CN104092564B - A kind of cloud storage service credit assessment method - Google Patents

A kind of cloud storage service credit assessment method Download PDF

Info

Publication number
CN104092564B
CN104092564B CN201410283074.0A CN201410283074A CN104092564B CN 104092564 B CN104092564 B CN 104092564B CN 201410283074 A CN201410283074 A CN 201410283074A CN 104092564 B CN104092564 B CN 104092564B
Authority
CN
China
Prior art keywords
node
trust value
trust
server node
value
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Active
Application number
CN201410283074.0A
Other languages
Chinese (zh)
Other versions
CN104092564A (en
Inventor
毛剑
李腾
王瑞珑
陈杰
王培人
伍前红
刘建伟
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Beihang University
Original Assignee
Beihang University
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Beihang University filed Critical Beihang University
Priority to CN201410283074.0A priority Critical patent/CN104092564B/en
Publication of CN104092564A publication Critical patent/CN104092564A/en
Application granted granted Critical
Publication of CN104092564B publication Critical patent/CN104092564B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Landscapes

  • Financial Or Insurance-Related Operations Such As Payment And Settlement (AREA)
  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

A kind of cloud storage service credit assessment method, it includes two stages, six steps;Stage one:Server node credit rating, including step one:Calculate CiTo SjDirect trust value TD(Ci, Sj);Step 2:Calculate CiTo SjRecommendation trust TR(Ci, Sj);Step 3:Calculate CiTo SjFinal trust value T (Ci, Sj);Step 4:Calculation server node SjSystem trust value T (Sj).Stage two:User node credit rating, including step 5:Calculate user node CiSystem trust value T (Ci);Step 6:Belief updating.The present invention is by the use of technology evidence as the source of trust evaluation, behavior based on user to user node carries out credit rating, the result of data integrity validation is measured as the trust feature of CSP storage services to CSP storage services, so as to ensure the objective fairness and verifiability of trust metrics.

Description

A kind of cloud storage service credit assessment method
Technical field
The present invention relates to a kind of cloud storage service credit assessment method, detected by data integrity under cloud storage environment Credit rating is carried out to server node and user node, belongs to field of cloud calculation.
Background technology
Cloud storage is a kind of online memory module, i.e., user's (client) passes through certain association with server (high in the clouds) View, by the outsourcing data storage of oneself in high in the clouds, this emerging storage mode, flexibility, low cost with cloud computing, Scalability.User can whenever and wherever possible access high in the clouds, obtain the data of oneself;User is empty according to oneself actually used storage Between pay, reduce data maintenance and purchase storage device cost, and can according to storage the need for be extended.With Continuing to develop for cloud storage, increasing cloud service provider (Cloud Service Provider, CSP) is occurred in that, Substantial amounts of different types of cloud storage service is provided.Because data are stored in high in the clouds by user, physically lose to data Control, the data for being stored in high in the clouds may be tampered, and delete etc..Therefore, the prestige of cloud service provider is provided with them Cloud storage quality turn into user be concerned about emphasis, so need according to CSP provide cloud storage service public affairs are carried out to them Positive credit rating.
The method of the existing credit appraisal for cloud storage service is divided into two kinds substantially:A kind of is by the appearance of cloud storage The features such as amount, speed, price are analyzed contrast, propose that corresponding evaluation method is scored to CSP;Another kind is that user makes Given a mark or voted with after the cloud service of CSP offers, then these subjective assessments are carried out into polymerization analysis.These evaluation methods There are some defects to a certain extent:1) evaluation of the user to CSP is subjective assessment, carries out polymerization point to subjective assessment merely Analysis will certainly be present evaluates prejudice;2) only taken into account evaluation of the user to CSP, and mostly have ignored user be likely to it is not sincere The situation for being is carried out, for example malice is evaluated, falseness ballot, lazy node etc.;3) it is not involved with the core of CSP storage services measurement The heart:It is stored in the integrality of high in the clouds data.So proposing that a kind of cloud storage service credit assessment method of objective and fair seems particularly It is important.
In order to realize the fair appraisal to cloud storage service, the present invention is by the use of objective technology evidence as trust evaluation Source, while the behavior based on user to user node carries out credit rating.We measure using to cloud storage service Core feature:The result of data integrity validation is as the trust feature of CSP storage services to CSP storage service degree of being subject to Amount, so as to ensure the objectivity of trust metrics.Simultaneously by analyzing participative behavior pair of the user in trust evaluation interaction The prestige of user node is evaluated, to prevent malice from evaluating and detect lazy node etc., it is ensured that the fairness of credit rating, visitor The property seen and verifiability.
The content of the invention
(1) goal of the invention
The purpose of the present invention is to propose to a kind of cloud storage service credit assessment method, according to the core of CSP storage services measurement Heart feature, the credit appraisal that the result of data integrity validation can verify that as the source of trust evaluation to CSP;Meanwhile, Behavior based on user carries out credit rating to user node, can be effective against false evaluation, lazy node, it is ensured that prestige is commented The fairness of valency, objectivity and verifiability.
(2) technical scheme
In order to achieve the above object, the present invention has used result the coming as trust value computing of data integrity validation Source, its technical scheme is as follows.
Cloud storage trust model of the present invention includes two network entities:1) store data in high in the clouds individual or Enterprise institution, i.e. user;2) there is the cloud service provider of special resource and computing capability.
It can be in two stages according to the stage of execution for the present invention:Stage one:Server node credit rating, is CSP storages Service credit evaluation phase;Stage two:User node credit rating, is the user node credit rating rank based on user behavior Section.
A kind of cloud storage service credit assessment method of the present invention, the technical scheme of the method is as follows:
Stage one:Server node credit rating:Including step 1~step 4, client node C is calculated respectivelyiTo service Device node SjDirect trust value (only by CiItself and SjThe trust value that interactive computing is obtained) TD(Ci, Sj) and recommendation trust (by other nodes and SjThe trust value that interactive computing is obtained) TR(Ci, Sj);Calculated by direct trust value and recommendation trust To CiTo SjFinal trust value T (Ci, Sj);All of client node be polymerized again to SjTrust be worth to server node Sj System trust value T (Sj)。
Step 1:Calculate CiTo SjDirect trust value TD(Ci, Sj):To carry out the result of data integrity validation each time ({ 0,1 } for being given is evaluated, and 1 expression is verified, i.e., data are complete, and 0 represents that checking does not pass through, i.e., data are imperfect) is Input, the desired value characteristic being distributed using beta completes CiTo SjDirect trust value measurement.
Step 2:Calculate CiTo SjRecommendation trust TR(Ci, Sj):By with server node SjOther clients for interacting End node Cr∈ID(Sj, Ci) to server node SjThe comprehensive measurement of trusting degree calculate CiTo SjRecommendation trust: We are with CrTo SjDirect trust value TD(Cr, Sj) as CrTo SjTrusting degree, trust weight is defined as CrAnd CiTo him The server node that interacted jointly carried out data integrity validation result similarity, the data that they are given are complete Property evaluation result is more similar, and the trusting degree between them is higher, with root mean square RMS (Cr, Ci) be identified.
Step 3:Calculate CiTo SjFinal trust value T (Ci, Sj):The direct trust value that step 1 and 2 are obtained and recommendation Trust value carries out polymerization and is calculated CiTo SiFinal trust value.
Step 4:Calculation server node SjSystem trust value T (Sj):By all of client node Ci(i=1to m) To SjTrust value T (Ci, Sj) be polymerized, its weight definition is CiTrust value T (Ci), finally give all Sj(j=1to N) system trust value.
Stage two:User node credit rating:The credit value of the server node calculated according to the first stage, is set One decision threshold TthTo judge SjWhether it is honest server node.Then the behavior according to user node is entered to its prestige Row is accumulative, and accumulative rule is:With honest server node carry out integrity verification result for 1 and with dishonest server section Point carries out integrity verification result for 0 is accordingly to be regarded as dishonest behavior, and interbehavior trust value adds up;Other are accordingly to be regarded as dishonest row For interbehavior trust value does not add up.The trust value to server node and user node is iterated renewal simultaneously, reaches it To stable state.
Step 5:Calculate user node CiSystem trust value T (Ci):Determine first and CiThe server node for interacting Set I (Ci), then judge CiWith I (Ci) in each element interactions history, accumulative rule is trusted to trust value according to interaction Added up, then the degree of closeness P of aggregate-value and server node and utmost good faith/non-honest will be trustedjCarry out product weightings, User node C can just be calculatediSystem trust value T (Ci)。
Step 6:Belief updating:In step 4, we will use the user node C not calculated alsoiSystem letter Appoint value T (Ci), still be provided with T (Ci) initial value Tdefault.In this step, it would be desirable to the calculation procedure according to more than And be calculated the server node of stable state and the trust value of user node by way of iterative calculation, i.e., constantly to service The system trust value of device node and user node is iterated calculating, its value is reached convergence.
Wherein, " calculating C described in step 1iTo SjDirect trust value TD(Ci, Sj) ", its calculating process is as follows:Wherein nijIt is client node CiWith server node Sj Carry out the total degree of integrity verification;FPDP(Ci, Sj, k) it is client node CiWith server node SjCarry out kth time integrality The result of checking;VEF(Ci, Sj, k) it is client node CiWith server node SjCarry out environment during kth time integrity verification The factor.
Wherein, " calculating C described in step 2iTo SjRecommendation trust TR(Ci, Sj) ", its calculating process is as follows:Wherein ID (Sj, Ci) it is I (Sj) remove in set CiThe set of node;RMS(Cr, Ci) it is root mean square, for being expressed as CiTo CrTrusting degree, its computational methods is as follows:Wherein SS (Cr, Ci) be and visitor Family end node CrAnd CiAll carried out the server node set of integrity verification.
Wherein, " calculating C described in step 3iTo SjFinal trust value T (Ci, Sj) ", its calculating process is as follows:T (Ci, Sj)=α TD(Ci, Sj)+β·TR(Ci, Sj), wherein α and β is respectively the weight of direct trust value and recommendation trust.
Wherein, " calculation server node S described in step 4jSystem trust value T (Sj) ", its calculating process is such as Under:
Wherein, " calculating user node C described in steps of 5iSystem trust value T (Ci) ", its calculating process is as follows:Wherein I (Ci) be and CiThe set of the server node for interacting; I.e.It is a set, the number of element is in set | I (Ci) |, what is represented respectively is and CiThe volume of interactive server node Number;aijIt is client node CiWith server node SjCan be to T (C in interaction resultsi) accumulative trust value;PjIt is server The degree of closeness of node and utmost good faith/non-honest.
(3) advantage and effect
A kind of cloud storage service credit assessment method of the present invention, its advantage and effect are:1) believe with existing Cloud Server Reputation evaluation model is compared, and this model can not only carry out credit rating to Cloud Server node, it is also possible to which user node is carried out Credit rating, can avoid false evaluation, the lazy node of resistance;2) it is different from the reputation model based on subjective assessment, the present invention It is that based on objective technology evidence, i.e. the result of data integrity detection carries out the calculating of trust value so that model has stronger Objectivity and fairness;3) model can finally reach stable state, that is, the trust value of each node for calculating reaches convergence, makes mould Type has correctness and stability;4) communication environment factor variable is provided with, for data integrity validation process each time Significance level difference is weighted to the weight that this communicates, it is possible to prevente effectively from malice is evaluated.
Brief description of the drawings
Fig. 1 is FB(flow block) of the present invention
Fig. 2 is present system Organization Chart
Specific embodiment
The present invention includes two entities, user and cloud server.Described data are held effectively below with reference to accompanying drawing Verification method is described in detail, and Fig. 1 is FB(flow block) of the present invention;Fig. 2 is present system Organization Chart;
Main symbol and algorithmic translation:
(1)FPDP(Ci, Sj, k):Client node CiWith server node SjCarry out kth time PDP (Provable Data Possession, the data property held is proved) the result;
(2)N(Ci, Sj):Client node CiWith server node SjCommunicated the total degree of (PDP checkings), can be abbreviated It is nij
nij1:Client node CiWith server node SjCarry out PDP checkings and provide the number of times that the result is 1
nij2:Client node CiWith server node SjCarry out PDP checkings and provide the number of times that the result is 0
nij3:Client node CiWith server node SjPDP checkings are carried out to provide the result for the number of times of NULL therefore have: nij=nij1+nij2+nij3
(3)VEF(Ci, Sj, k):Verification Environment Factor, client node CiWith server section Point SjCarry out envirment factor when kth time PDP is verified.Effect:Can be attacked with preventing malice, such as it is very sincere in small transaction, The prestige of oneself is lifted, and it is non-honest so as to make a profit in big transaction;
(4)I(Sj):With server node SjCarried out the set of the client node of PDP checkings;
(5)ID(Sj, Ci):I(Sj) C is removed in setiThe set of node;
(6)RMS(Cr, Ci):Root-mean-square, root mean square, for comparison node CiAnd CrTo their common interactions The evaluation difference of the server node crossed, that is, be expressed as CiTo CrTrusting degree, if evaluate situation be similar to, i.e., theirs is equal Root value is high, then trusting degree is high, otherwise trusting degree is low;
(7)SS(Cr, Ci):With client node CrAnd CiAll carried out the server node set of PDP checkings;
(8)I(Ci):With CiThe set of the server node for interacting;
(9)DefineIt is a set, the number of element is in set | I (Ci) |, what is represented respectively is and CiThe numbering of interactive server node;
(10):Define aijIt is client node CiWith server node SjInteraction Can be to T (C in resulti) accumulative trust value;
(11):PjFor server node and utmost good faith/non-honest connect Short range degree.
Technical scheme can be divided into two stages of server node credit rating and user node credit rating.It is of the invention a kind of Cloud storage service credit assessment method, the method specific steps (including specific formula for calculation and algorithm) are as follows:
The 1.CSP storage service credit appraisal stages
Step 1:Calculate CiTo SjDirect trust value TD(Ci, Sj)
Calculating direct trust value should be by client node CiWith server node SjInteractive history obtain, due to client Node CiWith server node SjMay be interactive multiple, so the result that will each time carry out PDP checkings (is commented { 0,1 } for being given Valency) FPDP(Ci, Sj, k) it is multiplied by verification environment factor Ⅴ EF (C each timei, Sj, k), then it is polymerized and normalized.Such as Fruit refusal provides PDP the results, i.e., { 0,1 } is evaluated, then this result FPDP(Ci, Sj, k) it is designated as 0, that is to say, that When being only verified, client node CiTo server node SjDirect trust value just add up, checking not pass through or refuse The result is provided, then direct trust value does not add up.
In this programme, we measure C using beta distributioniTo SjDirect trust value, beta distribution be binary system text The posterior probability of part, its expectation describes the probability of result system event appearance after observation, so we are distributed with beta Desired value as the direct trust value between node.We useRepresent beta point Parameter alpha in clothij, use nijijTo represent the parameter beta in beta distributionij, the beta probability distribution carried out with such parameter Expectation be to be expressed as client node CiTo server node SjDirect trust value.
Wherein B (αij, βij) it is beta function, its expression formula isSo client node CiTo server node SjDirect trust value be:
Step 2:Calculate CiTo SjRecommendation trust TR(Ci, Sj)
Calculate client node CiTo server node SjRecommendation trust should by with server node SjInteracted its He is client node Cr∈ID(Sj, Ci) to server node SjTrusting degree synthesis, so we are with CrTo SjIt is direct Trust value is used as CrTo SjTrusting degree, then weight should be CiTo CrTrusting degree, and between client node mutually not Communication, therefore its trusting degree can be by analyzing client node CrAnd CiTo commenting for their common server nodes for interacting The similarity that valency carried out the result of PDP checkings is compared, if they carry out PDP checkings with these server nodes Result is much like, then the trust value between them is just high, on the contrary just low (Things of a kind come together).Do so has one If benefit is exactly a node belongs to malicious node set, and a node belongs to good will node set, then they are given The similarity of result is just very low, and the trust value between them is just very low, and the two nodes are thus avoided to a certain extent Between dishonest recommendation.Computing formula is as follows:
Step 3:Calculate CiTo SjRecommendation trust TR(Ci, Sj)
Direct trust value is polymerized with recommendation trust on the basis of step 1 and step 2, its weight is respectively α And β.Under different network environments, the requirement to subjective evaluation has differences, and α and β also just can be according to corresponding environment Condition and requirement are suitably adjusted.Computing formula is as follows:
T(Ci, Sj)=α TD(Ci, Sj)+β·TR(Ci, Sj)
Step 4:Calculation server node SjSystem trust value T (Sj)
Final calculation server node SjTrust value T (Sj):Should be by all of client node Ci(i=1to m) is to Sj Trust value T (Ci, Sj) be polymerized, it is C by its weight definitioniTrust value T (Ci), then divided byCarry out normalizing Change is processed, and computing formula is as follows:
2. the user node credit rating stage of user behavior is based on
Step 5:Calculate user node CiSystem trust value T (Ci)
In the stage 1, we can calculate the trust value of all of server node.According to specific network condition, One decision threshold T is setthAnd judged:If T (Sj)≥Tth, then it is assumed that SjIt is honest server node, if T (Sj) < Tth, then it is assumed that SjIt is dishonest server node.It is then determined that and CiThe set I of the server node for interacting (Ci), then judge CiWith I (Ci) in each element interactions history, in interaction only with honest server node PDP interaction results be 1 and can be accumulated to letter with the behavior that the PDP interaction results of dishonest server node are 0 Appoint in value, other behaviors are accordingly to be regarded as dishonest conduct and can not be accumulated in trust value.Then we define server node SjWith the degree of closeness P of utmost good faith/non-honest nodej, then aggregate-value P will be trustedjCarry out product weightings, it is possible to calculate Go out user node CiSystem trust value T (Ci).Computing formula is as follows:
Step 6:Belief updating
Calculating more than, it will be seen that the trust value of server node depends on history mutual information and use The prestige situation of family node, meanwhile, the trust value of user node depends on the prestige feelings of history mutual information and server node Condition.So we will use the user node C not calculated also in step 4iSystem trust value T (Ci), still set T (Ci) initial value Tdefault, so in the calculating process that first time carries out step 4, T (Ci)=Tdefault, then by step Rapid 4,5 credit values for being calculated all of server node and user node.But because calculating once can not reach The effect that one stable state is trusted, so in this stage, it would be desirable to the clothes of stable state are calculated by way of iterative calculation The trust value of business device node and user node, the i.e. system trust value constantly to server node and user node is iterated meter Calculate, its value is reached convergence.Server node belief updating algorithm and user node belief updating algorithm are as follows:
Algorithm 1 is used for the trust value that iteration updates server node, and calculation specifications are carried out for convenience, and we are by server Trust value T (the S of node1), T (S2) ..., T (Sn) remember into vector TS={ T (S1), T (S2) ..., T (Sn)}T.Algorithm is specifically walked Suddenly it is:
1. the trust value to user node assigns initial value Tdefault
2. according to given initial value Tdefault, next round is calculated by step 4 and step 5
3. calculating constantly is iterated, until trust value reaches convergence, i.e.,
Algorithm 2 is used for the trust value that iteration updates user node, and calculation specifications are carried out for convenience, and we are by client's end segment Trust value T (the C of point1), T (C2) ..., T (Cm) remember into vector TC={ T (C1), T (C2) ..., T (Cm)}T.Algorithm specific steps For:
1. the trust value to user node assigns initial value Tdefault
2. according to given initial value Tdefault, next round is calculated by step 4 and step 5
3. calculating constantly is iterated, until trust value reaches convergence, i.e.,

Claims (6)

1. a kind of cloud storage service credit assessment method, it is characterised in that:The method is comprised the following steps that:
Stage one:Server node credit rating:Including step 1~step 4, client node C is calculated respectivelyiTo server section Point SjDirect trust value TD(Ci,Sj) and recommendation trust TR(Ci,Sj);It is calculated by direct trust value and recommendation trust CiTo SjFinal trust value T (Ci,Sj);All of client node be polymerized again to SjTrust be worth to server node Sj's System trust value T (Sj);
Step 1:Calculate CiTo SjDirect trust value TD(Ci,Sj):To carry out the result of data integrity validation each time as defeated Enter, that is, { 0,1 } for being given is evaluated, 1 expression is verified, i.e., data are complete, and 0 represents that checking does not pass through, i.e., data are not complete Whole, the desired value characteristic being distributed using beta completes CiTo SjDirect trust value measurement;
Step 2:Calculate CiTo SjRecommendation trust TR(Ci,Sj):By with server node SjOther client's end segments for interacting Point Cr∈ID(Sj,Ci) to server node SjThe comprehensive measurement of trusting degree calculate CiTo SjRecommendation trust:With Cr To SjDirect trust value TD(Cr,Sj) as CrTo SjTrusting degree, trust weight is defined as CrAnd CiTo their common friendships The server node mutually crossed carried out the similarity of the result of data integrity validation, and the data integrity evaluation result for being given is got over Similar, the trusting degree between them is higher, with root mean square RMS (Cr,Ci) be identified;
Step 3:Calculate CiTo SjFinal trust value T (Ci,Sj):The direct trust value and recommendation trust that step 1 and 2 are obtained Carry out polymerization and be calculated CiTo SjFinal trust value;
Step 4:Calculation server node SjSystem trust value T (Sj):By all of client node CiTo SjTrust value T (Ci,Sj) be polymerized, its weight definition is CiTrust value T (Ci), finally give all SjSystem trust value;
Wherein, i=1,2 ..., m;J=1,2 ..., n;
Stage two:User node credit rating:The credit value of the server node calculated according to the first stage, sets one Decision threshold TthTo judge SjWhether it is honest server node;Then the behavior according to user node is tired out to its prestige Count, accumulative rule is:Integrity verification result is carried out with honest server node to enter for 1 and with dishonest server node Row integrity verification result is accordingly to be regarded as dishonest behavior for 0, and interbehavior trust value adds up;Other are accordingly to be regarded as dishonest conduct, hand over Mutual Behavior trustworthiness value does not add up, while being iterated renewal to the trust value of server node and user node, reaches steady State;
Step 5:Calculate user node CiSystem trust value T (Ci):Determine first and CiThe set of the server node for interacting I(Ci), then judge CiWith I (Ci) in each element interactions history, trust accumulative rule according to interaction is carried out to trust value It is accumulative, then the degree of closeness P that aggregate-value and server node and utmost good faith/non-honest will be trustedjProduct weightings are carried out, is just counted Calculation draws user node CiSystem trust value T (Ci);
Step 6:Belief updating:In step 4, the user node C not calculated also is usediSystem trust value T (Ci), Therefore it is provided with T (Ci) initial value Tdefault;In this step, it is necessary to the calculation procedure according to more than and the side by iterating to calculate Formula is calculated the server node of stable state and the trust value of user node, i.e., constantly to server node and user node System trust value is iterated calculating, its value is reached convergence.
2. a kind of cloud storage service credit assessment method according to claim 1, it is characterised in that:It is described in step 1 " calculate CiTo SjDirect trust value TD(Ci,Sj) ", its calculating process is as follows: Wherein nijIt is client node CiWith server node SjCarry out the total degree of integrity verification;FPDP(Ci,Sj, k) it is client Node CiWith server node SjCarry out the result of kth time integrity verification;VEF(Ci,Sj, k) it is client node CiAnd service Device node SjCarry out envirment factor during kth time integrity verification.
3. a kind of cloud storage service credit assessment method according to claim 2, it is characterised in that:It is described in step 2 " calculate CiTo SjRecommendation trust TR(Ci,Sj) ", its calculating process is as follows: Wherein ID (Sj,Ci) it is I (Sj) C is removed in setiThe set of node;RMS(Cr,Ci) it is root mean square, For being expressed as CiTo CrTrusting degree, its computational methods is as follows:
Wherein SS (Cr,Ci) be with Client node CrAnd CiAll carried out the server node set of integrity verification.
4. a kind of cloud storage service credit assessment method according to claim 1, it is characterised in that:It is described in step 3 " calculate CiTo SjFinal trust value T (Ci,Sj) ", its calculating process is as follows:T(Ci,Sj)=α TD(Ci,Sj)+β·TR (Ci,Sj), wherein α and β is respectively the weight of direct trust value and recommendation trust.
5. a kind of cloud storage service credit assessment method according to claim 1, it is characterised in that:It is described in step 4 " calculation server node SjSystem trust value T (Sj) ", its calculating process is as follows:
6. a kind of cloud storage service credit assessment method according to claim 1, it is characterised in that:It is described in steps of 5 " calculate user node CiSystem trust value T (Ci) ", its calculating process is as follows: Wherein I (Ci) be and CiThe set of the server node for interacting;I.e.It is a set, The number of element is in set | I (Ci) |, what is represented respectively is and CiThe numbering of interactive server node;aijIt is client's end segment Point CiWith server node SjCan be to T (C in interaction resultsi) accumulative trust value;PjFor server node and utmost good faith/ Non-honest degree of closeness.
CN201410283074.0A 2014-06-23 2014-06-23 A kind of cloud storage service credit assessment method Active CN104092564B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201410283074.0A CN104092564B (en) 2014-06-23 2014-06-23 A kind of cloud storage service credit assessment method

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201410283074.0A CN104092564B (en) 2014-06-23 2014-06-23 A kind of cloud storage service credit assessment method

Publications (2)

Publication Number Publication Date
CN104092564A CN104092564A (en) 2014-10-08
CN104092564B true CN104092564B (en) 2017-06-20

Family

ID=51640246

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201410283074.0A Active CN104092564B (en) 2014-06-23 2014-06-23 A kind of cloud storage service credit assessment method

Country Status (1)

Country Link
CN (1) CN104092564B (en)

Families Citing this family (2)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN107018024B (en) * 2017-05-10 2020-10-23 广东工业大学 Cloud service recommendation method and device
CN107070954B (en) * 2017-06-12 2020-06-19 安徽师范大学 Anonymous-based trust evaluation method

Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765231A (en) * 2009-12-30 2010-06-30 北京航空航天大学 Wireless sensor network trust evaluating method based on fuzzy logic

Family Cites Families (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
WO2009094672A2 (en) * 2008-01-25 2009-07-30 Trustees Of Columbia University In The City Of New York Belief propagation for generalized matching

Patent Citations (1)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN101765231A (en) * 2009-12-30 2010-06-30 北京航空航天大学 Wireless sensor network trust evaluating method based on fuzzy logic

Non-Patent Citations (2)

* Cited by examiner, † Cited by third party
Title
冯贵兰;谭良.基于信任值的云存储数据确定性删除方案.《计算机科学》.2014,全文. *
吴吉义;陈德人.对等云存储系统信誉机制研究.《南京大学学报(自然科学版) 》.2011,全文. *

Also Published As

Publication number Publication date
CN104092564A (en) 2014-10-08

Similar Documents

Publication Publication Date Title
CN110009174B (en) Risk recognition model training method and device and server
CN109690608B (en) Extrapolating trends in trust scores
Allahbakhsh et al. An iterative method for calculating robust rating scores
CN109711955B (en) Poor evaluation early warning method and system based on current order and blacklist base establishment method
Zhao et al. A machine learning based trust evaluation framework for online social networks
CN107622432A (en) Trade company's evaluation method and system
CN107895038A (en) A kind of link prediction relation recommends method and device
CN107451833A (en) The processing method and processing unit of order data
CN108053214B (en) False transaction identification method and device
CN104092564B (en) A kind of cloud storage service credit assessment method
CN111476371A (en) Method and device for evaluating specific risk faced by server
CN114611928A (en) Enterprise information security management level evaluation method and system based on big data analysis
KR20190088661A (en) Method and system for user evaluation credibility measurement and integrated score calculation without additional user input
CN110619564B (en) Anti-fraud feature generation method and device
Wu et al. Eliminating the effect of rating bias on reputation systems
CN106713322A (en) Fuzzy measurement method for network equipment information security evaluation
Zhao et al. Network-based feature extraction method for fraud detection via label propagation
de Kerchove et al. Reputation systems and optimization
CN110570301B (en) Risk identification method, device, equipment and medium
Farooq et al. A multi source product reputation model
Duan et al. Building and managing reputation in the environment of chinese e-commerce: A case study on taobao
CN108985895A (en) A kind of method of businessman's credit value in acquisition e-commerce
Tabar et al. Identifying the Suspected Cases of Money Laundering in Banking Using Multiple Attribute Decision Making (MADM)
Wang et al. Evaluation of e-commerce system trustworthiness using multi-criteria analysis
Ahmad et al. Rank Aggregation Approach for Identifying Critical Information Infrastructure

Legal Events

Date Code Title Description
C06 Publication
PB01 Publication
C10 Entry into substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant