scholarly journals Research of vehicular cloud storage resource management based on trust mechanism

2021 ◽  
Vol 17 (3) ◽  
pp. 155014772110063
Author(s):  
Jin Wang ◽  
Miao Zhang ◽  
Xiang Gu ◽  
Tiequan Wang ◽  
Jie Wang ◽  
...  

This article focuses on how to effectively make full use of the storage resources in vehicular cloud. A trust mechanism called DI-Trust (Trust Model Based on Dynamic Incentive Mechanism) is proposed to schedule vehicular cloud storage resource. The discussion is under the scenario of the parking lot where vehicle nodes are in static state. The model can reasonably arrange the suitable scheduling algorithm according to the attribute characteristics of different kind of service requirements. The trust value of a vehicle is updated according to the model to fully utilize the vehicle idle storage resources. The simulation experiment results show that the model can work effectively. It can objectively evaluate trust values of vehicle nodes, and construct the effective resource schedule of the vehicular cloud storage resource to meet needs from users.

2014 ◽  
Vol 2014 ◽  
pp. 1-10 ◽  
Author(s):  
Yan Gao ◽  
Wenfen Liu

With the rapid development and application of medical sensor networks, the security has become a big challenge to be resolved. Trust mechanism as a method of “soft security” has been proposed to guarantee the network security. Trust models to compute the trustworthiness of single node and each path are constructed, respectively, in this paper. For the trust relationship between nodes, trust value in every interval is quantified based on Bayesian inference. A node estimates the parameters of prior distribution by using the collected recommendation information and obtains the posterior distribution combined with direct interactions. Further, the weights of trust values are allocated through using the ordered weighted vector twice and overall trust degree is represented. With the associated properties of Tsallis entropy, the definition of path Tsallis entropy is put forward, which can comprehensively measure the uncertainty of each path. Then a method to calculate the credibility of each path is derived. The simulation results show that the proposed models can correctly reflect the dynamic of node behavior, quickly identify the malicious attacks, and effectively avoid such path containing low-trust nodes so as to enhance the robustness.


2011 ◽  
Vol 308-310 ◽  
pp. 1740-1745 ◽  
Author(s):  
Xiao Lan Xie ◽  
Liang Liu ◽  
Ying Zhong Cao

Aiming at the existing trust issues under manufacturing environment. This paper proposes a trust model based on feedback evaluation, TMBFCM, from the characteristics of human of trust relationship of human society. The model proposed a set of evaluation indicators of cloud manufacturing services properties, introduced the dynamic trust mechanism for attenuation by time,established the service which cloud manufacturing services providers provided and the feedback evaluation and incentive mechanism given by the user of cloud manufacturing service, improved the dynamic adaptability of the model. The results show that, compared with the existing trust model, the evaluation results are closer to the true service behavior of cloud manufacturing services provider, it can resist all kinds of malicious attacks acts effectively, demonstrated good robustness and recognition.


Author(s):  
Antony Brown ◽  
Paul Sant ◽  
Nik Bessis ◽  
Tim French ◽  
Carsten Maple

Current developments in grid and service oriented technologies involve fluid and dynamic, ad hoc based interactions between delegates, which in turn, serves to challenge conventional centralised structured trust and security assurance approaches. Delegates ranging from individuals to large-scale VO (Virtual Organisations) require the establishment of trust across all parties as a prerequisite for trusted and meaningful e-collaboration. In this paper, a notable obstacle, namely how such delegates (modelled as nodes) operating within complex collaborative environment spaces can best evaluate in context to optimally and dynamically select the most trustworthy ad hoc based resource/service for e-consumption. A number of aggregated service case scenarios are herein employed in order to consider the manner in which virtual consumers and provider ad hoc based communities converge. In this paper, the authors take the view that the use of graph-theoretic modelling naturally leads to a self-led trust management decision based approach in which delegates are continuously informed of relevant up-to-date trust levels. This will lead to an increased confidence level, which trustful service delegation can occur. The key notion is of a self-led trust model that is suited to an inherently low latency, decentralised trust security paradigm.


Author(s):  
Yong Wang ◽  
Xiaoling Tao ◽  
Feng Zhao ◽  
Bo Tian ◽  
Akshita Maradapu Vera Venkata Sai

AbstractCloud computing is a novel computing paradigm, which connects plenty of computing resources and storage resources via Internet. Cloud computing provides a number of high-quality services, such as cloud storage, outsourcing computing, and on-demand self-service, which have been widely accepted by the public. In cloud computing, by submitting their tasks to cloud, plenty of applications share huge computation and storage resources. However, how to schedule resource efficiently is a big challenge in cloud computing.In this paper, we propose a SLA-aware resource algorithm to enable cloud storage more efficiently. In our scheme, we take advantage of the back-end node space utilization and I/O throughput comprehensively simultaneously. We compare and contrast the existing scheduling storage policies by implementing those algorithms. The extensive tests show that our algorithm achieves a considerable improvement in terms of violation rate and the number of used hosts.


2017 ◽  
Vol 98 (4) ◽  
pp. 3527-3547 ◽  
Author(s):  
Smita Singh ◽  
Sarita Negi ◽  
Shashi Kant Verma

2013 ◽  
Vol 397-400 ◽  
pp. 1949-1953 ◽  
Author(s):  
Feng Li ◽  
Ya Li Si

Trust mechanism has been identified as one of key areas in the field of Internet security. Our objective in this paper is to develop a dynamic trust evaluation model for Internet computing. The proposed scheme divides the recommendation trust into the direct recommendation trust and the indirect recommendation trust, and considers variety of factors to calculate the two types of recommendation trust degree. Simulation results show that, compared to the existing trust model, the model can effectively improve the accuracy of trust evaluation, and provide a better capacity of resisting malicious entities.


2013 ◽  
Vol 278-280 ◽  
pp. 1962-1965
Author(s):  
Song Fei ◽  
Xiao Jing Wang ◽  
Zhe Cui

Proposed a new trust model based on P2P technology in the cloud computing environment. The model takes into account more than one cloud computing platform, that is, considering the different cloud computing service provider provide the service of a cross-cloud platform. Such cross-platform cloud (Cross Cloud) can be called the composite cloud computing platform or cloud associated cloud computing platform.The nodes in the cloud computing environment are divided into two categories: customers and providers. According to the different roles of these two nodes, we designed a different trust mechanism, to divide the trust domain with independent single cloud, considered node independence and manageability of domain to process trust choice and trust update, and proposed a new kind of cloud computing service - trust recommendation service.


Author(s):  
Santhana Lakshmi M ◽  
Hemaanand M

Delay Tolerant Network is designed for long distance communication where end-to-end connectivity is not established due to frequent disconnections or delay. Long latency is encountered in this type of network. This work proposes a reliable model for secure communication in DTN that aims to achieve correct estimation of trust value between the nodes and to minimize the relay rate i.e cost involved in the message transmission with minimum delay based on the history of ownership of information. In this model, we have used data driven approach so that the malicious or selfish nodes are prevented from consuming more resources in the resource constrained network environment. This approach checks the trustworthiness of the source of information. This work adopts computing based approach to evaluate the performance of the proposed model using fuzzy logic. We conduct two comparative analyses in which one compares the four variants of the proposed model to find the best variant of the proposed model and other compares our trust model with the other existing trust models to prove the efficiency of our model over other routing protocols.


Sign in / Sign up

Export Citation Format

Share Document