• Title/Summary/Keyword: computational model of trust

Search Result 14, Processing Time 0.021 seconds

Hybrid Trust Computational Model for M2M Application Services (M2M 애플리케이션 서비스를 위한 하이브리드형 신뢰 평가 모델)

  • Kim, Yukyong
    • Journal of Software Assessment and Valuation
    • /
    • v.16 no.2
    • /
    • pp.53-62
    • /
    • 2020
  • In the end-user domain of an IoT environment, there are more and more intelligent M2M devices that provide resources to create and share application services. Therefore, it can be very useful to manage trust by transferring the role of the existing centralized service provider to end users in a P2P environment. However, in a decentralized M2M computing environment where end users independently provide or consume services, mutual trust building is the most important factor. This is because malicious users trying to build malfunctioning services can cause security problems in M2M computing environments such as IoT. In this paper, we provide an integrated analysis and approach for trust evaluation of M2M application services, and an optimized trust evaluation model that can guarantee reliability among users of the M2M community.

Security Clustering Algorithm Based on Integrated Trust Value for Unmanned Aerial Vehicles Network

  • Zhou, Jingxian;Wang, Zengqi
    • KSII Transactions on Internet and Information Systems (TIIS)
    • /
    • v.14 no.4
    • /
    • pp.1773-1795
    • /
    • 2020
  • Unmanned aerial vehicles (UAVs) network are a very vibrant research area nowadays. They have many military and civil applications. Limited bandwidth, the high mobility and secure communication of micro UAVs represent their three main problems. In this paper, we try to address these problems by means of secure clustering, and a security clustering algorithm based on integrated trust value for UAVs network is proposed. First, an improved the k-means++ algorithm is presented to determine the optimal number of clusters by the network bandwidth parameter, which ensures the optimal use of network bandwidth. Second, we considered variables representing the link expiration time to improve node clustering, and used the integrated trust value to rapidly detect malicious nodes and establish a head list. Node clustering reduce impact of high mobility and head list enhance the security of clustering algorithm. Finally, combined the remaining energy ratio, relative mobility, and the relative degrees of the nodes to select the best cluster head. The results of a simulation showed that the proposed clustering algorithm incurred a smaller computational load and higher network security.

De-Centralized Information Flow Control for Cloud Virtual Machines with Blowfish Encryption Algorithm

  • Gurav, Yogesh B.;Patil, Bankat M.
    • International Journal of Computer Science & Network Security
    • /
    • v.21 no.12
    • /
    • pp.235-247
    • /
    • 2021
  • Today, the cloud computing has become a major demand of many organizations. The major reason behind this expansion is due to its cloud's sharing infrastructure with higher computing efficiency, lower cost and higher fle3xibility. But, still the security is being a hurdle that blocks the success of the cloud computing platform. Therefore, a novel Multi-tenant Decentralized Information Flow Control (MT-DIFC) model is introduced in this research work. The proposed system will encapsulate four types of entities: (1) The central authority (CA), (2) The encryption proxy (EP), (3) Cloud server CS and (4) Multi-tenant Cloud virtual machines. Our contribution resides within the encryption proxy (EP). Initially, the trust level of all the users within each of the cloud is computed using the proposed two-stage trust computational model, wherein the user is categorized bas primary and secondary users. The primary and secondary users vary based on the application and data owner's preference. Based on the computed trust level, the access privilege is provided to the cloud users. In EP, the cipher text information flow security strategy is implemented using the blowfish encryption model. For the data encryption as well as decryption, the key generation is the crucial as well as the challenging part. In this research work, a new optimal key generation is carried out within the blowfish encryption Algorithm. In the blowfish encryption Algorithm, both the data encryption as well as decryption is accomplishment using the newly proposed optimal key. The proposed optimal key has been selected using a new Self Improved Cat and Mouse Based Optimizer (SI-CMBO), which has been an advanced version of the standard Cat and Mouse Based Optimizer. The proposed model is validated in terms of encryption time, decryption time, KPA attacks as well.

Development of the Deterioration Models for the Port Structures by the Multiple Regression Analysis and Markov Chain (다중 회귀분석 및 Markov Chain을 통한 항만시설물의 상태열화모델 개발)

  • Cha, Kyunghwa;Kim, Sung-Wook;Kim, Jung Hoon;Park, Mi-Yun;Kong, Jung Sik
    • Journal of the Computational Structural Engineering Institute of Korea
    • /
    • v.28 no.3
    • /
    • pp.229-239
    • /
    • 2015
  • In light of the significant increase in the quantities of goods transported and the development of the shipping industry, the frequency of usage of port structures has increased; yet, the government's budget for the shipping & port of SOC has been reduced. Port structures require systematically effective maintenance and management trends that address their growing frequency of usage. In order to construct a productive maintenance system, it is essential to develop deterioration models of port structures that consider various characteristics, such as location, type, use, constructed level, and state of maintenance. Processes for developing such deterioration models include examining factors that cause the structures to deteriorate, collecting data on deteriorating structures, and deciding methods of estimation. The techniques used for developing the deterioration models are multiple regression analysis and Markov chain theory. Multiple regression analysis can reflect changes over time and Markov chain theory can apply status changes based on a probabilistic method. Along with these processes, the deterioration models of open-type and gravity-type wharfs were suggested.