一种网构软件动态信任评估模型研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要
随着计算机技术和Internet的迅猛发展,网构软件作为一种新型的软件形态应运而生,它的形成建立在Internet环境中各个异构的软件服务实体间的联盟和有效协同。在没有中心化的管理权威可以依赖的Internet环境中,软件服务实体彼此间的相互信任对软件服务实体及其所在应用系统的安全保障和可靠运行都具有重要的意义,因此,如何对具有主体化和动态演化特点的网构软件进行动态信任评估,是我们必须面对和加以解决的难题。针对现有信任评估模型在信任的不确定性、模糊性方面刻画不足,进而影响信任评估的准确性和动态适应性的问题,作者提出了一种支持信任自动形成和更新的网构软件动态信任评估模型。
     在网构软件的动态信任评估模型研究中,本课题的主要研究工作包括:
     (1)对网构软件和现有的信任评估模型进行了研究,并分析了现有信任模型的优缺点,在此基础上提出了一种适用于网构软件的动态信任评估模型,该模型符合人类心理认知习惯。
     (2)为了反映信任的主观性、模糊性,提出了基于模糊理论的信任模糊综合评判方法,在确定各因素权重时引入信息熵理论,克服了传统方法因主观分配权重而导致信任评估模型动态自适应性不强的缺点。
     (3)在进行反馈信任聚合计算时,采用直接信任树的方法进行反馈信息的搜索与聚合,同时为了实现系统自动调节聚合计算的规模,引入了推荐层数阈值和可信任阈值。
     (4)在对直接信任度和反馈信任度进行综合计算时,引入自信系数和反馈系数两个参数自动建立和动态调整直接信任度和反馈信任度的权重。
     (5)针对行为信任的动态性,结合模糊理论中的贴近度,提出了信任更新机制,可以有效的抵制恶意推荐。
     最后采用一个多主体建模平台进行模拟实验,结果表明该模型是可行的,且具有更加稳健的动态适应性。
With the rapid development of the Internet and computer technology, Internetware emerged as a new software paradigm, which is built upon the coordination of the heterogeneous software services entities in the Internet environment. There is no centralized management authority can rely on the Internet environment, trust is an important thing for security and reliability of software services entities and systems. Therefore, how to conduct dynamic trust evaluation on Internetware, which has the characteristics of subjectivation and dynamic evolution, is a problem which we have to face and resolved.
     For the existing trust evaluation models cannot reflect the uncertainty, fuzzy of the trust relationships, thereby affecting the trust evaluation accuracy and dynamic adaptability. This paper presents a dynamic trust evaluation model for Internetware, which can support the automatic formation and update of the trust relationships among entities.
     In the research of Internetware dynamic trust evaluation model, we have done some researches as follows:
     (1) The existing trust evaluation model and Internetware have been studied, analyzed their advantages and disadvantages, then a dynamic trust evaluation model for Internetware is proposed, which is consistent with human cognitive habits.
     (2) To reflect subjective and fuzzy nature of trust, a fuzzy comprehensive evaluation method based on fuzzy theory for Internetware is proposed, in which determining the various factors weights we introduce information entropy theory. The method can overcome the shortcomings in determining the weight by the subjective judgments method, and improve dynamic adaptability of trust evaluation model, which is not strong enough as a result of subjective weight distribution by traditional methods.
     (3) In the feedback trust aggregation computation, the feedback trust information is searched by using Direct Trust Tree. At the same time, two new parameters, feedback level threshold and trust threshold, are introduced to adjust the scale of aggregating computation automatically.
     (4)In the direct trust and feedback trust comprehensive calculation, two new parameters, confidence coefficient and feedback coefficient, are introduced to establish and adjust the weight of direct trust and feedback trust automatically.
     (5) According to the dynamic character of behavior trust, a new model of trust renewal is provided, which is based on the degree of approximation in fuzzy theory, and which do better in preventing the malicious feedback.
     Finally, we use a multi-agent modeling platform for the simulation, and simulation's results show that, compared to the existing trust quantization metrics, the model in this paper is more robust on trust dynamic adaptability
引文
[1]冯玉琳,钟华.现代软件计算[M].北京:化学工业出版社,2004.
    [2]徐如志,钱乐秋等.Internet计算环境下的新型软件形态——网构软件(Internetware)综述[J].计算机工程与应用,2004,14:38-41.
    [3]杨芙清,梅宏,吕建等.浅论软件技术发展[J].电子学报,2002,30(12A):1901~1906.
    [4]王远,吕建,徐锋等.一个适用于网构软件的信任度量及演化模型[J].软件学报,2006,17(4):682~690.
    [5]王姝音.基于演化博弈的网构软件动态信任模型研究[D].哈尔滨工程大学硕士学位论文,2009.
    [6]梅宏,黄罡,赵海燕等.一种以软件体系结构为中心的网构软件开发方法[J].中国科学E辑,2006,36(10):1100~1126.
    [7]Yang FuQing, Lu Jian, Mei Hong. Technical framework for Intemetware:An architecture centric approach[J]. SCI CHINA SER F 2008,51,610-622. [6]
    [8]赵志,杨志文,史忠植.DPMAS:一种多主体系统设计方法[J].计算机工程与应用,2003,13(4):79~82.
    [9]张大鹏,王文杰,史忠植.一种基于主体的可信网构软件设计方法[J].电子学报,2011,38(11):2523~2528.
    [10]郑丽伟,金芝.需求驱动的主动网构实体聚合[J].软件学报,2008,19(5),1083~1098.
    [11]Tang, J., Zheng, L., Jin Z. Aggregation of autonomous Internetware entities[J]. Proceedings of the First Asia-Pacific Symposium on Internetware, Oct,2009.
    [12]吕建,陶先平,马晓星等.基于Agent的网构软件模型研究.中国科学E辑,2005,35(12):1233~1253.
    [13]孙文,孙熙,焦文品等.一种基于自主构件的网构软件协作框架[J].计算机研究与发展(增刊),2006,43:217~221.
    [14]孙熙,庄磊,刘文等.一种可定制的自主构件运行支撑框架[J].软件学报,2008,19(6):1340~1349.
    [15]黄唆,吴刚,马天笑等.一种情境驱动的网构软件体系架构与支撑环境[J].计算机工程与科学,2010,32(7):130~133,139.
    [16]常志明,毛新军,齐治昌等.基于Agent的网构软件构件模型及其实现 [J].软件学报,2008,19(5):1113~1124.
    [17]毛新军,李学思,尹俊文等.自适应网构软件的集成开发环境SADE[J].电子学报,2010,38(2A):207~212.
    [18]梅宏,黄罡,兰灵等.基于体系结构的网构软件自适应方法.中国科学(E辑),2008,38(6):901~920.
    [19]高俊,李长云,文志华等.面向网构软件的构件自适应机制研究.计算机应用研究,2009,26(5):1749~1753.
    [20]滕腾,黄罡,陈兴润等.网构软件数据语用的一种动态支撑方法[J].软件学报,2008,19(5):1160~1172.
    [21]吴国全,魏峻,黄涛等.基于非确定性推理的网构软件服务质量动态评估方法[J].软件学报,2008,19(5):1173~1185.
    [22]王璞巍,金芝,刘红岩.网构软件实体的功能描述及其发现[J].中国科学(F辑),2009,39(12):1271~1287.
    [23]Blaze, M., Feigenbaum, J., Lacy, J. Decentralized trust management [J]. In: Dale, J., Dinolt, G., eds. Proceedings of the 17th Symposium on Security and Privacy. Oakland, CA:IEEE Computer Society Press,1996.164-173.
    [24]Blaze, M., Feigenbaum, J., Keromytis, A.D. Keynote:trust management for public-key infrastructures[C]. In:Christianson, B., Crispo, B., William, S., et al., eds. Cambridge 1998 Security Protocols International Workshop. Berlin: Springer-Verglag,1999.59-63.
    [25]Chu, Y. H., Feigenbaum, J., LaMacchia, B., et al. REFEREE:trust management for Web applications [J]. World Wide Web Journal, 1997,2(2):127-139.
    [26]Abdul-Rahman, S. Halles:A distributed trust model[J]. In new Security Paradigms Workshop'97,1997,48-60.
    [27]T.Beth, M.Borcherding, B.Klein. Valuation of Trust in Open Network [C].In: Proceedings of the Third European Symposium on Research in Computer Security,1994,3-18.
    [28]A. J(?)sang.The right type of trust for distributed systems[C].In:Proceedings of the 1996 New Security Paradigms Workshop.1996,119-131.
    [29]A. J(?)sang. A Trust Policy Framework[C]. In:Proceedings of the 1997 International Conference on Information and Communication Security, 1997,192-202.
    [30]A. J(?)sang, S.J.Knapskog.A metric for trusted systems[C].In:Proceedings of the 21st National Information Systems Security,1998.541-549.
    [31]A. J(?)sang.A Subjective Metric of Authentication[C].In:Proceedings of the ESORICS'98.Louvain-la-Neuve.:Springer Verlag,1998,329-344.
    [32]李小勇,桂小林.大规模分布式环境下动态信任模型研究[J].软件学报,2007,18(6):1510~1521.
    [33]Song S S, Hwang K. Fuzzy trust integration for security enforcement in grid computing[C]. In:Proc. of the Int'l Symp. on Network and parallel Computing(NPC 2004). LNCS 3222, Berlin:Springer-Verlag,2005.9-21.
    [34]Xiong L, Liu L. A reputation-based trust model for P2P ecommerce communities[J]. IEEE Conference on E-Commerce(CEC'03).Newport Beach, California,2003,275-284.
    [35]Xiong L, Liu L. PeerTrust:Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities[J]. IEEE Trans. Knowl. DataEng. 2004,16(7):843-857.
    [36]Theodorakopoulos G, Baras JS. On trust models and trust evaluation metrics for ad-hoc networks[J]. IEEE Journal on Selected Areas in Communications, 2006,24(2):318-328.
    [37]Jameel H,Hung LX, Kalim U, et al. A trust model for ubiquitous systems based on vectors of trust values[C]. In:Proc. of the 7th IEEE Int'l Symp. On Multimedia. Washington:IEEE Computer Society Press,2005.674-679.
    [38]Sun Y, Yu W, Han Z, et al. Information theoretic framework of trust modeling and evaluation for ad hoc networks[J].IEEE Journal on Selected Areas in Communications, Selected Areas in Communications,2006,249(2): 305-319.
    [39]Melaye D, Demazeau Y. Bayesian dynamic trust model[C]. LNCS 3690. Berlin:Springer-Verlag,2005.480-489.
    [40]常俊胜,王怀民,尹刚.DyTrust:一种P2P系统中基于时间帧的动态信任模型[J].计算机学报,2006,29(8):1301~1307.
    [41]田立勤,林闯.可信网络中一种基于行为信任预测的博弈控制机制[J].计算机学报,2007,30(11):1930~1938.
    [42]田立勤,林闯,杨扬.分布式网络环境下实体行为信任的评估方法[J].计算机工程与应用,2008,44(17):1-5.
    [43]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究[J].软件学报,2003,14(8):1401~1408.
    [44]Tang W, Hu J B, Chen Z. Research on a fuzzy logic-based subjective trust management model [J]. Computer Research and Development,2005,42(10): 1654-1659.
    [45]LI J X, HUAI J P, LI X X. DTM:a dynamic trust management model for internet computing environments [J]. Chinese Journal of Computers,2009, 32(3):493-505.
    [46]田春岐,邹仕洪,王文东等.面向P2P网络应用的基于声誉的trust管理模型[J].通信学报,2008,29(4):63~70.
    [47]饶居华,李长云,李鹏.一种基于模糊理论的Web服务信任评估方法[J].计算机应用与软件,2009,26(8):23-25.
    [48]李海华,杜小勇,田萱.一种能力增强的Web服务信任评估模型[J].计算机学报,2008,31(8):1471~1477.
    [49]吕建,陶先平,马晓星等.基于Agent的网构软件模型研究[J].中国科学E辑信息科学,2005,35(12):1233~1253.
    [50]吕建,马晓星,陶先平等.网构软件的研究与进展[J].中国科学(E辑:信息科学),2006,36(10):1037~1080.
    [51]杨芙清,吕建,梅宏.网构软件技术体系:一种以体系结构为中心的途径[J].中国科学(E辑:信息科学),2008,38(6):818~828.
    [52]孙正辉.基于网构软件的动态演化技术研究与实现[D].南京理工大学硕士学位论文,2008.
    [53]赵丽娜.基于P2P网络环境的网构软件相关技术研究[D].浙江大学博士学位论文,2007.
    [54]杨中芳,彭泗清.中国人人际信任的概念化:一个人际关系的观点[J].社会学研究,1992,2:1-21
    [55]徐兰芳,余院兰.基于模糊数学理论的信誉评估算法研究[J].计算机应用研究,2007,24(6):22~24.
    [56]殷脂,殷卫红.开放协同环境下网构软件的信任管理研究[J].世界科技研究与发展,2008,30(4):449-451.
    [57]马德芳.基于信任的网格动态访问控制研究[D].华中师范大学硕士学位论文,2007.
    [58]Chang E, Thomson P, Dillon T, Hussain F. The fuzzy and dynamic nature of trust[C]. LNCS 3592. Berlin:Springer-Verlag,2005.161-174.
    [59]孟魁.虚拟社区环境下信任机制的研究[D].复旦大学博士学位论文,2005.
    [60]张荣沂.专家系统中不确定性知识的表示和处理[J].自动化技术与应用,2002,21(5):35~39.
    [61]Liang ZQ, Shi WS. Analysis of rating on trust inference in open environmen[J]. Journal of Performance Evaluation,2008,65(2):99-128.
    [62]李小勇,桂小林.动态信任预测的认知模型[J].软件学报,2010,21(1):163~176.
    [63]王健.基于模糊理论的多Agent协作的研究[D].沈阳工业大学硕士学位论文,2007.
    [64]胡宝清.模糊理论基础[M].武汉:武汉大学出版社,2004.
    [65]赵冬梅,张玉清,马建峰.熵权系数法应用于网络安全的模糊风险评估[J].计算机工程,2004,30(18):21~23.
    [66]刘勇,林奇,孟坤.一种基于信息熵的企业信息系统的安全风险定量评估方法[J].计算机科学,2010,37(5):45~56.
    [67]陈超,王汝传,张琳.一种基于开放式网络环境的模糊主观信任模型研究[J].电子学报,2010,38(11):2505~2509.
    [68]Wilensky, U. (1999). NetLogo. http://ccl.northwestern.edu/netlogo/. Center for Connected Learning and Computer-Based Modeling, Northwestern University, Evanston, IL
    [69]Liang ZQ, Shi WS. Enforcing Cooperative Resource Sharing in Untrusted Peer-to-Peer environments[J]. Journal of Mobile Networks and Applications,2005,10(6):771-783.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700