A Cloud Theory-Based Trust Computing Model in Social Networks

How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the tran...

Full description

Bibliographic Details
Main Authors: Fengming Liu, Xiaoqian Zhu, Yuxi Hu, Lehua Ren, Henric Johnson
Format: Article
Language:English
Published: MDPI AG 2016-12-01
Series:Entropy
Subjects:
Online Access:http://www.mdpi.com/1099-4300/19/1/11
_version_ 1798041321328345088
author Fengming Liu
Xiaoqian Zhu
Yuxi Hu
Lehua Ren
Henric Johnson
author_facet Fengming Liu
Xiaoqian Zhu
Yuxi Hu
Lehua Ren
Henric Johnson
author_sort Fengming Liu
collection DOAJ
description How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.
first_indexed 2024-04-11T22:19:55Z
format Article
id doaj.art-2cd56403f2d24a7f8848ed23ec14de34
institution Directory Open Access Journal
issn 1099-4300
language English
last_indexed 2024-04-11T22:19:55Z
publishDate 2016-12-01
publisher MDPI AG
record_format Article
series Entropy
spelling doaj.art-2cd56403f2d24a7f8848ed23ec14de342022-12-22T04:00:12ZengMDPI AGEntropy1099-43002016-12-011911110.3390/e19010011e19010011A Cloud Theory-Based Trust Computing Model in Social NetworksFengming Liu0Xiaoqian Zhu1Yuxi Hu2Lehua Ren3Henric Johnson4School of Management Science and Engineering, Shandong Normal University, Ji’nan 250014, ChinaSchool of Management Science and Engineering, Shandong Normal University, Ji’nan 250014, ChinaComputer Science Faculty, The University of California at Davis, One Shields Ave., Davis, CA 95616, USASchool of Management Science and Engineering, Shandong Normal University, Ji’nan 250014, ChinaFaculty of Computer Sciences, Blekinge Institute of Technology, 37141 Karlskrona, SwedenHow to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.http://www.mdpi.com/1099-4300/19/1/11social networkcloud modeltrust evaluationreputation trusttransaction trust
spellingShingle Fengming Liu
Xiaoqian Zhu
Yuxi Hu
Lehua Ren
Henric Johnson
A Cloud Theory-Based Trust Computing Model in Social Networks
Entropy
social network
cloud model
trust evaluation
reputation trust
transaction trust
title A Cloud Theory-Based Trust Computing Model in Social Networks
title_full A Cloud Theory-Based Trust Computing Model in Social Networks
title_fullStr A Cloud Theory-Based Trust Computing Model in Social Networks
title_full_unstemmed A Cloud Theory-Based Trust Computing Model in Social Networks
title_short A Cloud Theory-Based Trust Computing Model in Social Networks
title_sort cloud theory based trust computing model in social networks
topic social network
cloud model
trust evaluation
reputation trust
transaction trust
url http://www.mdpi.com/1099-4300/19/1/11
work_keys_str_mv AT fengmingliu acloudtheorybasedtrustcomputingmodelinsocialnetworks
AT xiaoqianzhu acloudtheorybasedtrustcomputingmodelinsocialnetworks
AT yuxihu acloudtheorybasedtrustcomputingmodelinsocialnetworks
AT lehuaren acloudtheorybasedtrustcomputingmodelinsocialnetworks
AT henricjohnson acloudtheorybasedtrustcomputingmodelinsocialnetworks
AT fengmingliu cloudtheorybasedtrustcomputingmodelinsocialnetworks
AT xiaoqianzhu cloudtheorybasedtrustcomputingmodelinsocialnetworks
AT yuxihu cloudtheorybasedtrustcomputingmodelinsocialnetworks
AT lehuaren cloudtheorybasedtrustcomputingmodelinsocialnetworks
AT henricjohnson cloudtheorybasedtrustcomputingmodelinsocialnetworks