Trustworthy service composition is an extremely important task when service composition becomes infeasible or even fails in an environment which is open,autonomic,uncertain and deceptive.This paper presents a trustwor...Trustworthy service composition is an extremely important task when service composition becomes infeasible or even fails in an environment which is open,autonomic,uncertain and deceptive.This paper presents a trustworthy service composition method based on an improved Cross generation elitist selection,Heterogeneous recombination,Catacly-smic mutation(CHC) Trustworthy Service Composition Method(CHC-TSCM) genetic algorithm.CHCTSCM firstly obtains the total trust degree of the individual service using a trust degree measurement and evaluation model proposed in previous research.Trust combination and computation then are performed according to the structural relation of the composite service.Finally,the optimal trustworthy service composition is acquired by the improved CHC genetic algorithm.Experimental results show that CHC-TSCM can effectively solve the trustworthy service composition problem.Comparing with GODSS and TOCSS,this new method has several advantages:1) a higher service composition successrate;2) a smaller decline trend of the service composition success-rate,and 3) enhanced stability.展开更多
Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,num...Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance.展开更多
This paper analyzes the threat of TCG Software Stack(TSS)/TCM Service Module(TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism.In addition,this paper puts forward a dynamic p...This paper analyzes the threat of TCG Software Stack(TSS)/TCM Service Module(TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism.In addition,this paper puts forward a dynamic priority task scheduling strategy based on value evaluation to handle this threat.The strategy is based on the implementation features of trusted hardware and establishes a multi-level ready queue.In this strategy,an algorithm for real-time value computing is also designed,and it can adjust the production curves of the real time value by setting parameters in different environment,thus enhancing its adaptability,which is followed by scheduling and algorithm description.This paper also implements the algorithm and carries out its performance optimization.Due to the experiment result from Intel NUC,it is shown that TSS based on advanced DPTSV is able to solve the problem of deadlock with no negative influence on performance and security in multi-user environment.展开更多
In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibili...In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibility as the weight of the quality of service, then calculates the trust service quality T-QoS for each service, making the service composition situated in a credible environment. Through the establishment on a per-service T-QoS initialization pheromone matrix, we can reduce the colony's initial search time. By modifying the pheromone updating rules and introducing two ant colonies to search from different angles in parallel,we can avoid falling into the local optimal solution, and quickly find the optimal combination of global solutions. Experiments show that our approach can combine high-quality services and the improvement of the operational success rate. Also, the convergence rate and the accuracy of optimal combination are improved.展开更多
A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid entity is trusted in the soft platform when its feature of image...A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid entity is trusted in the soft platform when its feature of image root is entirely matched with that from the other entities' feature database in a scale space process.To recognize and detect the stable image root feature,the non-homogeneous linear expandable scale space is proposed.Focusing on relations between the scale parameter of the inhomogeneous Gaussian function terms and the space evolution of thermal diffusion homogeneous equations,three space evolution operators are constructed to exact and mark the feature from image root.Analysis and verification are carried on the new scale space,operators and the core of making decisions for grid entities certifications.展开更多
The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure...The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions.Because of these characteristics,the blockchain is suitable for solving certain open problems in the service-oriented social network,where the unreliability of submitted reviews of service vendors can cause serious security problems.To solve the unreliability problems of submitted reviews,this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model.The new trusted service evaluation model consists of the blockchain-based identity authentication scheme,evaluation submission module,and evaluation publicity module.In the proposed evaluation model,only users who have successfully been authenticated can submit reviews to service vendors.The registration and authentication records of users’identity and the reviews for service vendors are all stored in the blockchain network.The security analysis shows that this model can ensure the credibility of users’reviews for service vendors,and other users can obtain credible reviews of service vendors via the review publicity module.The experimental results also show that the proposed model has a lower review submission delay than other models.展开更多
基金supported by the National Natural Science Foundation of China under Grants No.61272063,No.61300129,No.61273216,No.61202048,No.61100054the Excellent Youth Foundation of Hunan Scientific Committee under Grant No.11JJ1011+2 种基金the Hunan Provincial Natural Science Foundation of China under Grant No.12JJB009Scientific Research Fund of Hunan Provincial Education Department of China under Grants No.09K085,No.12K105the Zhejiang Provincial Natural Science Foundation of China under Grant No.LQ12F02011
文摘Trustworthy service composition is an extremely important task when service composition becomes infeasible or even fails in an environment which is open,autonomic,uncertain and deceptive.This paper presents a trustworthy service composition method based on an improved Cross generation elitist selection,Heterogeneous recombination,Catacly-smic mutation(CHC) Trustworthy Service Composition Method(CHC-TSCM) genetic algorithm.CHCTSCM firstly obtains the total trust degree of the individual service using a trust degree measurement and evaluation model proposed in previous research.Trust combination and computation then are performed according to the structural relation of the composite service.Finally,the optimal trustworthy service composition is acquired by the improved CHC genetic algorithm.Experimental results show that CHC-TSCM can effectively solve the trustworthy service composition problem.Comparing with GODSS and TOCSS,this new method has several advantages:1) a higher service composition successrate;2) a smaller decline trend of the service composition success-rate,and 3) enhanced stability.
文摘Handling service access in a cloud environment has been identified as a critical challenge in the modern internet world due to the increased rate of intrusion attacks.To address such threats towards cloud services,numerous techniques exist that mitigate the service threats according to different metrics.The rule-based approaches are unsuitable for new threats,whereas trust-based systems estimate trust value based on behavior,flow,and other features.However,the methods suffer from mitigating intrusion attacks at a higher rate.This article presents a novel Multi Fractal Trust Evaluation Model(MFTEM)to overcome these deficiencies.The method involves analyzing service growth,network growth,and quality of service growth.The process estimates the user’s trust in various ways and the support of the user in achieving higher service performance by calculating Trusted Service Support(TSS).Also,the user’s trust in supporting network stream by computing Trusted Network Support(TNS).Similarly,the user’s trust in achieving higher throughput is analyzed by computing Trusted QoS Support(TQS).Using all these measures,the method adds the Trust User Score(TUS)value to decide on the clearance of user requests.The proposed MFTEM model improves intrusion detection accuracy with higher performance.
基金supported by the State Key Program of National Natural Science Foundation of China(Grant No.91118003)the National Natural Science Foundation of China(Grant No.61173138,61272452,61332019)+1 种基金the National Basic Research Program of China("973"Program)(Grant No.2014CB340600)the National High-Tech Research and Development Program of China("863"Program)(Grant No.2015AA016002)
文摘This paper analyzes the threat of TCG Software Stack(TSS)/TCM Service Module(TSM) deadlock in multi-user environment such as cloud and discusses its causes and mechanism.In addition,this paper puts forward a dynamic priority task scheduling strategy based on value evaluation to handle this threat.The strategy is based on the implementation features of trusted hardware and establishes a multi-level ready queue.In this strategy,an algorithm for real-time value computing is also designed,and it can adjust the production curves of the real time value by setting parameters in different environment,thus enhancing its adaptability,which is followed by scheduling and algorithm description.This paper also implements the algorithm and carries out its performance optimization.Due to the experiment result from Intel NUC,it is shown that TSS based on advanced DPTSV is able to solve the problem of deadlock with no negative influence on performance and security in multi-user environment.
基金supported by the National Natural Science Foundation of China(6140224161170065+13 种基金61373017611710536110319561203217612011636120200461202354)Scientific&Technological Support Project(Industry)of Jiangsu Province(BE2012183BE2012755)Natural Science Key Fund for Colleges and Universities of Jiangsu Province(11KJA52000112KJA520002)the Natural Science Fund for Colleges and Universities of Jiangsu Province(13KJB520017)Scientific Research&Industry Promotion Project for Higher Education Institutions(JHB2012-7)the Priority Academic Program Development of Jiangsu Higher Education Institutions(PAPD)(yx002001)
文摘In order to make cloud users get credible, high-quality composition of services, the trust quality of service aware(TQoS-aware) based parallel ant colony algorithm is proposed. Our approach takes the service credibility as the weight of the quality of service, then calculates the trust service quality T-QoS for each service, making the service composition situated in a credible environment. Through the establishment on a per-service T-QoS initialization pheromone matrix, we can reduce the colony's initial search time. By modifying the pheromone updating rules and introducing two ant colonies to search from different angles in parallel,we can avoid falling into the local optimal solution, and quickly find the optimal combination of global solutions. Experiments show that our approach can combine high-quality services and the improvement of the operational success rate. Also, the convergence rate and the accuracy of optimal combination are improved.
基金Foundation item: Supported by the National Natural Science Foundation (61070151,60903203,61103246)the Natural Science Foundation of Fujian Province (2010J01353)+1 种基金the Xiamen University of Technology Scientific Research Foundation (YKJ11024R)Xiamen Scientific Research Foundation (3502Z20123037)
文摘A new authentication algorithm for grid identity trusted computing unlimited by hardware is presented;the trusted root is made as an image data.The grid entity is trusted in the soft platform when its feature of image root is entirely matched with that from the other entities' feature database in a scale space process.To recognize and detect the stable image root feature,the non-homogeneous linear expandable scale space is proposed.Focusing on relations between the scale parameter of the inhomogeneous Gaussian function terms and the space evolution of thermal diffusion homogeneous equations,three space evolution operators are constructed to exact and mark the feature from image root.Analysis and verification are carried on the new scale space,operators and the core of making decisions for grid entities certifications.
文摘The blockchain,with its key characteristics of decentralization,persistence,anonymity,and auditability,has become a solution to overcome the overdependence and lack of trust for a traditional public key infrastructure on third-party institutions.Because of these characteristics,the blockchain is suitable for solving certain open problems in the service-oriented social network,where the unreliability of submitted reviews of service vendors can cause serious security problems.To solve the unreliability problems of submitted reviews,this paper first proposes a blockchain-based identity authentication scheme and a new trusted service evaluation model by introducing the scheme into a service evaluation model.The new trusted service evaluation model consists of the blockchain-based identity authentication scheme,evaluation submission module,and evaluation publicity module.In the proposed evaluation model,only users who have successfully been authenticated can submit reviews to service vendors.The registration and authentication records of users’identity and the reviews for service vendors are all stored in the blockchain network.The security analysis shows that this model can ensure the credibility of users’reviews for service vendors,and other users can obtain credible reviews of service vendors via the review publicity module.The experimental results also show that the proposed model has a lower review submission delay than other models.