CN114282783A - Multi-factor data reliability assessment method in fog calculation - Google Patents

Multi-factor data reliability assessment method in fog calculation Download PDF

Info

Publication number
CN114282783A
CN114282783A CN202111499031.2A CN202111499031A CN114282783A CN 114282783 A CN114282783 A CN 114282783A CN 202111499031 A CN202111499031 A CN 202111499031A CN 114282783 A CN114282783 A CN 114282783A
Authority
CN
China
Prior art keywords
data
user
provider
requester
fog
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Pending
Application number
CN202111499031.2A
Other languages
Chinese (zh)
Inventor
彭贻
崔太平
雷一达
曾元鸿
杨马暘
陈前斌
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Chongqing University of Post and Telecommunications
Original Assignee
Chongqing University of Post and Telecommunications
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Chongqing University of Post and Telecommunications filed Critical Chongqing University of Post and Telecommunications
Priority to CN202111499031.2A priority Critical patent/CN114282783A/en
Publication of CN114282783A publication Critical patent/CN114282783A/en
Pending legal-status Critical Current

Links

Images

Landscapes

  • Management, Administration, Business Operations System, And Electronic Commerce (AREA)

Abstract

The invention relates to a multi-factor data reliability assessment method in fog calculation, and belongs to the technical field of mobile communication. Data sharing enables users to obtain important information nearby in time. However, users do not fully trust each other during data sharing due to their mobility and variability. Devices may propagate error messages due to sensor failure, virus infection, or even selfish. To reduce the impact of these malicious messages on other users, the propagation of spurious messages must be suppressed. The invention designs a method for quantifying the authenticity of data, so that a data requester can obtain more reliable data in the data sharing process. And the fog node carries out pre-judgment on the authenticity of the data through Bayesian model inference to obtain the reliability value of the data. The requester synthesizes the experience-based trust value and the history interaction of the provider on the basis of the fog node pre-judgment result to obtain the satisfaction degree of the data, so that the reliability evaluation of the data is more comprehensive.

Description

Multi-factor data reliability assessment method in fog calculation
Technical Field
The invention belongs to the technical field of mobile communication, and relates to a multi-factor data reliability evaluation method in fog calculation.
Background
At present, "fog computing" is an emerging distributed computing paradigm that extends computing, communication, and caching to the edge of the network, with inherent characteristics of low latency, mobility, and wireless access capability. Fog computing provides a platform for data sharing between mobile devices. The data sharing enables users to obtain important information nearby in time, and great convenience is provided for life of the users. However, due to the mobility and variability of devices, devices do not fully trust each other. When malicious users exist in the network, the malicious users can intentionally spread false data, and the judgment of the data by other users is disturbed. Therefore, how to effectively evaluate the credibility of the data is an important issue in data sharing.
Based on the above problems, the present invention has devised a method to quantify the authenticity of data. Firstly, the fog node carries out pre-judgment on the authenticity of the data through Bayesian inference to obtain the reliability value of the data. Secondly, the requester integrates the experience-based trust value of the provider and historical interaction to obtain the satisfaction degree of the provided data on the basis of the fog node pre-judgment result, so that the reliability evaluation of the data is more comprehensive. Thereby finding the best data for the data requestor.
Disclosure of Invention
In view of the above, the present invention provides a method for evaluating reliability of multi-factor data in fog calculation.
In order to achieve the purpose, the invention provides the following technical scheme:
a multi-factor data reliability assessment method in fog calculation comprises the following steps:
s1: a two-tier data sharing model based on a fog network;
s2: a data pre-judging method based on Bayesian inference;
s3: a trust value updating method based on user historical interaction and experience;
s4: and a data reliability evaluation scheme based on an entropy weight method.
Further, in step S1, a data sharing model is established.
Further, in step S2, the data has uncertainty, and in order to prevent users from sharing false information, the fog node will pre-determine the content uploaded by the data provider, and perform pre-determination on a certain data elThe credibility of (c) is defined as follows:
Figure BDA0003402025540000011
wherein the content of the first and second substances,
Figure BDA0003402025540000012
related event e expressed as uploaded by provider jlThe size of the confidence level of the data of (c),
Figure BDA0003402025540000013
represented as the distance between user j and the location of the event occurrence,
Figure BDA0003402025540000021
denoted as time t at which the content of the event is known for user jjTime difference from event occurrence time t
Figure BDA0003402025540000022
b is the lower limit of the reliability of the data, α and β control the rate of change of the reliability, and α + β is 1. The shorter the distance between the user j and the event occurrence, the earlier the event occurrence time is known, and the more trustworthy the data is.
The fog node collects data sets within its communication range, and data e can be obtained using equation (1) abovelConfidence level set Cl
Figure BDA0003402025540000023
Base on obtaining credibility setOn the basis, the Bayesian model is used for reasoning and calculating the event elAggregate reliability P of (1):
Figure BDA0003402025540000024
wherein P (e/C) represents the aggregate credibility of event e,
Figure BDA0003402025540000025
complementary events denoted e, P (c)j/e)=cj
Figure BDA0003402025540000026
P (e) is expressed as the prior probability of event e. P (e/C) belongs to [0,1 ]]. Once P (e/C) exceeds a preset threshold Thr, the data related to the event is considered to be authentic by the fog node; if P (e/C) does not exceed the set threshold, the data is considered unreliable. The user who uploads the unreliable data will be kicked out of the sharing list and no longer participate in the round of data sharing.
Further, in step S3, the user should consider not only the credibility of the data itself but also the behavior of the data provider in data sharing when requesting the data. If the provider is malicious, the provider has the behaviors of missing transmission, forging data and the like, and provides false data service. Therefore, the data requester should also judge the authenticity of the data by combining the past behavior of the user and the satisfaction degree of the service provided by the provider before on the basis of the result of the data pre-judgment of the fog node.
The experience-based trust value is a trust value which is updated by using the past behaviors of the user, so that the authenticity of data is indirectly judged, and the value is continuously accumulated along with the time. After the data sharing is completed, the data requester can score T for the provider based on the data qualityi,j,Ti,jE (-1, 1). Fog node averaging scoring of requesters
Figure BDA0003402025540000027
L is the number of requestors interacting with data provider j this time. By sjRepresenting user j radicalsFrom the empirical confidence measure, sjE (-1,1) in
Figure BDA0003402025540000028
On the basis of (1) to sjAnd (6) updating.
When a requester makes a share request to a provider, the provider's satisfaction with the previously provided service is measured, which is related to the historical interaction between the two. p is a radical ofijIndicating the level of satisfaction, p, of the current serviceij∈[0,1]. The historical interactive cumulative value is:
Figure BDA0003402025540000029
wherein p isij(ti) Represents a level of satisfaction with the currently provided data;
Figure BDA0003402025540000031
cumulative, constantly updated, indicating satisfaction
Figure BDA0003402025540000032
The instant of requesting a service is denoted tn=tN>…>t2>t1(ii) a N is the number of times data is requested. A higher N means that the requester has more prior knowledge of the provider, so that the provider is judged more accurately, and the acquired data is more complete and accurate.
Further, in step S4, the evaluation weights of the three scoring indexes, i.e., the data reliability, the experience-based confidence value, and the historical interaction score, are evaluated by using the entropy weight method, so as to comprehensively evaluate the reliability of the data provided by the user. In the select data provider phase, requestor RiBased on the three indexes, related providers are evaluated, and an n multiplied by m provider scoring matrix W is establishedn×mWhere n is the number of data providers and m is 3. First to obtain a normalized evaluation matrix
Figure BDA0003402025540000033
And carrying out normalization processing on the matrix elements by adopting a normalization method. Secondly, the weight of each evaluation index m of the provider and the information entropy H of the evaluation index m are calculatedm. And (3) carrying out normalization processing on the information entropy of the rating index m, finally obtaining the current satisfaction score of the requester i to each provider j about the data l, and then initiating a data sharing request to the data provider with the highest score by the data requester to obtain the most reliable data.
The invention has the beneficial effects that: according to the characteristics of the provided network scene, the fog node pre-judges the data abstract information uploaded by the data provider by means of Bayesian inference, and the data requester combines experience-based trust values of the provider and historical interaction to obtain the satisfaction degree of the provided data on the basis of the pre-judgment result.
Additional advantages, objects, and features of the invention will be set forth in part in the description which follows and in part will become apparent to those having ordinary skill in the art upon examination of the following or may be learned from practice of the invention. The objectives and other advantages of the invention may be realized and attained by the means of the instrumentalities and combinations particularly pointed out hereinafter.
Drawings
For the purposes of promoting a better understanding of the objects, aspects and advantages of the invention, reference will now be made to the following detailed description taken in conjunction with the accompanying drawings in which:
FIG. 1 is a data sharing model based on fog calculations.
Detailed Description
The embodiments of the present invention are described below with reference to specific embodiments, and other advantages and effects of the present invention will be easily understood by those skilled in the art from the disclosure of the present specification. The invention is capable of other and different embodiments and of being practiced or of being carried out in various ways, and its several details are capable of modification in various respects, all without departing from the spirit and scope of the present invention. It should be noted that the drawings provided in the following embodiments are only for illustrating the basic idea of the present invention in a schematic way, and the features in the following embodiments and examples may be combined with each other without conflict.
Wherein the showings are for the purpose of illustrating the invention only and not for the purpose of limiting the same, and in which there is shown by way of illustration only and not in the drawings in which there is no intention to limit the invention thereto; to better illustrate the embodiments of the present invention, some parts of the drawings may be omitted, enlarged or reduced, and do not represent the size of an actual product; it will be understood by those skilled in the art that certain well-known structures in the drawings and descriptions thereof may be omitted.
The same or similar reference numerals in the drawings of the embodiments of the present invention correspond to the same or similar components; in the description of the present invention, it should be understood that if there is an orientation or positional relationship indicated by terms such as "upper", "lower", "left", "right", "front", "rear", etc., based on the orientation or positional relationship shown in the drawings, it is only for convenience of description and simplification of description, but it is not an indication or suggestion that the referred device or element must have a specific orientation, be constructed in a specific orientation, and be operated, and therefore, the terms describing the positional relationship in the drawings are only used for illustrative purposes, and are not to be construed as limiting the present invention, and the specific meaning of the terms may be understood by those skilled in the art according to specific situations.
FIG. 1 depicts a data sharing network model consisting of users and fog nodes. The model mainly comprises users and interconnected fog nodes.
The user: advanced communication equipment is equipped, wireless communication capability is provided, local data is collected from the sensing equipment, summary information (data size, time, address and the like) of the data is uploaded to a fog node with the closest communication distance, and the data is shared with a data requester. User impersonation data provider for collecting and sharing data, denoted as
Figure BDA0003402025540000041
The user needing the data acts as a data requester, denoted as
Figure BDA0003402025540000042
Users play different roles according to their different needs.
Fog node: the method has certain storage and calculation capabilities, collects the data summary information set uploaded by the users in the communication range, evaluates the credibility of the data set, and obtains a pre-judgment result for reference of a data requester.
During the data sharing process, users may propagate error messages due to sensor failures, virus infections, and even selfish reasons. To reduce the impact of these malicious messages on other users, the propagation of spurious messages must be suppressed. To this end, the present invention contemplates a method to quantify the authenticity of the data. Firstly, the fog node carries out pre-judgment on the data to obtain the reliability value of the data. Secondly, the requester integrates the experience-based trust value of the provider and historical interaction to obtain the satisfaction degree of the provided data on the basis of the mist node pre-judgment result, so that the authenticity evaluation of the data is more comprehensive.
1) Pre-determination of data
The pre-judgment of the data is equivalent to the credibility evaluation of the data, and the step is carried out on the fog node. First, the fog node groups the data uploaded by all users into E1,E2,…,El,…In which ElIndicating a related event elData sets of (2), such as events: "snow is accumulated on a certain road section". However, the data in the same group does not have the same credibility, and the credibility of the data uploaded by the user j is defined as:
Figure BDA0003402025540000043
wherein the content of the first and second substances,
Figure BDA0003402025540000051
related event e expressed as uploaded by provider jlThe size of the confidence level of the data of (c),
Figure BDA0003402025540000052
represented as the distance between user j and the location of the event occurrence,
Figure BDA0003402025540000053
denoted as time t at which the content of the event is known for user jjTime difference from event occurrence time t
Figure BDA0003402025540000054
b is the lower limit of the reliability of the data, α and β control the rate of change of the reliability, and α + β is 1. The shorter the distance between the user j and the event occurrence, the earlier the event occurrence time is known, and the more trustworthy the data is.
The fog node collects the data set in the communication range of the fog node, and the data e can be obtained by using the formula (4)lConfidence level set Cl
Figure BDA0003402025540000055
On the basis of obtaining a credibility set, an event e is calculated by inference through a Bayesian modellAggregate reliability P of (1):
Figure BDA0003402025540000056
wherein P (e/C) represents the aggregate credibility of event e,
Figure BDA0003402025540000057
complementary events denoted e, P (c)j/e)=cj
Figure BDA0003402025540000058
P (e) is expressed as the prior probability of event e. P (e/C) belongs to [0,1 ]]. Once P (e/C) exceeds a preset threshold Thr, the data related to the event is considered to be authentic by the fog node; if P (e/C) does not exceed the set threshold, the data is considered unreliable. The user who uploads the unreliable data will be kicked out of the sharing list and no longer participate in the round of data sharing.
2) User experience-based trust value
The experience-based trust value is obtained by updating the trust value of the user by using the past behavior of the user to indirectly judge the authenticity of data, and the value is continuously accumulated along with the timeAnd (4) accumulating. After the data sharing is completed, the data requester can score T for the provider based on the data qualityi,j,Ti,jE (-1, 1). Fog node averaging scoring of requesters
Figure BDA0003402025540000059
L is the number of requestors interacting with data provider j this time. By sjRepresenting the experience-based confidence level, s, of user jjE (-1,1), the update criterion is as follows:
if it is
Figure BDA00034020255400000510
Degree of trust sjThe increase is as follows:
Figure BDA00034020255400000511
if it is
Figure BDA00034020255400000512
Degree of trust sjThe reduction is:
Figure BDA00034020255400000513
wherein s isjRepresenting an empirically based trust value, s 'at the current time'kRepresenting an updated trust value. Eta is a positive increment factor 0 < eta < 1; mu is a negative attenuation factor-1 < mu < 0. If the user has cheating behavior, the trust is easily destroyed and the trust is difficult to establish. Lambda represents a forgetting factor, lambda is more than 0 and less than 1, t represents the time difference between the interaction time of the current data provider and the data requester and the previous interaction time, the behavior of the user may change after a period of time, and lambda is discounted for the previous trust value in order to make the accumulated trust value of the previous behavior have less influence on the current timetOr (lambda)-t) The speed at which experience-based confidence increases or decreases is slowed.
3) Historical interaction of users
When a requester makes a share request to a provider, the provider's satisfaction with the previously provided service is measured, which is related to the historical interaction between the two. p is a radical ofijIndicating the level of satisfaction, p, of the current serviceij∈[0,1]. The historical interactive cumulative value is:
Figure BDA0003402025540000061
wherein p isij(ti) Represents a level of satisfaction with the currently provided data;
Figure BDA0003402025540000062
cumulative, constantly updated, indicating satisfaction
Figure BDA0003402025540000063
The instant of requesting a service is denoted tn=tN>…>t2>t1(ii) a N is the number of times data is requested. A higher N means that the requester has more prior knowledge of the provider, so that the provider is judged more accurately, and the acquired data is more complete and accurate.
In the select data provider phase, requestor RiBased on the three indexes, related providers are evaluated, and an n × m provider scoring matrix is established as follows:
Figure BDA0003402025540000064
wherein n is the number of data providers, and n is less than or equal to j; c. CnRepresents QnThe provided data of (1) a credibility score; snRepresentation provider QnAn experience-based trust value; h isnRepresents a requestor RiFor provider QnThe historical interaction score of.
After the scoring matrix W is obtained, the scoring weights of three scoring indexes of data reliability, experience-based trust value and historical interaction score are evaluated by adopting an entropy weight method, so that the evaluation indexes are usedThe data provided by the user is evaluated. First to obtain a normalized evaluation matrix
Figure BDA0003402025540000065
Normalization processing is carried out on the matrix elements by adopting a normalization method:
Figure BDA0003402025540000071
calculating the weight of each evaluation index m of the provider:
Figure BDA0003402025540000072
information entropy H of evaluation index mmComprises the following steps:
Figure BDA0003402025540000073
and (3) carrying out normalization processing on the information entropy of the evaluation index m:
Figure BDA0003402025540000074
get the current data reliability score of requester i for each provider j on data l:
Figure BDA0003402025540000075
the data requester obtains a reliability score G of the datajAnd then sending a data sharing request to the data provider with the highest correlation score so as to obtain credible data, and preventing the propagation of false messages.
Finally, the above embodiments are only intended to illustrate the technical solutions of the present invention and not to limit the present invention, and although the present invention has been described in detail with reference to the preferred embodiments, it will be understood by those skilled in the art that modifications or equivalent substitutions may be made on the technical solutions of the present invention without departing from the spirit and scope of the technical solutions, and all of them should be covered by the claims of the present invention.

Claims (5)

1. A multi-factor data reliability assessment method in fog calculation is characterized in that: the method comprises the following steps:
s1: establishing a two-layer data sharing model based on a fog network;
s2: a data pre-judging method based on Bayesian inference;
s3: updating a trust value based on historical interaction and experience of the user;
s4: and evaluating the reliability of the data based on an entropy weight method.
2. The method of claim 1, wherein the method comprises the following steps: in said S1, establishing a data sharing model; the system comprises a user and a fog node connected with each other; the user is provided with advanced communication equipment with wireless communication capability; the user collects local data from the sensing equipment, uploads the data abstract to the fog node with the closest communication distance, and shares the content with the data requester; the fog node has certain storage and calculation capacity, collects data uploaded by users in a communication range of the fog node, and pre-judges the credibility of the data; wherein, the data summary comprises data size, time and address.
3. The method of claim 2, wherein the method comprises the following steps: in the step S2, the data has uncertainty, and in order to prevent the user from spreading false information, the fog node performs pre-judgment on the data uploaded by the user in the coverage area; the credibility of a certain data l is defined as
Figure FDA0003402025530000011
The credibility is related to the distance and timeliness of the occurrence of the content; the fog node collects data sets within its communication range and corresponding credibility set COn the basis of obtaining the credibility set, the aggregate credibility P of the data l is calculated by Bayesian inference, and when P is larger than a threshold Thr, the data is considered to be credible.
4. The method of claim 3, wherein the method comprises the following steps: in S3, the user requests the data not only considering the credibility of the data itself, but also considering the behavior of the data provider in data sharing; if the provider is malicious, the conditions of missing transmission and counterfeiting data exist, and false data service is provided; the requester judges the authenticity of the data by combining the past behavior of the user and the satisfaction degree of the service provided by the provider before on the basis of the data pre-judgment result of the fog node; when a requester sends a sharing request to a provider, the historical interaction of a user measures the satisfaction degree of the service provided by the provider before, and the satisfaction degree is related to the historical interaction between the requester and the provider; the experience-based trust value is obtained by updating the trust value of the user by using the past behavior of the user, so that the authenticity of the data is indirectly judged, and the trust value is continuously accumulated along with the time.
5. The method of claim 4, wherein the method comprises the following steps: in the S4, in the stage of selecting data provider, the requester RiEvaluating related providers based on three indexes of pre-judgment of data, historical interaction of users and experience-based trust values of the users, and establishing an n multiplied by m provider scoring matrix as W; and after the scoring matrix W is obtained, evaluating the scoring weights of the three scoring indexes of the data by adopting an entropy weight method, and comprehensively evaluating the data provided by the user to finally obtain a satisfaction value of the data.
CN202111499031.2A 2021-12-09 2021-12-09 Multi-factor data reliability assessment method in fog calculation Pending CN114282783A (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN202111499031.2A CN114282783A (en) 2021-12-09 2021-12-09 Multi-factor data reliability assessment method in fog calculation

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN202111499031.2A CN114282783A (en) 2021-12-09 2021-12-09 Multi-factor data reliability assessment method in fog calculation

Publications (1)

Publication Number Publication Date
CN114282783A true CN114282783A (en) 2022-04-05

Family

ID=80871381

Family Applications (1)

Application Number Title Priority Date Filing Date
CN202111499031.2A Pending CN114282783A (en) 2021-12-09 2021-12-09 Multi-factor data reliability assessment method in fog calculation

Country Status (1)

Country Link
CN (1) CN114282783A (en)

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426661A (en) * 2022-09-06 2022-12-02 华中科技大学 Credible coverage reliability assessment method for Internet of things based on trust management
CN116052832A (en) * 2023-04-03 2023-05-02 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) Tamper-proof transmission method based on medical information
CN116806038A (en) * 2023-08-18 2023-09-26 上海临滴科技有限公司 Decentralizing computer data sharing method and device

Cited By (3)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN115426661A (en) * 2022-09-06 2022-12-02 华中科技大学 Credible coverage reliability assessment method for Internet of things based on trust management
CN116052832A (en) * 2023-04-03 2023-05-02 青岛市妇女儿童医院(青岛市妇幼保健院、青岛市残疾儿童医疗康复中心、青岛市新生儿疾病筛查中心) Tamper-proof transmission method based on medical information
CN116806038A (en) * 2023-08-18 2023-09-26 上海临滴科技有限公司 Decentralizing computer data sharing method and device

Similar Documents

Publication Publication Date Title
CN114282783A (en) Multi-factor data reliability assessment method in fog calculation
Koutsopoulos Optimal incentive-driven design of participatory sensing systems
Pouryazdan et al. Anchor-assisted and vote-based trustworthiness assurance in smart city crowdsensing
Abderrahim et al. TMCoI-SIOT: A trust management system based on communities of interest for the social Internet of Things
Fan et al. On trust models for communication security in vehicular ad-hoc networks
Mármol et al. Towards pre-standardization of trust and reputation models for distributed and heterogeneous systems
Buchegger et al. Coping with false accusations in misbehavior reputation systems for mobile ad-hoc networks
US8756658B2 (en) Node authentication
CN114357455B (en) Trust method based on multidimensional attribute trust evaluation
Kumar et al. An intelligent clustering scheme for distributed intrusion detection in vehicular cloud computing
CN1741527A (en) Method for applying cooperative enhancement mechanism to adhoc network
Jiang et al. A new evidential trust model for open distributed systems
US20220321355A1 (en) Judgment Method For Edge Node Computing Result Trustworthiness Based On Trust Evaluation
CN112566058B (en) Internet of vehicles self-adaptive defense method, system, medium, equipment and terminal
CN115277055B (en) Method and device for guaranteeing data interaction safety of Internet of things and electronic equipment
CN113645190A (en) Byzantine fault-tolerant consensus method considering node reputation and block chain
CN113452681B (en) Internet of vehicles crowd sensing reputation management system and method based on block chain
CN111885539A (en) Internet of vehicles credit updating method based on dynamic adjustment of updating interval
CN114742442A (en) Trust-based participant selection method for improving data quality
CN111582641A (en) Task allocation method and system for crowdsourcing service of Internet of vehicles
CN113114762B (en) Data caching method and system
CN102006305A (en) Method for suppressing malicious behavior based on distributed recommendable reputation in peer-to-peer (P2P) network
CN109474461A (en) Wireless sensor network trust management method and system based on prestige Poisson distribution
CN110139278B (en) Method of safety type collusion attack defense system under Internet of vehicles
CN112672321B (en) Relay vehicle selection method and device

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination