the dishonest recommendation between these two nodes.Computing formula is as follows:
T R = ( C i , S j ) = &Sigma; C r &Element; ID ( S j , C i ) T D ( C r , S j ) &CenterDot; RMS ( C r , C i ) &Sigma; C q &Element; ID ( S j , C i ) RMS ( C q , C i )
RMS ( C r , C i ) = 1 - &Sigma; y &Element; SS ( C r , C i ) ( &Sigma; k = 1 N ( C r , y ) F PDP ( C r , y , k ) N ( C r , y ) - &Sigma; k = 1 N ( C i , y ) F PDP ( C i , y , k ) N ( C i , y ) ) 2 | SS ( C r , C i ) |
Step 3: calculate C ito S jrecommendation trust T r(C i, S j)
On the basis of step 1 and step 2, direct trust value and recommendation trust are carried out to polymerization, its weight is respectively α and β.At different net environments, the requirement of subjective evaluation be there are differences, α and β also just can suitably adjust according to corresponding environmental condition and requirement.Computing formula is as follows:
T(C i,S j)=α·T D(C i,S j)+β·T R(C i,S j)
Step 4: calculation server node S jsystem trust value T (S j)
Final calculation server node S jtrust value T (S j): should be by all client node C i(i=1to m) is to S jtrust value T (C i, S j) carry out polymerization, by its weight definition, be C itrust value T (C i), then divided by be normalized, computing formula is as follows:
T ( S j ) = &Sigma; i = 1 m T ( C i , S j ) &CenterDot; T ( C i ) &Sigma; j = 1 m T ( C j )
2. user node credit rating stage based on user behavior
Step 5: calculate user node C isystem trust value T (C i)
In the stage 1, we can calculate the trust value of all server nodes.According to specific network condition, a decision threshold T is set thand judge: if T is (S j)>=T th, think S jhonest server node, if T is (S j) < T th, think S jit is dishonest server node.Then determine and C iset I (the C of the mutual server node of crossing i), then judge C iwith I (C i) in the history of each element interactions, in reciprocal process, to only have PDP interaction results with honest server node be 1 and can be accumulated in trust value with the behavior that the PDP interaction results of dishonest server node is 0, and other behaviors are all considered as dishonest conduct and can not be accumulated in trust value.Then we have defined server node S jdegree of closeness P with utmost good faith/non-honest node j, then will trust aggregate-value P jcarry out product weighting, just can calculate user node C isystem trust value T (C i).Computing formula is as follows:
T ( C i ) = 1 | I ( C i ) | &Sigma; q = 1 I ( C i ) a i &alpha; C i q &CenterDot; P &sigma; C i q
Step 6: belief updating
By above calculating, we can find out, the trust value of server node depends on the prestige situation of history mutual information and user node, and meanwhile, the trust value of user node depends on the prestige situation of history mutual information and server node.So we will use the user node C also not calculating in step 4 isystem trust value T (C i), still be provided with T (C i) initial value T defaultso, carrying out in the computational process of step 4 for the first time T (C i)=T default, then by step 4,5, calculate all server nodes and the credit value of user node.But because calculating once can not reach the effect that a stable state is trusted, so in this stage, we need to calculate by the mode of iterative computation the server node of stable state and the trust value of user node, constantly the system trust value of server node and user node is carried out to iterative computation, make its value reach convergence.Server node belief updating algorithm and user node belief updating algorithm are as follows:
Algorithm 1 is for the trust value of iteration update server node, and in order conveniently to carry out calculation specifications, we are by the trust value T (S of server node 1), T (S 2) ..., T (S n) remember into vector T s={ T (S 1), T (S 2) ..., T (S n) t.Algorithm concrete steps are:
1. give the trust value initialize T of user node default;
2. according to given initial value T default, by step 4 and step 5, calculate next round
3. constantly carry out iterative computation, until trust value reaches convergence,
Algorithm 2 upgrades the trust value of user node for iteration, in order conveniently to carry out calculation specifications, we are by the trust value T (C of client node 1), T (C 2) ..., T (C m) remember into vector T c={ T (C 1), T (C 2) ..., T (C m) t.Algorithm concrete steps are:
1. give the trust value initialize T of user node default;
2. according to given initial value T default, by step 4 and step 5, calculate next round
3. constantly carry out iterative computation, until trust value reaches convergence,

Claims (6)

1. a cloud stores service credit assessment method, is characterized in that: the method concrete steps are as follows:
Stage one: server node credit rating: comprise step 1~step 4, respectively computing client end node C ito server node S jdirect trust value T d(C i, S j) and recommendation trust T r(C i, S j); By direct trust value and recommendation trust, calculate C ito S jfinal trust value T (C i, S j); The all client node of polymerization is to S again jtrust value obtain server node S jsystem trust value T (S j);
Step 1: calculate C ito S jdirect trust value T d(C i, S j): the result of carrying out each time data integrity checking of take is input, provide { 0,1} evaluates, and 1 represents to be verified, and data are complete, and 0 represents that checking do not pass through, and data are imperfect, and the desired value characteristic of utilizing beta to distribute completes C ito S jdirect trust value tolerance;
Step 2: calculate C ito S jrecommendation trust T r(C i, S j): by with server node S jmutual other client nodes C crossing r∈ ID (S j, C i) to server node S jthe comprehensive measurement of trusting degree calculate C ito S jrecommendation trust: with C rto S jdirect trust value T d(C r, s j) as C rto S jtrusting degree, trust weight is defined as to C rand C ithe similarity of the server node of their common mutual mistake being carried out to the result of data integrity checking, the data integrity evaluation result providing is more similar, and the trusting degree between them is just higher, with root mean square RMS (C r, C i) identify;
Step 3: calculate C ito S jfinal trust value T (C i, S j): the direct trust value that step 1 and 2 is obtained and recommendation trust carry out polymerization and calculate C ito S jfinal trust value;
Step 4: calculation server node S jsystem trust value T (S j): by all client node C i(i=1to m) is to S jtrust value T (C i, S j) carry out polymerization, its weight definition is C itrust value T (C i), finally obtain all S jthe system trust value of (j=1to n);
Stage two: user node credit rating: the credit value of the server node calculating according to the first stage, arranges a decision threshold T thjudge S jwhether be honest server node; Then according to the behavior of user node, its prestige is added up, accumulative total rule is: carrying out integrity verification result with honest server node is 1 and to carry out integrity verification result with dishonest server node be 0 to be all considered as dishonest behavior, interbehavior trust value accumulative total; Other are all considered as dishonest conduct, and interbehavior trust value does not add up, and the trust value of server node and user node are carried out to iteration renewal simultaneously, make it reach stable state;
Step 5: calculate user node C isystem trust value T (C i): first determine and C iset I (the C of the mutual server node of crossing i), then judge C iwith I (C i) in the history of each element interactions, according to mutual trust accumulative total rule, trust value add up, then will trust aggregate-value and server node and utmost good faith/non-honest degree of closeness P jcarry out product weighting, just calculate user node C isystem trust value T (C i);
Step 6: belief updating: in step 4, use the user node C also not calculating isystem trust value T (C i), therefore be provided with T (C i) initial value Tdefault: in this step, need to calculate the server node of stable state and the trust value of user node according to above calculation procedure the mode by iterative computation, constantly the system trust value of server node and user node is carried out to iterative computation, make its value reach convergence.
2. a kind of cloud stores service credit assessment method according to claim 1, is characterized in that: at " the calculating C described in step 1 ito S jdirect trust value T d(C i, S j) ", its computational process is as follows: T D ( C i , S j ) = 1 n ij &Sigma; k = 1 n ij F PDP ( C i , S j , k ) &CenterDot; VEF ( C i , S j , k ) , N wherein ijfor client node C iwith server node S jcarry out the total degree of integrity verification; F pDP(C i, S j, k) be client node C iwith server node S jcarry out the result of the k time integrity verification; VEF (C i, S j, k) be client node C iwith server node S jenvirment factor while carrying out the k time integrity verification.
3. a kind of cloud stores service credit assessment method according to claim 1, is characterized in that: at " the calculating C described in step 2 ito S jrecommendation trust T r(C i, S j) ", its computational process is as follows: T R ( C i , S j ) = &Sigma; C r &Element; ID ( S j , C i ) T D ( C r , S j ) &CenterDot; RMS ( C r , C i ) &Sigma; C q &Element; ID ( S j , C i ) RMS ( C a , C i ) , ID (S wherein j, C i) be I (S j) remove C in set ithe set of node; RMS (C r, C i) be root mean square, be used for being expressed as C ito C rtrusting degree, its computational methods are as follows:
RMS ( C r , C i ) = 1 - &Sigma; y &Element; SS ( C r , C i ) ( &Sigma; k = 1 N ( C r , y ) F PDF ( C r , y , k ) N ( C r , y ) - &Sigma; k = 1 N ( C i , y ) F PDP ( C i , y , k ) N ( C i , y ) ) 2 | SS ( C r , C i ) | , SS (C wherein r, C i) be and client node C rand C iall carried out the server node set of integrity verification.
4. a kind of cloud stores service credit assessment method according to claim 1, is characterized in that: at " the calculating C described in step 3 ito S jfinal trust value T (C i, S j) ", its computational process is as follows: T (C i, S j)=α T d(C i, S j)+β T r(C i, S j), wherein α and β are respectively the weight of direct trust value and recommendation trust.
5. a kind of cloud stores service credit assessment method according to claim 1, is characterized in that: at " the calculation server node S described in step 4 jsystem trust value T (S j) ", its computational process is as follows:
6. a kind of cloud stores service credit assessment method according to claim 1, is characterized in that: at " the calculating user node C described in step 5 isystem trust value T (C i) ", its computational process is as follows: i (C wherein i) be and C ithe set of the mutual server node of crossing; ? be a set, in set, the number of element is | I (C i) |, representative is and C respectively ithe numbering of mutual server node; a ijfor client node C iwith server node S jcan be to T (C in interaction results i) accumulative total trust value; P jfor server node and utmost good faith/non-honest degree of closeness.
CN201410283074.0A 2014-06-23 2014-06-23 A kind of cloud storage service credit assessment method Active CN104092564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410283074.0A CN104092564B (en) 2014-06-23 2014-06-23 A kind of cloud storage service credit assessment method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410283074.0A CN104092564B (en) 2014-06-23 2014-06-23 A kind of cloud storage service credit assessment method

Publications (2)

Publication Number Publication Date
CN104092564A true CN104092564A (en) 2014-10-08
CN104092564B CN104092564B (en) 2017-06-20

Family

ID=51640246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410283074.0A Active CN104092564B (en) 2014-06-23 2014-06-23 A kind of cloud storage service credit assessment method

Country Status (1)

Country Link
CN (1) CN104092564B (en)

Cited By (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018024A (en) * 2017-05-10 2017-08-04 广东工业大学 A kind of cloud service recommendation method and device
CN107070954A (en) * 2017-06-12 2017-08-18 安徽师范大学 Based on anonymous trust evaluation method

Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009094672A2 (en) * 2008-01-25 2009-07-30 Trustees Of Columbia University In The City Of New York Belief propagation for generalized matching
CN101765231A (en) * 2009-12-30 2010-06-30 北京航空航天大学 Wireless sensor network trust evaluating method based on fuzzy logic

Patent Citations (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009094672A2 (en) * 2008-01-25 2009-07-30 Trustees Of Columbia University In The City Of New York Belief propagation for generalized matching
CN101765231A (en) * 2009-12-30 2010-06-30 北京航空航天大学 Wireless sensor network trust evaluating method based on fuzzy logic

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
冯贵兰; 谭良: "基于信任值的云存储数据确定性删除方案", 《计算机科学》 *
吴吉义; 陈德人: "对等云存储系统信誉机制研究", 《南京大学学报(自然科学版) 》 *

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018024A (en) * 2017-05-10 2017-08-04 广东工业大学 A kind of cloud service recommendation method and device
CN107018024B (en) * 2017-05-10 2020-10-23 广东工业大学 Cloud service recommendation method and device
CN107070954A (en) * 2017-06-12 2017-08-18 安徽师范大学 Based on anonymous trust evaluation method

Also Published As

Publication number Publication date
CN104092564B (en) 2017-06-20

Similar Documents

Publication Publication Date Title
Kenett et al. Dependency network and node influence: Application to the study of financial markets
CN110009174A (en) Risk identification model training method, device and server
CN102317962B (en) Machine optimization device, method and system
de Blas et al. Combined social networks and data envelopment analysis for ranking
TW202011285A (en) Sample attribute evaluation model training method and apparatus, and server
CN112163963A (en) Service recommendation method and device, computer equipment and storage medium
Rocco et al. Community detection and resilience in multi-source, multi-terminal networks
Krasnokutskaya Identification and estimation in highway procurement auctions under unobserved auction heterogeneity
CN110413722B (en) Address selection method, device and non-transient storage medium
CN114611928A (en) Enterprise information security management level evaluation method and system based on big data analysis
Xu et al. Copula-based high dimensional cross-market dependence modeling
CN113850669A (en) User grouping method and device, computer equipment and computer readable storage medium
CN104092564A (en) Cloud storage service credit evaluation method
Allouah et al. Robust sparse voting
Nguyen et al. Risk prioritization using analytic process network for metro rail implementation projects in developing countries: a typical case study of Vietnam
Aboshady et al. A fuzzy risk management framework for the Egyptian real estate development projects
CN110619564B (en) Anti-fraud feature generation method and device
CN115545088B (en) Model construction method, classification method, device and electronic equipment
CN116611812A (en) Artificial intelligence-based vehicle accessory damage assessment method, device, equipment and medium
CN102902875A (en) Network-based method for evaluating reliability degree of failure-relevant system
Dahimavi et al. Measuring the resilience of exploitation systems from agricultural water based on good governance principles (case study: irrigation networks in Khuzestan Province)
CN113849580A (en) Subject rating prediction method and device, electronic equipment and storage medium
CN111882415A (en) Training method and related device of quality detection model
Aboushady et al. Fuzzy consensus qualitative risk analysis framework for building construction projects
CN111754103A (en) Enterprise risk image method, device, computer equipment and readable storage medium

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant