HOME JOURNALS CONTACT

Information Technology Journal

Year: 2013 | Volume: 12 | Issue: 18 | Page No.: 4776-4782
DOI: 10.3923/itj.2013.4776.4782
Research of New Real-time Trust Monitoring Model Base on Multiple Behavior Attributes
Lin Zhang, Zhengbang Liu, Kaili Rao and Ruchuan Wang

Abstract: In order to ensure the reliability and security of working environments under the open network environment dynamically,a fine-grain real-time and dynamic trust monitoring model is proposed which is based on behavior attribute factor, penalty factor of bad frequency, penalty factor of reputation, penalty factor of hazard-warning frequency, union-recommendation trust, etc. Through monitoring the behavior change in the context of service nodes, the calculating method about the behavior risk value is discussed which is based on the degree of damage about bad behaviors. This can provide convenience for making new judgment.When work is completed, the updating method about trust encouragement or punishment is given. Experiment results show that the new real-time trust monitoring model is accurate and effective.

Fulltext PDF

How to cite this article
Lin Zhang, Zhengbang Liu, Kaili Rao and Ruchuan Wang, 2013. Research of New Real-time Trust Monitoring Model Base on Multiple Behavior Attributes. Information Technology Journal, 12: 4776-4782.

Keywords: Open network environment, dynamic trust, trust monitoring and trust updating

REFERENCES

  • Abbadi, I.M. and A. Martin, 2011. Trust in the cloud [Elektronische versie]. Inform. Security Tech. Rep., 16: 108-114.


  • Akay, B. and D. Karaboga, 2012. A modified Artificial Bee Colony algorithm for real-parameter optimization. Inform. Sci., 192: 120-142.
    CrossRef    Direct Link    


  • Blandford, R., 2011. Information security in the cloud. Network Security, 2011: 15-17.
    CrossRef    


  • Li, X.Y., X.L. Gui, Q. Mao and D.Q. Leng, 2009. Adaptive dynamic trust measurement and prediction model based on behavior monitoring. Chinese J. Comput., 32: 664-674.
    Direct Link    


  • Li, M.C., B.Yang, W. Zhong, L.L. Tian, H. Jiang and H.G. Hu, 2009. Grid dynamic authorization model based on feedback mechanism. Chinese J. Comput., 32: 2187-2199.
    Direct Link    


  • Lang, B., 2010. Access control oriented quantified trust degree representation model for distributed systems. J. Commun., 31: 45-54.
    Direct Link    


  • Li, Z.Y. and R.C. Wang, 2012. A Dynamic Secure Trust Model for Mobile P2P Networks. Acta Electron. Sinica, 1: 1-7.
    Direct Link    


  • Ren, W., M. Lei and Y.M. Yang, 2012. Dynami-cal and robust trust model for software service in cloud computing. J. Chinese Comput. Sys., 4: 679-683.
    Direct Link    


  • Shao, K., F. Luo, N.X. Mei and Z.T. Liu, 2012. Normal distribution based dynamical recommendation trust model. J. Software, 12: 3130-3148.
    Direct Link    


  • Wang,Y., G.P. Dai, Z.T. Jiang, Y.R, Hou, J. Fang, and X.T. Ren, 2009. A trust enhanced service compo sition scheduling algorithm. J. Acta Electron. Sinica, 10: 2234-2238.
    Direct Link    


  • Zhang, R.L., X.N. Wu, S.Y. Zhou, and X.S. Dong, 2009. A trust model based on behaviors risk evaluation. Chinese J. Comput., 4: 688-698.
    Direct Link    

  • © Science Alert. All Rights Reserved