scholarly journals Analysis on trust influencing factors and trust model from multiple perspectives of online Auction

Open Physics ◽  
2017 ◽  
Vol 15 (1) ◽  
pp. 613-619 ◽  
Author(s):  
Wang Yu

AbstractCurrent reputation models lack the research on online auction trading completely so they cannot entirely reflect the reputation status of users and may cause problems on operability. To evaluate the user trust in online auction correctly, a trust computing model based on multiple influencing factors is established. It aims at overcoming the efficiency of current trust computing methods and the limitations of traditional theoretical trust models. The improved model comprehensively considers the trust degree evaluation factors of three types of participants according to different participation modes of online auctioneers, to improve the accuracy, effectiveness and robustness of the trust degree. The experiments test the efficiency and the performance of our model under different scale of malicious user, under environment like eBay and Sporas model. The experimental results analysis show the model proposed in this paper makes up the deficiency of existing model and it also has better feasibility.

Author(s):  
Barath Kumar R ◽  
Stalin Alex

The immovable nature of passing on packages through multi -bounce middle hubs is a critical problem in the versatile impromptu organizations (MANETs). The disseminated versatile hubs set up associations with structure the MANET, which may incorporate childish and getting into mischief hubs. Suggestion based trust the board is proposed in the creating as a system to evaluate through the acting up hubs while looking for a bundle conveyance course. Nonetheless, building a trust model that embraces suggestions by different hubs in the organization is a difficult issue because of the danger of deceptive proposals like reviling, voting form stuffing, and conspiracy. we examines the issues identified with assaults presented by getting rowdy hubs while proliferating suggestions in the current trust models. We propose a suggestion based trust model with a safeguard plot, which uses grouping method to progressively sift through assaults identified with exploitative proposals between certain time dependent on number of collaborations, similarity of data and closeness between the hubs. We evaluate the trust degree as two cases like direct and indirect trust values between neighboring nodes from source. To form a clustering routing network from similar trust values from S to D.The model is experimentally tried under a few portable and detached geographies in which hubs experience changes in their local prompting regular course changes. The observational investigation shows heartiness and exactness of the trust model in a dynamic MANET climate.


2011 ◽  
Vol 1 ◽  
pp. 52-56 ◽  
Author(s):  
Xin Fei Liao

Trust management is now one of the interesting research topics in the field of web security. Firstly, several existing trust models are analyzed. Aiming at flaws of these models, the subject trust model based on fuzzy comprehensive evaluation is proposed, thus solving the evaluation problem of subjects trust degree in trust model. An effective evaluation strategy for trust degree vector of subject trust model is given. Finally, a concrete example is provided and has proved the rationality and feasibility of the model.


2011 ◽  
Vol 58-60 ◽  
pp. 153-157
Author(s):  
Huai Hu Cao ◽  
Yan Mei Zhang ◽  
Jian Ming Zhu

Trust plays an important role in the development and implementation of P2P e-commerce systems. This paper proposes a novel Trust Evaluating Model Based on Reputation with Multifactor. By introducing many comprehensive trust factors in computing trust level and improving the computing methods of the local reputation and global reputation, this model can not only accurately reflect the node’s trust level, but also reduce the time complexity in computing trust level. Experimental results show that the trust model can improve the rate of successful trading compared with the existing trust models, and can be effectively applied to the P2P e-commerce system.


Entropy ◽  
2016 ◽  
Vol 19 (1) ◽  
pp. 11 ◽  
Author(s):  
Fengming Liu ◽  
Xiaoqian Zhu ◽  
Yuxi Hu ◽  
Lehua Ren ◽  
Henric Johnson

2021 ◽  
Vol 13 (4) ◽  
pp. 24-36
Author(s):  
Srinivasan Palanisamy ◽  
Sankar S. ◽  
Ramasubbareddy Somula ◽  
Ganesh Gopal Deverajan

Wireless sensor networks (WSN) deployed in open environments make nodes prone to various security attacks due to their resource constrained nature. The compromised nodes are used to mislead the sensed data and disrupt communication, which can affect the entire decision-making system based on the sensed data. It is also possible to drain the sensor nodes energy and reduce the battery life of the networks. Trust models are the preferred mechanism to secure WSN. In this paper, the authors present communication trust and energy aware (CTEA) routing protocol that make use of the proposed trust model to mitigate the effects of badmouth and energy drain attacks. They use Dempster theory to compute communication trust and also consider the energy metric, to establish the route for data transfer. The simulation result shows that the proposed trust model increases the packet delivery ratio, residual energy, and network lifetime by mitigating the nodes misbehaviour in presence of energy drain and bad mouth attacks.


Author(s):  
Anshu Devi ◽  
Ramesh Kait ◽  
Virender Ranga

Fog computing is a term coined by networking giant Cisco. It is a new paradigm that extends the cloud computing model by conferring computation, storage, and application services at the periphery of networks. Fog computing is a gifted paradigm of cloud computing that facilitates the mobility, portability, heterogeneity, and processing of voluminous data. These distinct features of fog help to reduce latency and make it suitable for location-sensitive applications. Fog computing features raise new security concerns and challenges. The existing cloud security has not been implemented directly due to mobility, heterogeneity of fog nodes. As we know, IoT has to process large amount of data quickly; therefore, it has various functionality-driven applications that escalate security concerns. The primary aim of this chapter is to present the most recent security aspects such as authentication and trust, reputation-based trust model, rogue fog node and authentication at different level, security threats, challenges, and also highlights the future aspects of fog.


2008 ◽  
Vol 400-402 ◽  
pp. 287-293
Author(s):  
Li Zhong Jiang ◽  
Lin Lin Sun ◽  
Xing Li

Based on the theoretical analysis of steel-concrete composite П-beam’s lateral buckling, the computing model and simplified computing model on the stability of composite П-beams are brought forward. According to above two models, composite beam’s lateral buckling is studied in negative moment regions using the energy method, and the formulas which are used to calculate critical bending moment in negative moment regions in the elastic stage are deduced. Compared with other stability theories and methods, this paper represents the design correction and suggestion about the stability of composite П-beam in negative bending regions. Moreover, the simplified calculation method, which is used to compute the lateral critical buckling moment of steel-concrete composite П-beam loaded by equal-end moment, not only simplifies the computing process, the computing results also have the equivalent accuracy with numerical computing methods.


Sign in / Sign up

Export Citation Format

Share Document