A Cloud Theory-Based Trust Computing Model in Social Networks
How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the tran...
Main Authors: | , , , , |
---|---|
Format: | Article |
Language: | English |
Published: |
MDPI AG
2016-12-01
|
Series: | Entropy |
Subjects: | |
Online Access: | http://www.mdpi.com/1099-4300/19/1/11 |
_version_ | 1798041321328345088 |
---|---|
author | Fengming Liu Xiaoqian Zhu Yuxi Hu Lehua Ren Henric Johnson |
author_facet | Fengming Liu Xiaoqian Zhu Yuxi Hu Lehua Ren Henric Johnson |
author_sort | Fengming Liu |
collection | DOAJ |
description | How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved. |
first_indexed | 2024-04-11T22:19:55Z |
format | Article |
id | doaj.art-2cd56403f2d24a7f8848ed23ec14de34 |
institution | Directory Open Access Journal |
issn | 1099-4300 |
language | English |
last_indexed | 2024-04-11T22:19:55Z |
publishDate | 2016-12-01 |
publisher | MDPI AG |
record_format | Article |
series | Entropy |
spelling | doaj.art-2cd56403f2d24a7f8848ed23ec14de342022-12-22T04:00:12ZengMDPI AGEntropy1099-43002016-12-011911110.3390/e19010011e19010011A Cloud Theory-Based Trust Computing Model in Social NetworksFengming Liu0Xiaoqian Zhu1Yuxi Hu2Lehua Ren3Henric Johnson4School of Management Science and Engineering, Shandong Normal University, Ji’nan 250014, ChinaSchool of Management Science and Engineering, Shandong Normal University, Ji’nan 250014, ChinaComputer Science Faculty, The University of California at Davis, One Shields Ave., Davis, CA 95616, USASchool of Management Science and Engineering, Shandong Normal University, Ji’nan 250014, ChinaFaculty of Computer Sciences, Blekinge Institute of Technology, 37141 Karlskrona, SwedenHow to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node’s comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved.http://www.mdpi.com/1099-4300/19/1/11social networkcloud modeltrust evaluationreputation trusttransaction trust |
spellingShingle | Fengming Liu Xiaoqian Zhu Yuxi Hu Lehua Ren Henric Johnson A Cloud Theory-Based Trust Computing Model in Social Networks Entropy social network cloud model trust evaluation reputation trust transaction trust |
title | A Cloud Theory-Based Trust Computing Model in Social Networks |
title_full | A Cloud Theory-Based Trust Computing Model in Social Networks |
title_fullStr | A Cloud Theory-Based Trust Computing Model in Social Networks |
title_full_unstemmed | A Cloud Theory-Based Trust Computing Model in Social Networks |
title_short | A Cloud Theory-Based Trust Computing Model in Social Networks |
title_sort | cloud theory based trust computing model in social networks |
topic | social network cloud model trust evaluation reputation trust transaction trust |
url | http://www.mdpi.com/1099-4300/19/1/11 |
work_keys_str_mv | AT fengmingliu acloudtheorybasedtrustcomputingmodelinsocialnetworks AT xiaoqianzhu acloudtheorybasedtrustcomputingmodelinsocialnetworks AT yuxihu acloudtheorybasedtrustcomputingmodelinsocialnetworks AT lehuaren acloudtheorybasedtrustcomputingmodelinsocialnetworks AT henricjohnson acloudtheorybasedtrustcomputingmodelinsocialnetworks AT fengmingliu cloudtheorybasedtrustcomputingmodelinsocialnetworks AT xiaoqianzhu cloudtheorybasedtrustcomputingmodelinsocialnetworks AT yuxihu cloudtheorybasedtrustcomputingmodelinsocialnetworks AT lehuaren cloudtheorybasedtrustcomputingmodelinsocialnetworks AT henricjohnson cloudtheorybasedtrustcomputingmodelinsocialnetworks |