开放计算系统中基于DSmT的信任管理研究
详细信息    本馆镜像全文|  推荐本文 |  |   获取CNKI官网全文
摘要

Open computational systems, such as e-business, peer-to-peer networks and grid, are becoming the main trends. Open computational systems are characterized as both open and dynamic. The interacting parties may be strange and selfish members, which brings great risks to the interactions. The traditional secure mechanisms depend mainly on the authority center which is difficult to establish in open computational systems, so it is no longer sufficient for the open computational systems. Trust management inspired by the trust mechanisms in society is an important research of social computing. Trust management is trying to build up similar trust mechanisms in open computational systems, which is considered a promising way to solve the trust problem in open computational systems.
     From the point of view of trust representation, this dissertation researched trust management based on DSmT, including trust representation, acquisition, transitivity, accumulation, decision, malicious behavior resistance, second-hand trust evaluation modification and application to recommender systems. This study mainly has four contributes:
     (1) DSmTrust, a trust model based on DSmT, is provided in order to handle the common problem of insufficient trust representation in open computational systems. Besides DSmTrust, further problems including trust acquirement, trust decision and malicious behavior resistance are studied. Simulations show the efficiency and effectiveness by comparisons.
     (2) The DSmT Subjective Logic which is an extension of the Subjective Logic is presented. The discounting operator and consensus operator are applied to trust transitivity and trust accumulation of DSmTrust, respectively. The flexibility of discounting operator and the rationality of consensus operator are proved by experiments and examples.
     (3) A disturbing model is presented to modify the second-hand trust evaluations because of the problem of inaccurate second-hand information in trust management. This disturbing model is reduced to the inverse problem of DSmT. The simulations indicate that the disturbing model can explain and modify well the difference between the second-hand trust evaluations and the first-hand trust evaluations.
     (4) DSmTrust is preliminarily applied to recommender systems. The constraint of common ratings in collaborative filtering is relieved in DSmTrust by trust transitivity. The preliminary results show that DSmTrust can effectively handle the sparse problem and cold start problem comparing with traditional collaborative filtering, and the recommendation precision of DSmTrust is better than Massa's approach.
     This dissertation applies DSmT to trust management. On the one hand, this work provides a novel approach to represent and handle trust for the field of trust management and it can be a support of the future interoperable trust model for the heterogeneous trust models. On the other hand, this study which is a paradigm for the application of DSmT will drive the development of DSmT.
引文
[1]淘宝网.http://www.taobao.com.
    [2]艾瑞网.http://down.iresearch.cn/Reports/Free/1240.html.
    [3]eBay.http://www.ebay.com.
    [4]About eBay.http://news.ebay.com/about.cfm.
    [5]Rutter J.From the sociology of trust towards a sociology of 'e-trust'.International Journal of New Product Development & Innovation Management,2001,2(4):371-385.
    [6]Jφsang A,Hird S,Faccer E.Simulating the effect of reputation systems on e-markets.Lecture notes in computer science,2003:179-194.
    [7]Amazon.http://www.amazon.com.
    [8]阿里巴巴.http://www.alibaba.com.
    [9]Zacharia G,Moukas A,Maes P.Collaborative reputation mechanisms for electronic marketplaces.Decision Support Systems,2000,29(4):371-388.
    [10]Foster I,Kesselman C,Tuecke S.The anatomy of the grid:Enabling scalable virtual organizations.International Journal of High Performance Computing Applications,2001,15(3):200.
    [11]Steinmetz R,Wehrle K.Peer-to-peer systems and applications.Lecture notes in computer science,2005,3485.
    [12]Zhou L,Haas Z.Securing ad hoc networks.IEEE network,1999,13(6):24-30.
    [13]Ramchurn S,Huynh D,Jennings N.Trust in multi-agent systems.The Knowledge Engineering Review,2005,19(01):1-25.
    [14]Ramchurn S,Jennings N.Trust in agent-based software.Trust and Crime in Information Societies,2005:165-204.
    [15]Huynh T D,Jennings N R,Shadbolt N R.An integrated trust and reputation model for open multi-agent systems.Autonomous Agents and Multi-Agent Systems,2006,13(2):119-154.
    [16]关振胜.公钥基础设施PKI与认证机构CA:电子工业出版社,2002.
    [17]Ellison C,Schneier B.Ten risks of PKI:What you're not being told about public key infrastructure.Computer,2000,16(1):1-7.
    [18]Marsh S.Formalising trust as a computational concept:Dept.of Computing Science and Mathematics,University of Stirling,1994.
    [19]Blaze M,Feigenbaum J,Lacy J.Decentralized trust management.1996:164-173.
    [20]Blaze M,Feigenbaum J,Keromytis A.KeyNote:Trust management for public-key infrastructures.Lecture notes in computer science,1999,15511(59-63):33-60.
    [21]袁时金.信任管理关键技术研究,复旦大学.2005.
    [22]Golbeck J,Hendler J.Inferring binary trust relationships in web-based social networks.ACM Transactions on Internet Technology(TOIT),2006,6(4):497-529.
    [23]Dewan S,Hsu V.Trust in electronic markets:Price discovery in generalist versus specialty online auctions.Working Paper,2001.
    [24]Resnick P,Zeckhauser R.Trust among strangers in Internet transactions:Empirical analysis of eBay's reputation system.Advances in Applied Microeconomics:A Research Annual,2002,11:127-157.
    [25]Aberer K,Despotovic Z.Managing trust in a peer-2-peer information system.ACM New York,NY,USA,2001:310-317.
    [26]Abdul-Rahman A,Hailes S.Supporting trust in virtual communities.33rd Hawaii International Conference on System Sciences,2000:9.
    [27]Duma C,Shahmehri N,Caronni G.Dynamic trust metrics for peer-to-peer systems.2005:776-781.
    [28]Kamvar S,Schlosser M,Garcia-Molina H.EigenRep:Reputation management in P2P networks.Proceedings of the 12th International World Wide Web Conference,2003:123-134.
    [29]RFC 4158.http://tools.ietf.org/html/rfc4158.
    [30]epinions,http://www.epinions.com.
    [31]Brickley D,Miller L.FOAF vocabulary specification.Namespace Document,2005,3.
    [32]FOAFBot:IRC Community Support Agent:.http://usefulinc.com/static_content/foaf/foafbot/.
    [33]Golbeck J,Hendler J.Accuracy of metrics for inferring trust reputation in semantic Web-based social networks.2004:116-131.
    [34]Ma J,Orgun M.Trust management and trust theory revision.IEEE Transactions on Systems,Man and Cybernetics,Part A,2006,36(3):451-460.
    [35]Cahill V,Gray E,Seigneur J,et al.Using trust for secure collaboration in uncertain environments.IEEE Pervasive Computing,2003,2(3):52-61.
    [36]Carbone M,Nielsen M,Sassone V.A formal model for trust in dynamic networks.2003:54-61.
    [37]Staab S,Bhargava B,Lilien L,et al.The pudding of trust.IEEE Intelligent Systems,2004,19(5):74-88.
    [38]Prade H.A qualitative bipolar argumentative view of trust.Lecture notes in computer science,2007,4772:268.
    [39]Jφsang A,Ismail R.The beta reputation system.Proceedings of the 15th Bled Electronic Commerce Conference,2002:324-337.
    [40]窦文,王怀民,贾焰,等.构造基于推荐的Peer-to-Peer环境下的Trust模型.软件学报,2004,15(004):571-583.
    [41]Wang Y,Vassileva J.Bayesian network-based trust model.IEEE/WIC International Conference on Web Intelligence,2003:372-378.
    [42]Hussain F,Chang E,Hussain O.State of the art review of the existing bayesian-network based approaches to trust and reputation computation.Second International Conference on Internet Monitoring and Protection,2007:26-26.
    [43]Patel J,Teacy W,Jennings N,et al.A probabilistic trust model for handling inaccurate reputation sources.Lecture notes in computer science,2005,3477:193-209.
    [44]Teacy W,Patel J,Jennings N,et al.Travos:Trust and reputation in the context of inaccurate information sources.Autonomous Agents and Multi-Agent Systems,2006,12(2):183-198.
    [45]Zhou R F,Hwang K.PowerTrust:A robust and scalable reputation system for trusted Peer-to-Peer computing.IEEE Transactions on Parallel and Distributed Systems,2007,18(4):460-473.
    [46]Mitra A,Maheswaran M.Trusted Gossip:A Rumor Resistant Dissemination Mechanism for Peer-to-Peer Information Sharing.IEEE Computer Society Washington,DC,USA,2007:702-707.
    [47]Nguyen G,Chatalic P,Rousset M.A probabilistic trust model for semantic peer to peer systems.ACM New York,NY,USA,2008:59-65.
    [48]吴鹏,吴国新,方群.一种基于概率统计方法的P2P系统信任评价模型.计算机研究与发展,2008,45(003):408-416.
    [49]Deno M,Sun T.Probabilistic Trust Management in Pervasive Computing.IEEE/IFIP International Conference on Embedded and Ubiquitous Computing,2008.
    [50]Krukow K,Nielsen M,Sassone V.Trust models in ubiquitous computing.Philosophical Transactions of the Royal Society A:Mathematical,Physical and Engineering Sciences,2008,366(1881):3781-3793.
    [51]Bergenti F.Toward a Probabilistic Model of Trust in Agent Societies.Lecture Notes In Artificial Intelligence,2008:270-283.
    [52]Dempster A P.Upper and Lower Probabilities Induced by a Multi-valued Mapping.Annals of Mathematical Statistics,38:325-339.
    [53]Shafer G.A mathematical theory of evidence.New York:Princeton university press Princeton,1976.
    [54]Yu B,Singh M.An evidential model of distributed reputation management.ACM New York,NY,USA,2002:294-301.
    [55]Yu B,Singh M P.Distributed reputation management for electronic commerce.Computational Intelligence.2002,18(4) 535-549.
    [56]Yu B,Singh M.Detecting deception in reputation management.ACM New York,NY,USA,2003:73-80.
    [57]朱峻茂,杨寿保,樊建平,等.Grid与P2P混合计算环境下基于推荐证据推理的信任模型.计算机研究与发展,2005,42(005):797-803.
    [58]袁禄来,曾国荪,王伟.基于Dempster—Shafer证据理论的信任评估模型.武汉大学学报:理学版,2006,52(005):627-630.
    [59]田春岐,邹仕洪,王文东,等.一种新的基于改进型DS证据理论的P2P信任模型.电子与信息学报,2008,30(006):1480-1484.
    [60]田春岐,邹仕洪,王文东,等.一种基于推荐证据的有效抗攻击P2P网络信任模型.计算机学报,2008,31(002):270-281.
    [61]Gui C,Wu Q,Wang H,et al.On Trustworthy Reputation Evidence Establishment:Rating Analysis and Defense against Dishonesty.2008:309-314.
    [62]Bagheri E,Barouni-Ebrahimi M,Zafarani R,et al.A Belief-Theoretic Reputation Estimation Model for Multi-context Communities.Lecture notes in computer science,2008,5032:48.
    [63]Sabater J,Sierra C.Regret:A reputation model for gregarious societies.Proceedings of the fourth Workshop on Deception Fraud and Trust in Agent Societies,Montreal,Canada,2001:61-70.
    [64]Sabater J,Sierra C.Reputation and social network analysis in multi-agent systems.ACM New York,NY,USA,2002:475-482.
    [65]Zadeh L.Fuzzy logic and approximate reasoning.Synthese,1975,30(3):407-428.
    [66]唐文,陈钟.基于模糊集合理论的主观信任管理模型研究.软件学报,2003,14(008):1401-1408.
    [67]Song S,Hwang K,Zhou R,et al.Trusted P2P transactions with fuzzy reputation aggregation.IEEE Internet Computing,2005,9(6):24-34.
    [68]高庆狮.新模糊集合论基础.北京:机械工业出版社,2006.
    [69]Jφsang A,Ismail R,Boyd C.A survey of trust and reputation systems for online service provision.Decision Support Systems,2007,43(2):618-644.
    [70]Dezert J.Foundations for a new theory of plausible and paradoxical reasoning.Information and security,2002,9:13-57.
    [71]Dezert J.An introduction to the theory of plausible and paradoxical reasoning.Lecture notes in computer science,2003:12-23.
    [72]Smarandache F,Dezert J.Advances and Applications of DSmT for Information Fusion.Rehoboth:American Research Press,2004.
    [73]Smarandache F,Dezert J.Applications and Advances of DSmT for Information Fusion,Vol.2.Rehoboth:Amer.Res.Press,2006.
    [74]Jφsang A.A logic for uncertain probabilities.International Journal of Uncertainty,Fuzziness and Knowledge-Based Systems,2001,9(3):279-311.
    [75]Jφsang A.Artificial reasoning with subjective logic.2nd Australian Workshop on Commonsense Reasoning,1997.
    [76]Twigg A.A subjective approach to routing in P2P and ad hoc networks.Lecture notes in computer science,2003:225-238.
    [77]Li X,Lyu M,Liu J.A trust model based routing protocol for secure ad hoc networks.Aerospace Conference,2004 IEEE,2004:1286-1295
    [78]苏锦钿,郭荷清,高英.基于主观逻辑的Web服务信任模型.华南理工大学学报:自然科学版,2005,33(010):24-28.
    [79]姚寒冰,胡和平,卢正鼎,等.一种基于主观逻辑理论的P2P网络信任模型.计算机科学,2006,33(006):29-31.
    [80]林剑柠,吴慧中.基于主观逻辑理论的网格信任模型分析。计算机研究与发展,2007,44(008):1365-1370.
    [81]Massa P,Avesani P.Trust-aware collaborative filtering for recommender systems.Lecture notes in computer science,2004:492-508.
    [82]Kramer R.Trust and distrust in organizations:Emerging perspectives,enduring questions.Annual review of psychology,1999,50(1):569-598.
    [83]Wrightsman L.Interpersonal trust and attitudes toward human nature.Measures of personality and social psychological attitudes,1991,1:373-412.
    [84]郑也夫.信任论.北京:中国广播电视出版社,2001.
    [85]Arrow K.Gifts and exchanges.Philosophy & Public Affairs,1972:343-362.
    [86]ConsultationCommittee.X.509:The Directory Authentication Framework.Geneva:International Telephone and Telegraph,Intenrational Telecommunication Union,1989.
    [87]Mui L.Computational models of trust and reputation:Agents,evolutionary games,and social networks.Massachusetts Institute of Technology,2002.
    [88]Grandison T.Trust management for intemet applications.Imperial College,2003.
    [89]唐文.基于模糊集合理论的信任管理研究.北京大学,2004.
    [90]李凡.专家系统中的不确定性.气象出版社,1992.
    [91]张荣沂.专家系统中不确定性知识的表示和处理.自动化技术与应用,2002(005):35-39.
    [92]Beth T,Borcherding M,Klein B.Valuation of trust in open networks.Computer Security-ESORICS 94:Third European Symposium on Research in Computer Security,Brighton,United Kingdom:Springer,1994:3-18.
    [93]Christianson B,Harbison W.Why isn't trust transitive? Lecture notes in computer science,1997:171-176.
    [94]Abdul-Rahman A.A framework for decentralised trust reasoning.University College London,2004.
    [95]Jφsang A,Pope S.Semantic constraints for trust transitivity.The 2nd Asia-Pacific conference on Conceptual modelling,Darlinghurst,Australia,2005:59-68.
    [96]Blaze M,Feigenbaum J,Strauss M.Compliance checking in the PolicyMaker trust management system.Lecture notes in computer science,1998,1465:254-274.
    [97]Chu Y H,Feigenbaum J,LaMacchia B,et al.REFEREE:Trust management for web applications.Computer Networks and ISDN Systems,1997,29(8-13):953-964.
    [98]Xiong L,Liu L.PeerTrust:Supporting reputation-based trust for peer-to-peer electronic communities.IEEE Transactions on Knowledge and Data Engineering,2004,16(7):843-857.
    [99]Golbeck J,Hendler J.Filmtrust:Movie recommendations using trust in web-based social networks.Proceedings of the IEEE Consumer Communications and Networking Conference,2006:43-44.
    [100]Wang J,Sun H J.A new evidential trust model for open communities.Computer Standards & Interfaces,2009.http://dx.doi.org/10.1016/j.csi.2008.09.025.
    [101]Google.http://www.google.com/.
    [102]Napster.http://www.napster.com.
    [103]Gnutella.http://en.wikipedia.org/wiki/Gnutella.
    [104]Wooldridge M,石纯一.多Agent系统引论.北京:电子工业出版社,2003.
    [105]Luck M,McBurney P,Shehory O,et al.Agent technology:Computing as interaction.A Roadmap for Agent Based Computing.University of Southampton on behalf of AgentLink Ⅲ,2005.
    [106]Despotovic Z,Aberer K.P2P reputation management:Probabilistic estimation vs.social networks.Computer Networks,2006,50(4):485-500.
    [107]Ding L,Zhou L,Finin T.Trust based knowledge outsourcing for semantic web agents.Proceedings of IEEE/WIC International Conference on Web Intelligence,2003.
    [108]Rasmusson L,Jansson S.Simulated social control for secure Internet commerce.Proceedings of the 1996 workshop on New security paradigms:ACM New York,NY,USA,1996:18-25.
    [109]Goldberg D,Nichols D,Oki B,et al.Using collaborative filtering to weave an information tapestry.Communications of the Acm,1992,35(12):61-70.
    [110]朱峻茂.开放网络中的信任问题研究.中国科技大学,2005.
    [111]Corgne S,Hubert-Moy L,Dezert J,et al.Land cover change prediction with a new theory of plausible and paradoxical reasoning.The 6th International Conference on Information Fusion,Queensland,Australia,2003.
    [112]Singh R,Vatsa M,Noore A.Integrated multilevel image fusion and match score fusion of visible and infrared face images for robust face recognition.Pattern Recognition,2008,41(3):880-893.
    [113]Tchamova A,Dezert J,Semerdjiev T,et al.Target Tracking with Generalized data association based on the general DSm rule of combination.The 7th International Conference on Information Fusion,Stockholm,Sweden,2004.
    [114]Tchamova A,Semerdjiev T,Dezert J.Estimation of Target behavior tendencies using Dezert-Smarandache theory.Sixth International Conference of Information Fusion,2003.
    [115]Xinde L,Xinhan H,Min W.Sonar grid map building of mobile robots based on DSmT.Information Technology Journal,2006,5(2):267-272.
    [116]Watkins C,Dayan P.Q-learning.Machine learning,1992,8(3):279-292.
    [117]Yu B,Singh M P.A social mechanism of reputation management in electronic communities.2000:154-165.
    [118]Teacy W T L,Patel J,Jennings N R,et al.TRAVOS:Trust and reputation in the context of inaccurate information sources.2006:183-198.
    [119]Patel J,Teacy W T L,Jennings N R,et al.A probabilistic trust model for handling inaccurate reputation sources.2005:193-209.
    [120]孙怀江,杨静宇.一种相关证据合成方法.计算机学报,1999,22(009):1004-1007.
    [121]王进,张彤,孙怀江.一种基于DSmT的专家推荐模型.计算机工程,2009,35(8):217-219.
    [122]The race to create a 'smart' Google. http://money.cnn.com/magazines/fortune/fortune_archive/2006/11/27/8394347/.
    [123]Recommender system,http://en.wikipedia.org/wiki/Recommender_system.
    [124]ACM Recommender Systems 2008 http://recsys.acm.org/2008/index.html.
    [125]Netflix Prize.http://www.netflixprize.com/.
    [126]Burke R.Hybrid recommender systems:Survey and experiments.User Modeling and User-Adapted Interaction,2002,12(4):331-370.
    [127]Ziegler C,Lausen G.Analyzing correlation between trust and user similarity in online communities.Lecture notes in computer science,2004:251-265.
    [128]AllConsuming.http://www.allconsuming.net/.
    [129]Film Trust.http://trust.mindswap.org/Film Trust/.
    [130]Sinha R,Swearingen K.Comparing recommendations made by online systems and friends.DELOS-NSF Workshop on Personalization and Recommender Systems in Digital Libraries,2001.
    [131]Massa P,Bhattacharjee B.Using trust in recommender systems:an experimental analysis.Lecture notes in computer science,2004,2995:221-235.

© 2004-2018 中国地质图书馆版权所有 京ICP备05064691号 京公网安备11010802017129号

地址:北京市海淀区学院路29号 邮编:100083

电话:办公室:(+86 10)66554848;文献借阅、咨询服务、科技查新:66554700