The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the...The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the method, applicable neural network structure, neural network construc ting, input standardization, training sample constructing, and the procedure of evaluating trust degree of Web services with trained neural network are described. Experiments show that it is feasible and effective to evaluate trust degree of Web Service with neural network.展开更多
Grid Computing is concerned with the sharing and coordinated use of diverse resources in distributed Virtual Organizations. This introduces various challenging security issues. Among these trusting, the resources to b...Grid Computing is concerned with the sharing and coordinated use of diverse resources in distributed Virtual Organizations. This introduces various challenging security issues. Among these trusting, the resources to be shared and coordinated with the dynamic and multi-institutional virtual organization environment becomes a challenging security issue. In this paper, an approach for trust assessment and trust degree calculation using subjective logic is suggested to allocate the Data Grid or Computational Grid user a reliable, trusted resource for maintaining the integrity of the data with fast response and accurate results. The suggested approach is explained using an example scenario and also from the simulation results. It is observed that there is an increase in the resource utilization of a trusted resource in contrast to the resource which is not trusted.展开更多
针对属性值为区间值概率不确定语言术语集(interval-valued probabilistic uncertain linguistic term set, IVPULTS)、专家权重未知的多属性群决策问题,提出一种融合距离和相似度的决策方法。首先,由于现有的IVPULTS中元素的无序性导...针对属性值为区间值概率不确定语言术语集(interval-valued probabilistic uncertain linguistic term set, IVPULTS)、专家权重未知的多属性群决策问题,提出一种融合距离和相似度的决策方法。首先,由于现有的IVPULTS中元素的无序性导致距离测度及决策结果不唯一,利用区间优势度方法对区间值概率进行排序,从而形成有序的IVPULTS;同时考虑到现有距离测度区分能力不高,利用不确定语言距离度量方法扩充现有距离公式。其次,基于距离与相似测度存在的对偶关系,为IVPULTS定义了距离相似度公式,并利用改进的相似—信任网络分析法确定不同专家的权重。再次,设计了基于改进距离和相似—信任网络的TOPSIS决策方法(improved distance and similarity-trust network TOPSIS,IDSTN-TOPSIS),从而得到唯一且稳定的方案排序。最后,以新冠疫情下某医疗用品制造公司熔喷布弹性供应商选择为例,验证了所提方法的有效性和优越性。展开更多
The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to ...The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks.展开更多
基金Supported by the National Natural Science Foun-dation of China(60403027)the Natural Science Foundation of HubeiProvince (2005ABA258) the Open Foundation of State Key Labora-tory of Software Engineering(SKLSE05-07)
文摘The concept and definition of trust degree of Web service is given. Evaluating trust degree of Web services with the method of neural network from the aspect of trust history sequence is proposed. The principle of the method, applicable neural network structure, neural network construc ting, input standardization, training sample constructing, and the procedure of evaluating trust degree of Web services with trained neural network are described. Experiments show that it is feasible and effective to evaluate trust degree of Web Service with neural network.
文摘Grid Computing is concerned with the sharing and coordinated use of diverse resources in distributed Virtual Organizations. This introduces various challenging security issues. Among these trusting, the resources to be shared and coordinated with the dynamic and multi-institutional virtual organization environment becomes a challenging security issue. In this paper, an approach for trust assessment and trust degree calculation using subjective logic is suggested to allocate the Data Grid or Computational Grid user a reliable, trusted resource for maintaining the integrity of the data with fast response and accurate results. The suggested approach is explained using an example scenario and also from the simulation results. It is observed that there is an increase in the resource utilization of a trusted resource in contrast to the resource which is not trusted.
文摘针对属性值为区间值概率不确定语言术语集(interval-valued probabilistic uncertain linguistic term set, IVPULTS)、专家权重未知的多属性群决策问题,提出一种融合距离和相似度的决策方法。首先,由于现有的IVPULTS中元素的无序性导致距离测度及决策结果不唯一,利用区间优势度方法对区间值概率进行排序,从而形成有序的IVPULTS;同时考虑到现有距离测度区分能力不高,利用不确定语言距离度量方法扩充现有距离公式。其次,基于距离与相似测度存在的对偶关系,为IVPULTS定义了距离相似度公式,并利用改进的相似—信任网络分析法确定不同专家的权重。再次,设计了基于改进距离和相似—信任网络的TOPSIS决策方法(improved distance and similarity-trust network TOPSIS,IDSTN-TOPSIS),从而得到唯一且稳定的方案排序。最后,以新冠疫情下某医疗用品制造公司熔喷布弹性供应商选择为例,验证了所提方法的有效性和优越性。
文摘The wide application of intelligent terminals in microgrids has fueled the surge of data amount in recent years.In real-world scenarios,microgrids must store large amounts of data efficiently while also being able to withstand malicious cyberattacks.To meet the high hardware resource requirements,address the vulnerability to network attacks and poor reliability in the tradi-tional centralized data storage schemes,this paper proposes a secure storage management method for microgrid data that considers node trust and directed acyclic graph(DAG)consensus mechanism.Firstly,the microgrid data storage model is designed based on the edge computing technology.The blockchain,deployed on the edge computing server and combined with cloud storage,ensures reliable data storage in the microgrid.Secondly,a blockchain consen-sus algorithm based on directed acyclic graph data structure is then proposed to effectively improve the data storage timeliness and avoid disadvantages in traditional blockchain topology such as long chain construction time and low consensus efficiency.Finally,considering the tolerance differences among the candidate chain-building nodes to network attacks,a hash value update mechanism of blockchain header with node trust identification to ensure data storage security is proposed.Experimental results from the microgrid data storage platform show that the proposed method can achieve a private key update time of less than 5 milliseconds.When the number of blockchain nodes is less than 25,the blockchain construction takes no more than 80 mins,and the data throughput is close to 300 kbps.Compared with the traditional chain-topology-based consensus methods that do not consider node trust,the proposed method has higher efficiency in data storage and better resistance to network attacks.