期刊文献+

Credibility protection for resource sharing and collaborating in non-center network computing environments

Credibility protection for resource sharing and collaborating in non-center network computing environments
原文传递
导出
摘要 Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently. Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently.
出处 《The Journal of China Universities of Posts and Telecommunications》 EI CSCD 2014年第3期46-55,共10页 中国邮电高校学报(英文版)
基金 supported by the National Natural Science Foundation of China(61202004)
关键词 non-center network computing AGENT CREDIBILITY EVIDENCE non-center network computing, agent, credibility, evidence
  • 相关文献

参考文献5

二级参考文献18

  • 1盛秋戬,赵志崑,刘少辉,史忠植.多主体团队交互协议[J].软件学报,2004,15(5):689-696. 被引量:15
  • 2汪伦伟,廖湘科,王怀民.认证可信度理论研究[J].计算机研究与发展,2005,42(3):501-506. 被引量:8
  • 3蒋伟进,王璞.基于MAS的复杂系统分布式求解策略与推理研究[J].计算机研究与发展,2006,43(9):1615-1623. 被引量:15
  • 4Rigney C, Rubens A, Simpson W, et al. Remote Authentication Dial In User Service(RADIUS)[S]. IETF, RFC 2138. April 1997.
  • 5Neuman C,Yu T, Hartman S, et al. The Kerberos Network Au thentication Service(V5)[S]. IETF,RFC 4120. July 2005.
  • 6Beth T,Borcherding M,Klein 13. Valuation of trust in open systems[C]// Gollmann D, ed. ESORICS' 94, Lecture Notes in Computer Science. vol. 875. Berlin: Sringer-Verlag, 1994 : 3-18.
  • 7Maurer U. Modelling a Public-Key Infrastructure Proc[C]// Bertino E,ed. 1996 European Symposium on Research in Computer Security(ESORICS' 96). Lecture Notes in Computer Science. vol. 1146, Berlin.. Springer-Verlag, 1996 : 325-350.
  • 8Zhang Ming-de, Zheng Xue-feng, Yang Wen-sheng, et al. Research on Model of Trust Degrees for PKI[C]//The Fifth International Conference on Information Assurance and Security(IAS 2009). Volumes II. Xi'an, China, 2009 : 647-650.
  • 9Yahalom R, Klein B, Beth T. Trust Relationships in Secure Systems-A Distributed Authentication Perspective[C]//Proc. IEEE Symp on Research in Security and Privacy. 1993..150-164.
  • 10Dierks T, Rescorla E. The Transport Layer Security(TLS) Protocol Version 1.1[S]. IETF,RFC 4346. April 2006.

共引文献389

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部