Autosoft Journal

Online Manuscript Access


Dynamic trust evaluation in open networks


Authors



Abstract

Trust has been widely used as an effective means of dealing with security issues in open networks. By taking into consideration of the requirement on dynamic adaptability and incorporating the factors of insufficient conglomerate and incentive mechanisms in trust evaluation, we propose in this paper a dynamic trust evaluation model based on multiple factors that is suitable for open networks. In the proposed model, trust evaluation takes into consideration of direct trust that includes historical information to improve accuracy and recommendation trust that includes a bonus-penalty factor and the reliability of evaluation to improve reliability and efficiency. The calculation of integrated trust relies on solving the problem of determining the weights between direct trust and recommendation trust, resulting in a balanced weight factor being introduced into trust evaluation. In the interactions between network entities, the balanced weight factor changes dynamically as the interactions continue between the entities to make trust evaluation dynamically adaptable. Experimental results show that the proposed method can resist attacks from hostile entities, lower the influence of inaccurate or false recommendations from hostile entities and improve the accuracy of trust evaluation.


Keywords


Pages

Total Pages: 8
Pages: 631-638

DOI
10.1080/10798587.2016.1167438


Manuscript ViewPdf Subscription required to access this document

Obtain access this manuscript in one of the following ways


Already subscribed?

Need information on obtaining a subscription? Personal and institutional subscriptions are available.

Already an author? Have access via email address?


Published

Volume: 22
Issue: 4
Year: 2016

Cite this document


References

Al-Oufi, Samah, Heung-Nam Kim, and Abdulmotaleb El Saddik. "A Group Trust Metric for Identifying People of Trust in Online Social Networks." Expert Systems with Applications 39.18 (2012): 13173-13181. Crossref. Web. https://doi.org/10.1016/j.eswa.2012.05.084

Berket, K., A. Essiari, and A. Muratas. "PKI-Based Security for Peer-to-Peer Information Sharing." Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings. n. pag. Crossref. Web. https://doi.org/10.1109/PTP.2004.1334930

Blaze, M., J. Feigenbaum, and J. Lacy. "Decentralized Trust Management." Proceedings 1996 IEEE Symposium on Security and Privacy n. pag. Crossref. Web. https://doi.org/10.1109/SECPRI.1996.502679

Blaze M. Proceedings of the 6th International Workshop on Security Protocols

Chen, Hongsong, and Fu Zhongchuan. "A Novel Trust Routing Scheme Based on Node Behaviour Evaluation for Mobile AD Hoc Networks." Intelligent Automation & Soft Computing 17.8 (2011): 1063-1074. Crossref. Web. https://doi.org/10.1080/10798587.2011.10643211

Gao, Feng, Jingsha He, and Shunan Ma. "Modelling the Relationship Between Trust and Privacy in Network Environments." International Journal of Computational Science and Engineering 9.4 (2014): 347. Crossref. Web. https://doi.org/10.1504/IJCSE.2014.060716

Han, Guangjie et al. "Management and Applications of Trust in Wireless Sensor Networks: A Survey." Journal of Computer and System Sciences 80.3 (2014): 602-617. Crossref. Web. https://doi.org/10.1016/j.jcss.2013.06.014

Huang, Longtao et al. "A Trust Evaluation Mechanism for Collaboration of Data-Intensive Services in Cloud." Applied Mathematics & Information Sciences 7.1L (2013): 121-129. Crossref. Web. https://doi.org/10.12785/amis/071L18

Iltaf, Naima, Abdul Ghafoor, and Uzman Zia. "A Mechanism for Detecting Dishonest Recommendation in Indirect Trust Computation." EURASIP Journal on Wireless Communications and Networking 2013.1 (2013): n. pag. Crossref. Web. https://doi.org/10.1186/1687-1499-2013-189

Jiang, Wenjun, and Guojun Wang. "SWTrust: Generating Trusted Graph for Trust Evaluation in Online Social Networks." 2011IEEE 10th International Conference on Trust, Security and Privacy in Computing and Communications (2011): n. pag. Crossref. Web. https://doi.org/10.1109/TrustCom.2011.251

Josang, Audun, and Jochen Haller. "Dirichlet Reputation Systems." The Second International Conference on Availability, Reliability and Security (ARES”07) (2007): n. pag. Crossref. Web. https://doi.org/10.1109/ARES.2007.71

Kamvar, Sepandar D., Mario T. Schlosser, and Hector Garcia-Molina. "The Eigentrust Algorithm for Reputation Management in P2P Networks." Proceedings of the twelfth international conference on World Wide Web - WWW ”03 (2003): n. pag. Crossref. Web. https://doi.org/10.1145/775152.775242

Kim, Woongsup. "A Trustworthy Service Computing Framework through a Semantic Messaging Model." Applied Mathematics & Information Sciences 7.2L (2013): 729-739. Crossref. Web. https://doi.org/10.12785/amis/072L51

Kim, Young Ae, and Rasik Phalak. "A Trust Prediction Framework in Rating-Based Experience Sharing Social Networks Without a Web of Trust." Information Sciences 191 (2012): 128-145. Crossref. Web. https://doi.org/10.1016/j.ins.2011.12.021

Li Q. Chinese Journal of Computers

Ma S.N. Research of trust based access control models and methods in network environments

Ma, Shunan, Jingsha He, and Xunbo Shuai. "An Access Control Method Based on Scenario Trust." International Journal of Computational Intelligence Systems 5.5 (2012): 942-952. Crossref. Web. https://doi.org/10.1080/18756891.2012.733233

Mármol, Félix Gómez, Gregorio Martínez Pírez, and Javier G Marín-Blázquez. "Meta-Tacs: A Trust Model Demonstration Of Robustness Through A Genetic Algorithm." Intelligent Automation & Soft Computing 17.1 (2011): 41-59. Crossref. Web. https://doi.org/10.1080/10798587.2011.10643132

Sabater, Jordi, and Carles Sierra. "REGRET." Proceedings of the fifth international conference on Autonomous agents - AGENTS ”01 (2001): n. pag. Crossref. Web. https://doi.org/10.1145/375735.376110

Wang, Guojun, and Jie Wu. "Multi-Dimensional Evidence-Based Trust Management with Multi-Trusted Paths." Future Generation Computer Systems 27.5 (2011): 529-538. Crossref. Web. https://doi.org/10.1016/j.future.2010.04.015

Wang, Yu, Yue-long Zhao, and Fang Hou. "A New Security Trust Model for Peer-to-Peer E-Commerce." 2008 International Conference on Management of e-Commerce and e-Government (2008): n. pag. Crossref. Web. https://doi.org/10.1109/ICMECG.2008.86

Wang J.P. Journal of Tsinghua University (Science & Technology)

Wang J.P. Journal of Computational Information Systems

Watanabe, Kenichi, Tomoya Enokido, and Makoto Takizawa. "Trustworthiness of Acquaintances in Peer-to-Peer Overlay Networks." International Journal of High Performance Computing and Networking 6.2 (2009): 160. Crossref. Web. https://doi.org/10.1504/IJHPCN.2009.027466

Li Xiong, and Ling Liu. "PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities." IEEE Transactions on Knowledge and Data Engineering 16.07 (2004): 843-857. Crossref. Web. https://doi.org/10.1109/TKDE.2004.1318566

Zhou, Yizheng et al. "Software-Based Failure Detection and Recovery in Programmable Network Interfaces." IEEE Transactions on Parallel and Distributed Systems 18.11 (2007): 1539-1550. Crossref. Web. https://doi.org/10.1109/TPDS.2007.1093

Zhang, Yu et al. "Building Trust in Electronic Communities by Mining Web Content." International Journal of Computational Science and Engineering 5.1 (2010): 58. Crossref. Web. https://doi.org/10.1504/IJCSE.2010.030230

JOURNAL INFORMATION


ISSN PRINT: 1079-8587
ISSN ONLINE: 2326-005X
DOI PREFIX: 10.31209
10.1080/10798587 with T&F
IMPACT FACTOR: 0.652 (2017/2018)
Journal: 1995-Present




CONTACT INFORMATION


TSI Press
18015 Bullis Hill
San Antonio, TX 78258 USA
PH: 210 479 1022
FAX: 210 479 1048
EMAIL: tsiepress@gmail.com
WEB: http://www.wacong.org/tsi/