Credibility protection for resource sharing and collaborating in non-center network computing environments

Xiao-long Xu, Qun Tu, Xinheng Wang, Ru-chuan Wang

Research output: Contribution to journalArticle

Abstract

Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently.

Original languageEnglish
JournalJournal of China Universities of Posts and Telecommunications
Volume21
Issue number3
DOIs
Publication statusPublished - 1 Jun 2014

Fingerprint

Topology
Experiments

Cite this

@article{43189264f4be4c068c5a5fdbff854147,
title = "Credibility protection for resource sharing and collaborating in non-center network computing environments",
abstract = "Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently.",
author = "Xiao-long Xu and Qun Tu and Xinheng Wang and Ru-chuan Wang",
year = "2014",
month = "6",
day = "1",
doi = "10.1016/S1005-8885(14)60300-9",
language = "English",
volume = "21",
journal = "Journal of China Universities of Posts and Telecommunications",
issn = "1005-8885",
publisher = "Elsevier B.V.",
number = "3",

}

Credibility protection for resource sharing and collaborating in non-center network computing environments. / Xu, Xiao-long ; Tu, Qun ; Wang, Xinheng; Wang, Ru-chuan .

In: Journal of China Universities of Posts and Telecommunications, Vol. 21, No. 3, 01.06.2014.

Research output: Contribution to journalArticle

TY - JOUR

T1 - Credibility protection for resource sharing and collaborating in non-center network computing environments

AU - Xu, Xiao-long

AU - Tu, Qun

AU - Wang, Xinheng

AU - Wang, Ru-chuan

PY - 2014/6/1

Y1 - 2014/6/1

N2 - Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently.

AB - Non-center network computing environments have some unique characteristics, such as instability, heterogeneity, autonomy, distribution and openness, which bring serious issues of security and reliability. This article proposes a brand-new credibility protection mechanism for resource sharing and collaboration in non-center network computing environments. First, the three-dimensional hierarchical classified topology (3DHCT) is proposed, which provides a basic framework for realizations of the identity credibility, the behavior credibility and the capability credibility. Next, the agent technology is utilized to construct the credibility protection model. This article also proposes a new comprehensive credibility evaluation algorithm with simple, efficient, quantitative and able to meet the requirements of evaluating behavior credibility and the capability credibility evaluation as well. The Dempster-Shafer theory of evidence and the combination rule are used to achieve the evaluation of the capability credibility. The behavior credibility is evaluated with the current and historical performance of nodes for providers and consumers to realize more accurate prediction. Based on the non-center network computing simulation test platform, simulation is been conducted to test the performance and validity of the proposed algorithms. Experiment and analysis show that the proposed algorithms are suitable for large-scale, dynamic network computing environments, and able to maintain the credibility for networks without relying on central node, make a non-center network gradually evolve into an orderly, stable and reliable computing environment efficiently.

U2 - 10.1016/S1005-8885(14)60300-9

DO - 10.1016/S1005-8885(14)60300-9

M3 - Article

VL - 21

JO - Journal of China Universities of Posts and Telecommunications

JF - Journal of China Universities of Posts and Telecommunications

SN - 1005-8885

IS - 3

ER -