• Title/Summary/Keyword: Trust Evaluation

Search Result 290, Processing Time 0.03 seconds

Supply Chain Trust Evaluation Model Based on Improved Chain Iteration Method

  • Jiao, Hongqiang;Ding, Wanning;Wang, Xinxin
    • Journal of Information Processing Systems
    • /
    • v.17 no.1
    • /
    • pp.136-150
    • /
    • 2021
  • The modern market is highly competitive. It has progressed from traditional competition between enterprises to competition between supply chains. To ensure that enterprise can form the best strategy consistently, it is necessary to evaluate the trust of other enterprises in the supply chain. First, this paper analyzes the background and significance of supply chain trust research, analyzes and expounds on the qualitative and quantitative methods of supply chain trust evaluation, and summarizes the research in this field. Analytic hierarchy process (AHP) is the most frequently used method in the literature to evaluate and rank criteria through data analysis. However, the input data for AHP analysis is based on human judgment, and hence there is every possibility that the data may be vague to some extent. Therefore, in view of the above problems, this study improves the global trust method based on chain iteration. The improved global trust evaluation method based on chain iteration is more flexible and practical, hence, it can more accurately evaluate supply chain trust. Finally, combined with an actual case of Zhaoxian Chengji Food Co. Ltd., the paper qualitatively analyzes the current situation of supply chain trust management and effectively strengthens the supervision of enterprises to cooperative enterprises. Thus, the company can identify problems on time and strategic adjustments can be implemented accordingly. The effectiveness of the evaluation method proposed in this paper is demonstrated through a quantitative evaluation of its trust in downstream enterprise A. Results suggest that the subjective preferences of and historical transactions together affect the final evaluation of trust.

The Effects of Sustainable Management Activity on Corporate and Product Evaluation (지속가능경영 활동이 신뢰와 호혜성지각을 통해 기업과 제품평가에 미치는 영향)

  • Park, Sang-June;Byun, Ji-Yeon
    • Korean Management Science Review
    • /
    • v.32 no.3
    • /
    • pp.119-130
    • /
    • 2015
  • Previous studies have demonstrated that the three dimensions of Triple Bottom Line (TBL : economic, social, and environmental responsibility) indirectly affect product/corporate evaluation through reciprocity perception and trust (expertize-based trust and benevolence-based trust). Different from the past studies, this study investigates on the indirect effects as well as the direct effects of the three dimensions on product/corporate evaluation. The empirical results can be summarized as follows. First, reciprocity perception affects benevolence-based trust but it does not expertize-based trust. Second, the effect of economic dimension on product/corporate evaluation is not affected by reciprocity perception and benevolence-based trust, however, the effects of social dimension and environmental dimension on product/corporate evaluation are affected by reciprocity perception and benevolence-based trust.

Dynamic Trust Model Based on Extended Subjective Logic

  • Junfeng, Tian;Jiayao, Zhang;Peipei, Zhang;Xiaoxue, Ma
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.8
    • /
    • pp.3926-3945
    • /
    • 2018
  • In Jøsang's trust model, trust evaluation is obtained through operators, but there are problems with the mutuality and asymmetry of trust and the impact of event weight on trust evaluation. Trust evaluation is updated dynamically and continuously with time and the process of interactions, but it has not been reflected in Jøsang's model. Therefore, final trust evaluation is not accurate, and malicious fraud cannot be prevented effectively. This causes the success rate of interaction to be low. To solve these problems, a new dynamic trust model is proposed based on extended subjective logic (DTM-ESL). In DTM-ESL, the event weight and the mutuality of trust are fully considered, the original one-way trust relationship is extended to a two-way trust relationship, discounting and consensus operators are improved, and trust renewal is designed based on event weight. The viability and effectiveness of this new model are verified by simulation experiments.

Node-Level Trust Evaluation Model Based on Blockchain in Ad Hoc Network

  • Yan, Shuai-ling;Chung, Yeongjee
    • International journal of advanced smart convergence
    • /
    • v.8 no.4
    • /
    • pp.169-178
    • /
    • 2019
  • Due to the characteristics of an ad hoc network without a control center, self-organization, and flexible topology, the trust evaluation of the nodes in the network is extremely difficult. Based on the analysis of ad hoc networks and the blockchain technology, a blockchain-based node-level trust evaluation model is proposed. The concepts of the node trust degree of the HASH list on the blockchain and the perfect reward and punishment mechanism are adopted to construct the node trust evaluation model of the ad hoc network. According to the needs of different applications the network security level can be dynamically adjusted through changes in the trust threshold. The simulation experiments demonstrate that ad-hoc on-demand distance vector(AODV) Routing protocol based on this model of multicast-AODV(MAODV) routing protocol shows a significant improvement in security compared with the traditional AODV and on-demand multipath distance vector(AOMDV) routing protocols.

Cluster-Based Trust Evaluation Scheme in an Ad Hoc Network

  • Jin, Seung-Hun;Park, Chan-Il;Choi, Dae-Seon;Chung, Kyo-Il;Yoon, Hyun-Soo
    • ETRI Journal
    • /
    • v.27 no.4
    • /
    • pp.465-468
    • /
    • 2005
  • This paper presents a new trust evaluation scheme in an ad hoc network. To overcome the limited information about unfamiliar nodes and to reduce the required memory space, we propose a cluster-based trust evaluation scheme, in which neighboring nodes form a cluster and select one node as a cluster head. The head issues a trust value certificate that can be referred to by its non-neighbor nodes. In this way, an evaluation of an unfamiliar node's trust can be done very efficiently and precisely. In this paper, we present a trust evaluation metric using this scheme and some operations for forming and managing a cluster. An analysis of the proposed scheme over some security problems is also presented.

  • PDF

TSTE: A Time-variant Stochastic Trust Evaluation Model in Social Networks

  • Li, Jingru;Yu, Li;Zhao, Jia;Luo, Chao;Zheng, Jun
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.11 no.6
    • /
    • pp.3273-3308
    • /
    • 2017
  • Building appropriate trust evaluation models is an important research issue for security guarantee in social networks. Most of the existing works usually consider the trust values at the current time slot, and model trust as the stochastic variable. However, in fact, trust evolves over time, and trust is a stochastic process. In this paper, we propose a novel time-variant stochastic trust evaluation (TSTE) model, which models trust over time and captures trust evolution by a stochastic process. Based on the proposed model, we derive the time-variant bound of untrustworthy probability, which provides stochastic trust guarantee. On one hand, the time-variant trust level of each node can be measured by our model. Meanwhile, by tolerating nodes with relatively poor performance, our model can effectively improve the node resource utilization rate. Numerical simulations are conducted to verify the accuracy and consistency of the analytical bounds on distinguishing misbehaved nodes from normal ones. Moreover, simulation results on social network dataset show the tradeoff between trust level and resource utilization rate, and verify that the successful transmission rate can be improved by our model.

Trust Evaluation Metrics for Selecting the Optimal Service on SOA-based Internet of Things

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.15 no.2
    • /
    • pp.129-140
    • /
    • 2019
  • In the IoT environment, there is a huge amount of heterogeneous devices with limited capacity. Existing trust evaluation methods are not adequate to accommodate this requirement due to the limited storage space and computational resources. In addition, since IoT devices are mainly human operated devices, the trust evaluation should reflect the social relations among device owners. There is also a need for a mechanism that reflects the tendency of the trustor and environmental factors. In this paper, we propose an adaptable trust evaluation method for SOA-based IoT system to deal with these issues. The proposed model is designed to minimize the confidence bias and to dynamically respond to environmental changes by combining direct evaluation and indirect evaluation. It is expected that it will be possible to secure trust through quantitative evaluation by providing feedback based on social relationships.

A trust evaluation method for improving nodes utilization for wireless sensor networks

  • Haibo, Shen;Kechen, Zhuang;Hong, Zhang
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.3
    • /
    • pp.1113-1135
    • /
    • 2018
  • Existing trust evaluation models for wireless sensor networks can accurately and objectively evaluate trust value of nodes, but the nodes' energy saving problem was ignored. Especially when there are a few malicious nodes in a network, the overall trust value calculation for all nodes would waste lots of energy. Beside that, the network failure caused by nodes death was also not considered. In this paper, we proposed a method for avoiding energy hole which applied trust evaluation models and a trust evaluation method based on information entropy, so as to achieve the purpose of improving nodes utilization. Simulation results show that the proposed method can effectively improve nodes utilization, and it has reasonable detection rate and lower false alert rate compared to other classical methods.

A Robust and Adaptive Trust Management System for Guaranteeing the Availability in the Internet of Things Environments

  • Wu, Xu
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.12 no.5
    • /
    • pp.2396-2413
    • /
    • 2018
  • Trust management is one of the most challenging issues for the highly heterogeneous Internet of Things (IoT). In the context of the IoT, it is difficult to evaluate the node's trustworthiness in the same trust model when a node provides different services. Guaranteeing the availability of the trust management service is another significant challenge because of the dynamic nature of IoT environments. With these issues in mind, this paper propose a robust and adaptive trust management system for the IoT that is able to measure the trustworthiness of nodes based on feedbacks collected from participants in a specific context and ensure the availability of trust management services. The main contributions of our system are: 1) Proposing a partly decentralized trust management framework, which improves the resiliency of the trust mechanism; 2) Proposing an adaptive trust evaluation scheme and a three-dimensional context representation makes trust evaluation more accurate and specific; 3) Enhancing the adaptive trust evaluation scheme by incorporating a bad behavior factor in trust estimation, which efficiently distinguishes misleading feedbacks from On-Off attacks. Simulation results show the good performance of the proposed system and especially show effectiveness against On-Off attacks compared to other trust mechanisms.

Service Oriented Cloud Computing Trusted Evaluation Model

  • Jiao, Hongqiang;Wang, Xinxin;Ding, Wanning
    • Journal of Information Processing Systems
    • /
    • v.16 no.6
    • /
    • pp.1281-1292
    • /
    • 2020
  • More and more cloud computing services are being applied in various fields; however, it is difficult for users and cloud computing service platforms to establish trust among each other. The trust value cannot be measured accurately or effectively. To solve this problem, we design a service-oriented cloud trust assessment model using a cloud model. We also design a subjective preference weight allocation (SPWA) algorithm. A flexible weight model is advanced by combining SPWA with the entropy method. Aiming at the fuzziness and subjectivity of trust, the cloud model is used to measure the trust value of various cloud computing services. The SPWA algorithm is used to integrate each evaluation result to obtain the trust evaluation value of the entire cloud service provider.