Dynamic Evaluation of Recommendation Trust in Open Networks
Trust evaluation is a key issue in the interaction between network entities in open networks. The attacks of malicious entities have become a major obstacle to the development of open networks. Few traditional trust models have considered incorporating incentive mechanisms to reduce the influence of recommendation values from malicious entities in trust evaluation. This paper proposed a dynamic evaluation of recommendation trust model, considering the interaction procedure between entities, introducing reward-punishment factor and evaluation reliability factor. The function of reward-punishment factor is to reward honest interactions between entities while punishing fraudulent interactions. The evaluation reliability factor is used to decide whether to accept the recommendations from the recommending entities. Simulation results show that the model could effectively reduce the influence of malicious entities in trust evaluation. The proposed model could accurately and reliably identify the access behaviour of malicious entities, and adopt appropriate processing countermeasure to ensure the accuracy and fault tolerance of calculation.
W. Sherchan, S. Nepal, C. Paris., ‘A Survey of Trust in Social Networks’, ACM Computing Survey, 45(4), pp. 119-228, 2013.
G. Han, J. Jiang, L. Shu, et al., ‘Management and Applications of Trust in Wireless Sensor Networks: A Survey’, Journal of Computer and System Sciences, 80(3), pp. 602-617, 2014.
B. Zhao, J. He, Y. Zhang, et al., ‘Dynamic trust evaluation in open networks’, Intelligent Automation & Soft Computing, 22(4), pp. 631-638, 2016.
X. Cao, X. Shao, Z. Lu., ‘Grouping P2P Trust Model Based on Dual Attribute Values’, Computer Engineering, 41(3), pp. 130-135, 2015.
Z. Abrams, R. McGrew, S. Plotkin, ‘A non-manipulable trust system based on EigenTrust’, ACM SIGecom Exchanges, 5(4), pp. 21-30, 2005.
W. Xue, Y. Liu, K. Li, et al., ‘DHTrust: a robust and distributed reputation system for trusted peer-to-peer networks’, Concurrency and Computation: Practice & Experience, 24(10), pp. 1037-1051, 2012.
X. Y. Li, X. L. Gui, Q. Mao, et al., ‘Adaptive Dynamic Trust Measurement and Prediction Model based on Behaviour Monitoring’, Chinese Journal of Computers, 32(4), pp. 664-674, 2009.
Y. Li, H. Guo, W. Peng, et al., ‘Trust attribute-based access control policies composition’, Application research of Computers, 33(7), pp. 2175-2180, 2016.
J. A. Zhang and X. E. Guo, ‘Trust Model based on Dynamic Recommendation in P2P Network’, Computer Engineering, 36(1), pp. 174-176+180, 2010.
X. Deng, P. Guan, Z. Wang, et al., ‘Integrated Trust Based Resource Cooperation in Edge Computing’, Journal of Computer Research and Development, 55(3), pp. 449-477, 2018.
L. Fang, L. Yin, Y. Guo, et al., ‘A Survey of Key Technologies in Attribute-Based Access Control Scheme’, Chinese Journal of Computers, 40(7), pp. 1680-1698, 2017.
Z. Zhao, B. Tan, S. Xia, et al., ‘P2P network comprehensive trust model based on time series’, Computer Engineering and Applications, 53(15), pp. 127-131, 2017.
G. Shi, H. Wang, Y. Ci, et al., ‘Dynamic and adaptive access control model’, Journal on Communications, 37(11), pp. 49-56, 2016.
H. Liu, L. Zhang, Z. Chen, ‘Task-based access control mode of peer-to-peer network based on fuzzy theory’, Journal on Communications, 38(2), pp. 44 -52, 2017.
D. Chen, S. Yang, ‘Dynamic trust level based ciphertext access control scheme’, Journal of Computer Applications, 37(6), pp. 1587-1592, 2017.
K. Shao, F. Luo, N. X. Mei, et al., ‘Normal Distribution based Dynamical Recommendation Trust Model’, Journal of Software, 23(12), pp. 3130-3148, 2012.
J. Nie, D. Zhang, ‘Research on Resource Trust Access Control Based on Cloud Computing Environment’, Communications in Computer and Information Science, 873, pp. 394-404, 2017.
L. T. Huang, S. G. Deng, Y. Li, et al., ‘A Trust Evaluation Mechanism for Collaboration of Data-intensive Services in Cloud’, Applied Mathematics & Information Sciences, 7(1), pp. 121-129, 2013.
K. Woongsup, ‘A Trustworthy Service Computing Framework through a Semantic Messaging Model’, Applied Mathematics &Information Sciences, 7(2), pp. 729-739, 2013.
I. Naima, G. Abdul, Z. Uzman, ‘A Mechanism for Detecting Dishonest Recommendation in Indirect Trust Computation’, EURASIP Journal on Wireless Communications and Networking, pp. 189, 2013.
B. Zhao, J. He, Y. Zhang, et al., ‘The Method of Recommended Trust Evaluation Based on Grey Correlation Analysis’, Acta Scientiarum Naturalium Universitatis Pekinensis, 53(2), pp. 314-320, 2017.