Change search
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf
A cloud theory-based trust computing model in social networks
Shandong Normal University, CHI.
Shandong Normal University, CHI.
UC Davis, USA.
Shandong Normal University, CHI.
Show others and affiliations
2017 (English)In: Entropy, ISSN 1099-4300, Vol. 19, no 1, article id 11Article in journal (Refereed) Published
Abstract [en]

How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The node trust is divided into reputation trust and transaction trust. In addition, evaluation methods are designed, respectively. Firstly, the two-dimension trust cloud evaluation model is designed based on node's comprehensive and trading experience to determine the reputation trust. The expected value reflects the average trust status of nodes. Then, entropy and hyper-entropy are used to describe the uncertainty of trust. Secondly, the calculation methods of the proposed direct transaction trust and the recommendation transaction trust involve comprehensively computation of the transaction trust of each node. Then, the choosing strategies were designed for node to trade based on trust cloud. Finally, the results of a simulation experiment in P2P network file sharing on an experimental platform directly reflect the objectivity, accuracy and robustness of the proposed model, and could also effectively identify the malicious or unreliable service nodes in the system. In addition, this can be used to promote the service reliability of the nodes with high credibility, by which the stability of the whole network is improved. © 2016 by the authors.

Place, publisher, year, edition, pages
MDPI, 2017. Vol. 19, no 1, article id 11
Keywords [en]
Cloud model, Reputation trust, Social network, Transaction trust, Trust evaluation
National Category
Other Computer and Information Science
Identifiers
URN: urn:nbn:se:bth-13830DOI: 10.3390/e19010011ISI: 000392978500011Scopus ID: 2-s2.0-85009241681OAI: oai:DiVA.org:bth-13830DiVA, id: diva2:1068370
Note

Open access

Available from: 2017-01-25 Created: 2017-01-25 Last updated: 2024-04-10Bibliographically approved

Open Access in DiVA

No full text in DiVA

Other links

Publisher's full textScopus

Authority records

Johnson, Henric

Search in DiVA

By author/editor
Johnson, Henric
By organisation
Department of Computer Science and Engineering
Other Computer and Information Science

Search outside of DiVA

GoogleGoogle Scholar

doi
urn-nbn

Altmetric score

doi
urn-nbn
Total: 154 hits
CiteExportLink to record
Permanent link

Direct link
Cite
Citation style
  • apa
  • ieee
  • modern-language-association-8th-edition
  • vancouver
  • Other style
More styles
Language
  • de-DE
  • en-GB
  • en-US
  • fi-FI
  • nn-NO
  • nn-NB
  • sv-SE
  • Other locale
More languages
Output format
  • html
  • text
  • asciidoc
  • rtf