首页 | 本学科首页   官方微博 | 高级检索  
相似文献
 共查询到20条相似文献,搜索用时 15 毫秒
1.
Existing studies on the web service selection problem focus mainly on the functional QoS properties of the service rather than the consumer satisfaction and trust aspects. While a good QoS enhances the reputation of a service, different consumers invariably hold differing views of the service contents. Some service reputation approaches primarily consider the consumer’s prior experience of the service via opinion feedback system, may neglect the effect of social trust transition in the recommendations of others. As a result, the problem of reaching consensus on the level of consumer trust regarding service becomes one of key issues in service selection. This study proposes a trust-based service selection model to estimate the degree of consumer trust in a particular service based on the consumers’ direct experience and indirect recommendation of the service. In the proposed approach, the degree of consumer trust is correctly estimated by extending Dempster–Shafer evidence reasoning theory to the reputation computation using consumers’ direct experience and incorporating Jøsang’s belief model for solving the trust transition problem in the indirect recommendation of the service. The proposed model effectively enables deception detection by means of existing bodies of evidence, and therefore excludes the fraudulent evidence of malicious evaluators from the selection process. In addition, a quality index is proposed to help third party (TTP) examine the body of evidence and make the outranking result more reliable. Importantly, the quality index is based not only on the confidence degree of the evidence, but also on the support degree, and therefore discovers the effects of intentional negative assessments. The validity of the proposed approach is demonstrated numerically by means of two service selection examples.  相似文献   

2.
Service selection in service‐oriented computing has emerged to be an increasingly important research area. From the client's point of view, in addition to the QoS of a service or a service composition, the trust level becomes an important part. As the complexity of invocation in service composition has been greatly increased, a comprehensive mechanism, which could evaluate both the subjective aspect as trust expression and the objective aspect as QoS, is needed. In this paper, we provide a formal service composition architecture for service selection. In addition, we propose a trust evaluation method for the service composition plan based on the subjective probability theory, based on them, our trust‐oriented genetic algorithm (TOGA) is proposed to find a near‐optimal service composition plan with QoS constraints. Experimental results have illustrated that our proposed approach can discover the near‐optimal solution efficiently. Copyright © 2013 John Wiley & Sons, Ltd.  相似文献   

3.
基于用户经验反馈的Web Services可信度评测体系构建   总被引:1,自引:0,他引:1  
吴建斌  吕刚 《计算机应用》2009,29(8):2291-2292
服务之间的可信度是Web Services推广和计价中必须考虑的一个问题。提出服务可信度的影响因素包括QoS可信度和用户对服务执行结果的满意程度。通过用户经验反馈,针对不同领域获取用户对相应服务的可信度评价量化值,并计算QoS的实际满足率,以此建立服务的可信度评测体系。针对QoS欺骗问题,通过定期QoS统计分析,及时进行QoS修正,保持服务的高可信度。通过在模拟系统中的试用,此可信度评测体系在持续欺骗服务实体和暂时性QoS失真情况下均较低为合理。  相似文献   

4.
P2P网络中的节点很可能从另外的节点那里收到质量很差的服务和信息,名誉评价是解决该问题的常见方法.基于评分反馈的P2P名誉计算机制存在下述缺点:无法区分恶意评价和诚实节点给出错误评价间的差别;需要对评分可信度进行二次评价,使名誉计算速度减慢;用数字来表示节点名誉的方式不够自然.实际上,名誉评价的用途是确定节点可信度的相...  相似文献   

5.
RATEWeb: Reputation Assessment for Trust Establishment among Web services   总被引:3,自引:0,他引:3  
We introduce RATEWeb, a framework for establishing trust in service-oriented environments. RATEWeb supports a cooperative model in which Web services share their experiences of the service providers with their peers through feedback ratings. The different ratings are aggregated to derive a service provider’s reputation. This in turn is used to evaluate trust. The overall goal of RATEWeb is to facilitate trust-based selection and composition of Web services. We propose a set of decentralized techniques that aim at accurately aggregating the submitted ratings for reputation assessment. We conduct experiments to assess the fairness and accuracy of the proposed techniques.  相似文献   

6.
王勇  侯洁  白杨  夏云  秦志光 《计算机科学》2013,40(2):103-107
用户对P2P网络安全性的需求刺激了信任模型的发展。在分析现有信任模型的基础上,提出了基于反馈相关性的动态信任模型—CoDyTrust。其在时间帧的基础上,采用虚假信任过滤机制和信任聚合机制,并在信任值计算中引入信任相关系数、信任遗忘因子、滥用信任值和推荐信任度等,通过反馈控制机制动态调节这些模型因子,在准确评价节点对不同资源信任的同时,实现网络中恶意行为检测。比较分析结果表明,CoDyTrust能够更好地反映网络中节点行为,准确检测恶意节点,有效抵御振荡、撒谎和合谋等攻击。  相似文献   

7.
Nowadays, software systems are mainly Web front-based, Cloud-deployed and accessible by a wide audience over the Internet. These online systems commonly rely on Service-oriented Architecture principles, where they are built as orchestrations of RESTful (and in some rare cases as SOAP-based) services. Integrating new services in an existing orchestration is a challenging and risky task because trustworthiness of these services is not guaranteed throughout their lifetime. Reputation of services is a good indicator about the overall quality of services, because it reflects consumer satisfaction regarding the service-offered functionality and quality. Thus, reputation of services could be considered in the selection and recommendation of trustworthy services. In this paper, we present a framework for the management of web service reputation to conduct a better service recommendation. We present a reputation assessment model that aggregates fair user feedback ratings. The model includes a mechanism that prevents the introduction of malicious feedback ratings, by penalizing detected specious users. In addition, this framework includes a bootstrapping technique for estimating reputation of newcomer services based on neighbor similarity and initial advertised QoS. A set of experiments has been conducted to evaluate the effectiveness of the proposed framework. The results of these experiments highlighted the potential of our framework. These are presented at the end of the paper.  相似文献   

8.
Decentralized Peer-to-Peer (P2P) networks offer not only opportunities but also threats. Due to the autonomy, self-interest and heterogeneousness of peers, the interaction outcomes are uncertain. One way to minimize the threats in such an open environment is exploiting the reputation method to evaluate the trustworthiness and predict the future behaviors of peers. While most of the existing reputation-based trust models focus on preventing network from the malicious peers, peers’ capabilities to fulfill the tasks are mostly ignored. In this paper, we present a novel trust model MHFTrust which quantifies and compares the trustworthiness of peers based on hierarchical fuzzy system. Six capability factors are identified to describe the peers’ trust on the capability, and one security factor, named “Malicious behavior” is used to evaluate the peers’ trust on security. Our trust model consisted of local-trust computation based on fuzzy techniques and global reputation aggregation, which integrates feedback from other peers to produce a global reputation for each peer. Credibility and weight of feedback are introduced to facilitate the computation of global reputation. It is shown in simulation that our trust model greatly improves the efficiency of P2P system, while the number of inauthentic files on the network is significantly decreased.  相似文献   

9.
In the last few years, cloud computing as a new computing paradigm has gone through significant development, but it is also facing many problems. One of them is the cloud service selection problem. As increasingly boosting cloud services are offered through the internet and some of them may be not reliable or even malicious, how to select trustworthy cloud services for cloud users is a big challenge. In this paper, we propose a multi-dimensional trust-aware cloud service selection mechanism based on evidential reasoning(ER) approach that integrates both perception-based trust value and reputation based trust value, which are derived from direct and indirect trust evidence respectively, to identify trustworthy services. Here, multi-dimensional trust evidence, which reflects the trustworthiness of cloud services from different aspects, is elicited in the form of historical users feedback ratings. Then, the ER approach is applied to aggregate the multi-dimensional trust ratings to obtain the real-time trust value and select the most trustworthy cloud service of certain type for the active users. Finally, the fresh feedback from the active users will update the trust evidence for other service users in the future.  相似文献   

10.
在P2P文件共享网络现有声誉系统中,评价信息不足和恶意评价导致声誉不可靠。为此,提出一种基于下载节点共享时长的客观评价方法。该方法使系统自动获得每个下载节点的评级信息,根据该信息建立节点之间的信任关系。仿真结果表明,共享时长方法可提高信任的可靠性,有效隔离恶意节点,并能为不同行为的节点提供分化服务,保证网络资源分配的公平性。  相似文献   

11.
面对各种网络攻击,P2P网络需要有效的信任机制隔离恶意节点,保证节点的成功交易。考虑节点行为特征和差评的重要性,提出基于差评散布的信任机制。服务节点一旦提供的服务被给出差评,对其近期交易的相关节点进行差评的散布,加大差评对服务节点声誉的影响力度。经过二次计算的节点声誉值能真实反映节点近期的声誉水平与交易趋势。实验结果表明,该信任机制能保证正常节点的交易成功率,有效对抗各种攻击行为。  相似文献   

12.
一种基于反馈可信度的分布式P2P信任模型   总被引:7,自引:1,他引:6  
胡建理  吴泉源  周斌  刘家红 《软件学报》2009,20(10):2885-2898
开放、共享与匿名的Peer-to-Peer(简称P2P)网络已经取得了越来越多的应用,无中心对等的特性也吸引了越来越多的用户.但由于其网络中的节点不受约束,资源的共享是用户自愿的行为,因此节点间的信任很难通过传统的信任机制建立.一种可行的解决方案是借鉴人际网络中的信任关系,建立一种基于信誉的全局信任模型.已有的工作基本建立在信任度高的节点其反馈也更可信这个假设的基础上,将节点的反馈质量简单地等同于服务质量.针对这一问题,提出了一种基于节点反馈可信度的分布式P2P全局信任模型(简称FCTrust),用于量化和评估节点的可信程度,并给出了模型的数学表述和分布式实现方法.分析及仿真实验结果表明,FCTrust较已有的全局信任模型在遏制更广泛类型的恶意节点攻击的有效性、迭代计算的收敛性及消息成本上有较大提高.  相似文献   

13.
Trust research has become a key issue in the last few years as a novel and valid solution to ensure the security and application in peer-to-peer (P2P) file-sharing networks. The accurate measure of trust and reputation is a hard problem, most of the existing trust mechanisms adopt the historical behavior feedback to compute trust and reputation. Thus exploring the appropriate transaction behavior becomes a fundamental challenge. In P2P system, each peer plays two roles: server and client with responsibility for providing resource service and trust recommending respectively. Considering the resource service behavior and trust recommending behavior of each peer, in this paper, we propose a new trust model adopting the technology to calculate eigenvectors of trust rating and recommending matrices. In our model, we define recommended reputation value to evaluate the resource service behavior, and recommending reputation value to evaluate the trust recommendation behavior. Our algorithm would make these two reputation values established an interrelated relation of reinforcing mutually. The normal peers provide authentic file uploading services, as well as give correct trust recommendation, so they can form a trusted and cooperative transaction community via the mutual reinforcement of recommended and recommending reputation values. In this way, the transaction behaviors of those malicious peers are isolated and confined effectively. Extensive experimental results also confirm the efficiency of our trust model against the threats of exaggeration, collusion, disguise, sybil and single-behavior.  相似文献   

14.
Nowadays, the cloud computing environment is becoming a natural choice to deploy and provide Web services that meet user needs. However, many services provide the same functionality and high quality of service (QoS) but different self‐adaptive behaviors. In this case, providers' adaptation policies are useful to select services with high QoS and high quality of adaptation (QoA). Existing approaches do not take into account providers' adaptation policies in order to select services with high reputation and high reaction to changes, which is important for the composition of self‐adaptive Web services. In order to actively participate to compositions, candidate services must negotiate their self‐* capabilities. Moreover, they must evaluate the participation constraints against their capabilities specified in terms of QoS and adaptation policies. This paper exploits a variant of particle swarm optimization and kernel density estimation in the selection of service compositions and the concurrent negotiations of their QoS and QoA capabilities. Selection and negotiation processes are held between intelligent agents, which adopt swarm intelligence techniques for achieving optimal selection and optimal agreement on providers' offers. To resolve unknown autonomic behavior of candidate services, we deal with the lack of such information by predicting the real QoA capabilities of a service through the kernel density estimation technique. Experiments show that our solution is efficient in comparison with several state‐of‐the‐art selection approaches.  相似文献   

15.
Considering the fact that P2P (Peer-to-Peer) systems are self-organized and autonomous, social-control mechanism (like trust and reputation) is essential to evaluate the trustworthiness of participating peers and to combat the selfish, dishonest and malicious peer behaviors. So, naturally, we advocate that P2P systems that gradually act as an important information infrastructure should be multi-disciplinary research topic, and reflect certain features of our society. So, from economic and social perspective, this paper designs the incentive-compatible reputation feedback scheme based on well-known economic model, and characterizes the social features of trust network in terms of efficiency and cost. Specifically, our framework has two distinctive purposes: first, from high-level perspective, we argue trust system is a special kind of social network, and an accurate characterization of the structural properties of the network can be of fundamental importance to understand the dynamics of the system. Thus, inspired by the concept of weighted small-world, this paper proposes new measurements to characterize the social properties of trust system, that is, high global and local efficiency, and low cost; then, from relative low-level perspective, we argue that reputation feedback is a special kind of information, and it is not free. So, based on economic model, VCG (Vickrey-Clarke-Grove)-like reputation remuneration mechanism is proposed to stimulate rational peers not only to provide reputation feedback, but truthfully offer feedback. Furthermore, considering that trust and reputation is subjective, we classify the trust into functional trust and referral trust, and extend the referral trust to include two factors: similarity and truthfulness, which can efficiently reduce the trust inference error. The preliminary simulation results show the benefits of our proposal and the emergence of certain social properties in trust network.  相似文献   

16.
一种对等网中基于相互信任的两层信任模型   总被引:4,自引:1,他引:3  
金瑜  古志民x  顾进广  赵红武 《软件学报》2009,20(7):1909-1920
在P2P 系统中,声誉模型是建立节点间信任关系的重要方法之一,但现有的P2P 声誉模型几乎都是纯分散式的,具有信任收敛慢、信任管理复杂和网络开销大等缺点.在TLT(two-level trust)中,节点自发组织为信任簇,信任评价以簇为单位.每个簇由簇首和成员节点组成,簇首和成员节点之间是一种相互信任的关系:簇首为了提高自身的簇间服务信任,利用簇内服务信任观察成员节点的服务性能,过滤恶意的成员节点;成员节点为了提高服务声誉和接受更好的服务,利用代理信任考察簇首的管理能力.分析和仿真结果表明:在TLT 中,节点的信任值收敛快,恶意行为能够被快速识别;TLT 可扩展性好,如信任管理简单和网络开销小.  相似文献   

17.
Security is a critical constraint for the expansion of Peer-to-Peer (P2P) networks. The autonomy, dynamic and distribution natures benefit both valid and malicious users and also lead that P2P networks are extremely susceptible to malicious users. Exploiting a reputation-based trust model is a feasible solution in such an open environment to build trust relationship among peers. While most of existing trust models focus on restraining the abuse and malicious attacks, intentions and sharing capabilities of peers are mostly ignored. In this paper, we present a self-nominating trust model based on hierarchical fuzzy systems to quantify the behaviors of peers. The reputation is defined based on eight factors, where three promising factors are provided by resource holders to demonstrate their desires, and four capability factors are recorded by requesters to identify the provider’s service capability. The approach degree based updating recommendation is deployed to aggregate the global trust metrics. Experimental results illustrate that our trust model effectively improves the efficiency and security of P2P systems.  相似文献   

18.
基于信任的P2P拓扑进化机制   总被引:1,自引:0,他引:1  
现有的非结构Peer-to-Peer(P2P)系统缺乏对拓扑公平性的考虑,并且不能对某些节点的恶意行为进行有效的抑制。其主要原因在于构造的拓扑对节点信任度的不敏感性,忽略了P2P网络中各节点的异构性。据此,首先给出了基于反馈可信度的节点全局信任度计算模型,然后在此基础上提出了一种针对非结构化P2P网络的自适应拓扑进化机制。利用该机制,可使高可信节点占据拓扑的有利位置,低可信节点处于不利位置,从而体现拓扑的公平性。该机制同时能够对节点的恶意行为进行有效的抑制,并具有激励性质,鼓励节点提供更好的服务,以获得更高的响应率。分析和仿真结果表明,该机制较之现有机制,在拓扑的有效性和激励性上有较大的提高。  相似文献   

19.
一种节点信誉相关的P2P网络信任管理模型   总被引:2,自引:0,他引:2  
现有的P2P系统中存在大量的欺诈行为和不可靠的服务.本文通过模拟社会关系网络中信任的形成机制,提出P2P网络信任管理模型TMMRN,TMMRN通过考察节点的信誉值来进行安全交易,节点的信誉主要来自于其他节点对它的加权信任反馈,在信誉计算中增加了激励机制.TMMRN还可减少交易时的网络负担.实验表明TMMRN可提高信誉值的计算效率,能有效抵抗恶意节点的攻击,还可激励懒惰节点主动参与到系统中来.  相似文献   

20.
With the advent of cloud computing, employing various cloud services to build highly reliable cloud applications has become increasingly popular. The trustworthiness of cloud services is a critical issue that hinders the development of cloud applications, and thus is an urgently-required research problem. Previous studies evaluate trustworthiness of services via either QoS monitoring mechanisms or user feedback ratings, while seldom they combine both of them for enhancing service trust evaluation. This paper proposes a trustworthy selection framework for cloud service selection, named TRUSS. Aiming at developing an effective trust evaluation middleware for TRUSS, we propose an integrated trust evaluation method via combining objective trust assessment and subjective trust assessment. The objective trust assessment is based on QoS monitoring, while the subjective trust assessment is based on user feedback ratings. Experiments conducted using a synthesized dataset show that our proposed method significantly outperforms the other trust and reputation methods.  相似文献   

设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号