Skip to main content
Log in

An Uncertainty Enhanced Trust Evolution Strategy for e-Science

  • Regular Paper
  • Published:
Journal of Computer Science and Technology Aims and scope Submit manuscript

Abstract

Resources shared in e-Science have critical requirements on security. Thus subjective trust management is essential to guarantee users’ collaborations and communications on such a promising infrastructure. As an important nature of subjective trust, uncertainty should be preserved and exhibited in trust definition, representation and evolution. Consider the drawbacks of existing mechanisms based on random mathematics and fuzzy theory, this paper designs an uncertainty enhanced trust evolution strategy based on cloud model theory. We define subjective trust as trust cloud. Then we propose new algorithms to propagate, aggregate and update trust. Furthermore, based on the concept of similar cloud, a method to assess trust level is put forward. The simulation results show the effectiveness, rationality and efficiency of our proposed strategy.

This is a preview of subscription content, log in via an institution to check access.

Access this article

Price excludes VAT (USA)
Tax calculation will be finalised during checkout.

Instant access to the full article PDF.

Similar content being viewed by others

References

  1. Tony H, Anne E T. The UK e-Science core programme and the grid. Future Generation Computer Systems, 2002, 18(8): 1017–1031.

    Article  MATH  Google Scholar 

  2. John T. e-Science definition. http://www.e-science.clrc.ac.uk/, 2000.

  3. Foster I, Kesselman C. The Grid: Blueprint for a New Computing Infrastructure. San Francisco: Morgan Kaufmann Publisher, 1999.

    Google Scholar 

  4. Blaze M, Feigenbaum J, Keromytis A D. KeyNote: Trust management for public-key infrastructure. In Proc. the 6th International Workshop on Security Protocols, Cambridge, UK, Apr. 15-17, 1998, pp.59–63.

  5. Beth T, Borcherding M, Klein B. Valuation of trust in open networks. In Proc. the 3rd European Symposium on Research in Computer Security, Brighton, UK, Nov. 7-9, 1994, pp.3–18.

  6. Jøsang A, Knapskog S J. A metric for trusted system. In Proc. the 14th IFIP/SEC International Information Security Conference, Vienna, Austria, Aug. 31-Sept. 2, 1998, pp.541–549.

  7. Jøsang A. A logic for uncertain probabilities. International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems, 2001, 9(3): 279–311.

    MathSciNet  Google Scholar 

  8. Melaye D, Demazeau Y. Bayesian dynamic trust model. In Proc. the 4th International Central and Eastern European Conference on Multi-Agent Systems, Budapest, Hungary, Sept. 15-17, 2005, pp.480–489.

  9. Almenarcz F, Marin A, Diaz D, Sanchez J. Developing a model for trust management in pervasive devices. In Proc. the 3rd IEEE International Workshop on Pervasive Computing and Communication Security, Pisa, Italy, Mar. 13, 2006, pp. 267–272.

  10. Song S S, Hwang K. Fuzzy trust integration for security enforcement in grid computing. In Proc. IFIP International Conference on Network and Parallel Computing, Wuhan, China, Oct. 18-20, 2004, pp.9–21.

  11. Song S S, Hwang K, Kwok Y K. Trusted grid computing with security binding and trust integration. Journal of Grid Computing, 2005, 3(1): 53–73.

    Article  Google Scholar 

  12. Tang W, Chen Z. Research on subjective trust management model based on the fuzzy set theory. Journal of Software, 2003, 14(9): 1401–1408.

    MATH  Google Scholar 

  13. Tang W, Hu J B, Chen Z. Research on a fuzzy logic-based subjective trust management model. Journal of Computer Research and Development, 2005, 42(10): 1654–1659.

    Article  Google Scholar 

  14. Li D Y, Meng H J, Shi X M. Membership clouds and membership cloud generators. Journal of Computer Research and Development, 1995, 32(6): 1315–1320.

    Google Scholar 

  15. Li D Y, Cheung D, Shi X M, Ng V. Uncertainty reasoning based on cloud models in controllers. Computers and Mathematics with Application, 1998, 35(3): 99–123.

    Article  MATH  Google Scholar 

  16. Li D Y, Du Y. Artificial Intelligence with Uncertainty. Beijing: National Defense Industry Press, 2005, pp.137–186.

  17. Li D Y, Liu C Y. Study on the universality of the normal cloud model. Engineering Sciences, 2004, 6(8): 28–34.

    Google Scholar 

  18. He R, Niu J, Yuan M, Hu J. A novel cloud-based trust model for pervasive computing. In Proc. the 4th International Conference on Computer and Information Technology, Wuhan, China, Sept. 14-16, 2004, pp.693–700.

  19. He R, Niu J, Zhang G. CBTM: A trust model with uncertainty quantification and reasoning for pervasive computing. In Proc. the 3rd International Symposium on Parallel and Distributed Processing and Applications, Nanjing, China, Nov. 2-5, 2005, pp.541–552.

  20. He R, Niu J, Hu K. A novel approach to evaluate trustworthiness and uncertainty of trust relationships in peer-topeer computing. In Proc. the 5th International Conference on Computer and Information Technology, Shanghai, China, Sept. 21-23, 2005, pp.382–388.

  21. Lu F, Wu H Z. Research of trust valuation based on cloud model. Engineering Sciences, 2008, 10(10): 84–90.

    Google Scholar 

  22. Lu F, Wu H Z. Research of trust valuation and decisionmaking based on cloud model in grid environment. Journal of System Simulation, 2009, 21(2): 421–426.

    Google Scholar 

  23. Meng X Y, Zhang G W, Liu C Y, Kang J C, Li H S. Research on subjective trust management model based on cloud model. Journal of System Simulation, 2007, 19(14): 3310–3317.

    Google Scholar 

  24. Meng X Y, Zhang G W, Kang J C, Li H S, Li D Y. A new subjective trust model based on cloud model. In Proc. the 5th IEEE International Conference on Networking, Sensing and Control, Sanya, China, Apr. 6-8, 2008, pp.1125–1130.

  25. Zhang C L, Liu Y. A cloud-based discrete metric trust management model in open networks. Journal of Internet Technology, 2009, 10(1): 79–82.

    Google Scholar 

  26. Huang H S, Wang R C. Subjective trust evaluation model based on membership cloud theory. Journal of Communication, 2008, 29(4): 13–19.

    Google Scholar 

  27. Lv H Y, Cao D L, Liu Y L. Subjective trust model for collaborative commerce environment. Computer Integrated Manufacturing Systems, 2007, 13(8): 1545–1551.

    Google Scholar 

  28. Wang S X, Zhang L, Wang S, Ma N. An evaluation approach of subjective trust based on cloud model. In Proc. the 1st International Conference on Computer Science and Software Engineering, Wuhan, China, Dec. 12-14, 2008, pp.1062–1068.

  29. Zhang G Y, Zhao D N, Li D Y. The similar cloud and the measurement method. Information and Control, 2004, 33(2): 129–132.

    Google Scholar 

  30. Wu G F, Wang A F, Liu J H. Practical Methods of Data Analysis. Beijing: Chinese Statistics Press, 1992.

    Google Scholar 

  31. Liang Z Q, Shi W S. Analysis of ratings on trust inference in open environments. Performance Evaluation, 2008, 65(2): 99–128.

    Article  Google Scholar 

  32. Recursive Porous Agent Simulation Toolkit. http://repast.sourceforge.net.

Download references

Author information

Authors and Affiliations

Authors

Corresponding author

Correspondence to Wei Du.

Additional information

Supported by the National Natural Science Foundation of China under Grant No. 60703048, the Open Foundation of State Key Lab of Software Engineering ofWuhan University under Grant No. SKLSE20080720, and the Open Foundation of State Key Laboratory for Novel Software Technology of Nanjing University under Grant No. KFKT2009B22.

Rights and permissions

Reprints and permissions

About this article

Cite this article

Du, W., Cui, GH. & Liu, W. An Uncertainty Enhanced Trust Evolution Strategy for e-Science. J. Comput. Sci. Technol. 25, 1225–1236 (2010). https://doi.org/10.1007/s11390-010-9401-6

Download citation

  • Received:

  • Revised:

  • Published:

  • Issue Date:

  • DOI: https://doi.org/10.1007/s11390-010-9401-6

Keywords

Navigation