Dynamic Evaluation of Recommendation Trust in Open Networks

  • Yu Zhang Faculty of Information Technology, Beijing University of Technology, Beijing, China, Department of Computer Science, Jining University, Qufu, China
  • Guangmin Sun Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • Peng He College of Computer and Information Technology, China Three Gorges University, Yichang, China
  • Peng Zhai Faculty of Information Technology, Beijing University of Technology, Beijing, China
  • Yuge Sun School of Electrical and Electronic Engineering, the University of Manchester, Manchester, United Kingdom
Keywords: Open networks, recommendation trust, dynamic, evaluation

Abstract

Trust evaluation is a key issue in the interaction between network entities in open networks. The attacks of malicious entities have become a major obstacle to the development of open networks. Few traditional trust models have considered incorporating incentive mechanisms to reduce the influence of recommendation values from malicious entities in trust evaluation. This paper proposed a dynamic evaluation of recommendation trust model, considering the interaction procedure between entities, introducing reward-punishment factor and evaluation reliability factor. The function of reward-punishment factor is to reward honest interactions between entities while punishing fraudulent interactions. The evaluation reliability factor is used to decide whether to accept the recommendations from the recommending entities. Simulation results show that the model could effectively reduce the influence of malicious entities in trust evaluation. The proposed model could accurately and reliably identify the access behaviour of malicious entities, and adopt appropriate processing countermeasure to ensure the accuracy and fault tolerance of calculation.

Downloads

Download data is not yet available.

Author Biographies

Yu Zhang, Faculty of Information Technology, Beijing University of Technology, Beijing, China, Department of Computer Science, Jining University, Qufu, China

Yu Zhang was born in China in 1978. He is currently a doctoral candidate in the Faculty of Information Technology at Beijing University Of Technology. He received his B.Sc. and M.Sc. degrees in physics from Qufu Normal University, China in 2002 and 2005, respectively. His research interests include neural networks and network security.

Guangmin Sun, Faculty of Information Technology, Beijing University of Technology, Beijing, China

Guangmin Sun was born in China in 1960. He received his B.Sc. degree in electronic engineering from Beijing Institute of Technology, China in 1982, his M.Sc. degree in communication and information systems from Nanjing University of Science and Technology, China in 1991, and his Ph.D. degree in communication and information systems from Xidian University, China in 1997. Currently, he is a professor with Beijing University of Technology. His research interests include neural networks, image processing and pattern recognition.

Peng He, College of Computer and Information Technology, China Three Gorges University, Yichang, China

Peng He was born in China in 1965. He received his B.Sc. degree in computer application from Hefei University Of Technology, China in 1986, and his M.Sc. degree in measurement and control from Chinese Academy of Sciences, China in 1989. Currently, he is a professor with China Three Gorges University. His research interests include deep learning and network security.

Peng Zhai, Faculty of Information Technology, Beijing University of Technology, Beijing, China

Peng Zhai was born in China in 1978. He is currently a doctoral candidate in the Faculty of Information Technology at Beijing University Of Technology and an associate professor with Jining University, China. He received his M.Sc. degrees in Shandong University of Science and Technology, China in 2005. His research interests include network security and blockchain.

Yuge Sun, School of Electrical and Electronic Engineering, the University of Manchester, Manchester, United Kingdom

Yuge Sun was born in China in 1997. He received his B.Sc. degree in electrical and electronic engineering from The University of Manchester, UK in 2018. His research interests include image processing and artificial intelligence.

References

W. Sherchan, S. Nepal, C. Paris., ‘A Survey of Trust in Social Networks’, ACM Computing Survey, 45(4), pp. 119-228, 2013.

G. Han, J. Jiang, L. Shu, et al., ‘Management and Applications of Trust in Wireless Sensor Networks: A Survey’, Journal of Computer and System Sciences, 80(3), pp. 602-617, 2014.

B. Zhao, J. He, Y. Zhang, et al., ‘Dynamic trust evaluation in open networks’, Intelligent Automation & Soft Computing, 22(4), pp. 631-638, 2016.

X. Cao, X. Shao, Z. Lu., ‘Grouping P2P Trust Model Based on Dual Attribute Values’, Computer Engineering, 41(3), pp. 130-135, 2015.

Z. Abrams, R. McGrew, S. Plotkin, ‘A non-manipulable trust system based on EigenTrust’, ACM SIGecom Exchanges, 5(4), pp. 21-30, 2005.

W. Xue, Y. Liu, K. Li, et al., ‘DHTrust: a robust and distributed reputation system for trusted peer-to-peer networks’, Concurrency and Computation: Practice & Experience, 24(10), pp. 1037-1051, 2012.

X. Y. Li, X. L. Gui, Q. Mao, et al., ‘Adaptive Dynamic Trust Measurement and Prediction Model based on Behaviour Monitoring’, Chinese Journal of Computers, 32(4), pp. 664-674, 2009.

Y. Li, H. Guo, W. Peng, et al., ‘Trust attribute-based access control policies composition’, Application research of Computers, 33(7), pp. 2175-2180, 2016.

J. A. Zhang and X. E. Guo, ‘Trust Model based on Dynamic Recommendation in P2P Network’, Computer Engineering, 36(1), pp. 174-176+180, 2010.

X. Deng, P. Guan, Z. Wang, et al., ‘Integrated Trust Based Resource Cooperation in Edge Computing’, Journal of Computer Research and Development, 55(3), pp. 449-477, 2018.

L. Fang, L. Yin, Y. Guo, et al., ‘A Survey of Key Technologies in Attribute-Based Access Control Scheme’, Chinese Journal of Computers, 40(7), pp. 1680-1698, 2017.

Z. Zhao, B. Tan, S. Xia, et al., ‘P2P network comprehensive trust model based on time series’, Computer Engineering and Applications, 53(15), pp. 127-131, 2017.

G. Shi, H. Wang, Y. Ci, et al., ‘Dynamic and adaptive access control model’, Journal on Communications, 37(11), pp. 49-56, 2016.

H. Liu, L. Zhang, Z. Chen, ‘Task-based access control mode of peer-to-peer network based on fuzzy theory’, Journal on Communications, 38(2), pp. 44 -52, 2017.

D. Chen, S. Yang, ‘Dynamic trust level based ciphertext access control scheme’, Journal of Computer Applications, 37(6), pp. 1587-1592, 2017.

K. Shao, F. Luo, N. X. Mei, et al., ‘Normal Distribution based Dynamical Recommendation Trust Model’, Journal of Software, 23(12), pp. 3130-3148, 2012.

J. Nie, D. Zhang, ‘Research on Resource Trust Access Control Based on Cloud Computing Environment’, Communications in Computer and Information Science, 873, pp. 394-404, 2017.

L. T. Huang, S. G. Deng, Y. Li, et al., ‘A Trust Evaluation Mechanism for Collaboration of Data-intensive Services in Cloud’, Applied Mathematics & Information Sciences, 7(1), pp. 121-129, 2013.

K. Woongsup, ‘A Trustworthy Service Computing Framework through a Semantic Messaging Model’, Applied Mathematics &Information Sciences, 7(2), pp. 729-739, 2013.

I. Naima, G. Abdul, Z. Uzman, ‘A Mechanism for Detecting Dishonest Recommendation in Indirect Trust Computation’, EURASIP Journal on Wireless Communications and Networking, pp. 189, 2013.

B. Zhao, J. He, Y. Zhang, et al., ‘The Method of Recommended Trust Evaluation Based on Grey Correlation Analysis’, Acta Scientiarum Naturalium Universitatis Pekinensis, 53(2), pp. 314-320, 2017.

Published
2020-12-25
Section
Advanced Practice in Web Engineering