Skip to main content
Erschienen in: Peer-to-Peer Networking and Applications 5/2020

27.02.2020

A trust evaluation system based on reputation data in Mobile edge computing network

verfasst von: Xiaoheng Deng, Jin Liu, Leilei Wang, Zhihui Zhao

Erschienen in: Peer-to-Peer Networking and Applications | Ausgabe 5/2020

Einloggen

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to end users and more scholars begin to carry out their different kinds of research under the framework of edge computing. Unlike cloud computing however, edge computing often lacks a centralized security mechanism, which increases the security risks of resource consumers. Therefore, to address security issues for facilitating MEC well, we focus on the establishment of an effective trust evaluation system in this paper. We presented a Reputation-based Trust Evaluation and Management (RTEM) system for a secure and efficient MEC network, wherein the edge servers are adopted to execute reputation data management for mobile edge nodes. In this system, a three-tier trust evaluation framework (identity trust, capability trust, behavior trust) was proposed to ensure the edge nodes that join the network system for service interaction are qualified, capable, and reliable. In order to update and calculate reputation data more accurately, we designed a reputation-based trust evaluation model and evaluated the effectiveness and robustness of our designed model on the OMNeT++ platform. The results show that our proposed mechanism can increase the transaction success rate of the edge network by more than two times compared with the network without trust evaluation mechanism, and perform better than the traditional subject logic (TSL) trust evalaution mechanism.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
1.
Zurück zum Zitat Garcia Lopez P, Montresor A, Epema D et al (2015) Edge-centric computing: vision and challenges[J]. ACM SIGCOMM Computer Communication Review 45(5):37–42CrossRef Garcia Lopez P, Montresor A, Epema D et al (2015) Edge-centric computing: vision and challenges[J]. ACM SIGCOMM Computer Communication Review 45(5):37–42CrossRef
2.
Zurück zum Zitat Roman R, Lopez J, Mambo M (2016) Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges[J]. Futur Gener Comput Syst 78(Part 2):680–698 Roman R, Lopez J, Mambo M (2016) Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges[J]. Futur Gener Comput Syst 78(Part 2):680–698
3.
Zurück zum Zitat Wang S, Zhang X, Zhang Y, Wang L, Yang J, Wang W (2017) A survey on mobile edge networks: convergence of computing, caching and communications. IEEE Access 5:67576779 Wang S, Zhang X, Zhang Y, Wang L, Yang J, Wang W (2017) A survey on mobile edge networks: convergence of computing, caching and communications. IEEE Access 5:67576779
10.
Zurück zum Zitat Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things[J]. Journal Netw Comput Appl 42(3):120–134CrossRef Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things[J]. Journal Netw Comput Appl 42(3):120–134CrossRef
11.
Zurück zum Zitat Gong S F, Zhu J L (2012) A Survey of Reputation and Trust Mechanism in Peer-to-Peer Network[C]// International Conference on Industrial Control and Electronics Engineer- ing.Xi'an:IEEE. 116–119 Gong S F, Zhu J L (2012) A Survey of Reputation and Trust Mechanism in Peer-to-Peer Network[C]// International Conference on Industrial Control and Electronics Engineer- ing.Xi'an:IEEE. 116–119
12.
Zurück zum Zitat Tang W, Ren J, Zhang Y (2019) Enabling trusted and privacy-preserving healthcare Services in Social Media Health Networks. IEEE Trans Multimedia 21(3):579–590CrossRef Tang W, Ren J, Zhang Y (2019) Enabling trusted and privacy-preserving healthcare Services in Social Media Health Networks. IEEE Trans Multimedia 21(3):579–590CrossRef
14.
Zurück zum Zitat Marsh S P (1994) Formalising trust as a computational concept[J]. University of Stirling, Marsh S P (1994) Formalising trust as a computational concept[J]. University of Stirling,
15.
Zurück zum Zitat T.Beth, M.Borcherding, B.Klein (1994) Valuation of trust in open network[C]//Proceedings of the European Symposium on Research in Security (ESOR ICS) 3–18 T.Beth, M.Borcherding, B.Klein (1994) Valuation of trust in open network[C]//Proceedings of the European Symposium on Research in Security (ESOR ICS) 3–18
16.
Zurück zum Zitat M.Blaze, J.Feigenbaum, J.Lacy Decentralized trust management[C]//Proceedings of IEEE symposium on security and privacy. Los Alamitos: IEEE 164–173 M.Blaze, J.Feigenbaum, J.Lacy Decentralized trust management[C]//Proceedings of IEEE symposium on security and privacy. Los Alamitos: IEEE 164–173
17.
Zurück zum Zitat Xiong L, Liu L PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities[C]//Proceedings of IEEE Transactions on knowledge and Data Engineering, 2004: 843–857 Xiong L, Liu L PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities[C]//Proceedings of IEEE Transactions on knowledge and Data Engineering, 2004: 843–857
18.
Zurück zum Zitat Xiong L, Liu L. A reputation-based trust model for peer-to-peer ecommerce Commu- nities[C] Proceedings of IEEE international Conference on electronic commerce, New York: ACM, 2003: 228–229 Xiong L, Liu L. A reputation-based trust model for peer-to-peer ecommerce Commu- nities[C] Proceedings of IEEE international Conference on electronic commerce, New York: ACM, 2003: 228–229
19.
Zurück zum Zitat Kamvar SD, Scholosser Mt, Molina HG. The Eigen trust algorithm for reputation management in P2P networks[C]]//Proceedings of the 12th international world wide web Conf, New York: ACM, 2003: 640–651 Kamvar SD, Scholosser Mt, Molina HG. The Eigen trust algorithm for reputation management in P2P networks[C]]//Proceedings of the 12th international world wide web Conf, New York: ACM, 2003: 640–651
20.
Zurück zum Zitat Damiani E, Di Vimercati SDC, Paraboschi S et al (2003) Managing and sharing servants' reputations in P2P systems[J]. IEEE Trans Knowl Data Eng 15(4):840–854CrossRef Damiani E, Di Vimercati SDC, Paraboschi S et al (2003) Managing and sharing servants' reputations in P2P systems[J]. IEEE Trans Knowl Data Eng 15(4):840–854CrossRef
21.
Zurück zum Zitat Mrmol FG, Prez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks[J]. J Netw Comput Appl 35(3):934–941CrossRef Mrmol FG, Prez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks[J]. J Netw Comput Appl 35(3):934–941CrossRef
22.
Zurück zum Zitat Huang X, Yu R, Kang J, et al. (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks[J]. IEEE Access pp(99):1–1 Huang X, Yu R, Kang J, et al. (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks[J]. IEEE Access pp(99):1–1
23.
Zurück zum Zitat Kantert J, Edenhofer S, Tomforde S, et al. (2015) Representation of trust and reputation in self-managed computing systems[C]//2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE 1827–1834 Kantert J, Edenhofer S, Tomforde S, et al. (2015) Representation of trust and reputation in self-managed computing systems[C]//2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE 1827–1834
24.
Zurück zum Zitat Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 17(4):960–969CrossRef Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 17(4):960–969CrossRef
25.
Zurück zum Zitat Li Z, Chigan CT (2014) On joint privacy and reputation assurance for vehicular ad hoc networks[J]. IEEE Trans Mob Comput 13(10):2334–2344CrossRef Li Z, Chigan CT (2014) On joint privacy and reputation assurance for vehicular ad hoc networks[J]. IEEE Trans Mob Comput 13(10):2334–2344CrossRef
26.
Zurück zum Zitat Noor TH, Sheng QZ, Yao L et al (2016) CloudArmor: supporting reputation-based trust management for cloud services[J]. IEEE Trans Parallel Distrib Syst 27(2):367–380CrossRef Noor TH, Sheng QZ, Yao L et al (2016) CloudArmor: supporting reputation-based trust management for cloud services[J]. IEEE Trans Parallel Distrib Syst 27(2):367–380CrossRef
27.
Zurück zum Zitat Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system[M]//. In: The economics of the Internet and E-Commerce, Emerald Group Publishing Limited, pp 127–157 Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system[M]//. In: The economics of the Internet and E-Commerce, Emerald Group Publishing Limited, pp 127–157
28.
Zurück zum Zitat Mousa H, Mokhtar SB, Hasan O et al (2015) Trust management and reputation systems in mobile participatory sensing applications: a survey[J]. Comput Netw 90:49–73CrossRef Mousa H, Mokhtar SB, Hasan O et al (2015) Trust management and reputation systems in mobile participatory sensing applications: a survey[J]. Comput Netw 90:49–73CrossRef
Metadaten
Titel
A trust evaluation system based on reputation data in Mobile edge computing network
verfasst von
Xiaoheng Deng
Jin Liu
Leilei Wang
Zhihui Zhao
Publikationsdatum
27.02.2020
Verlag
Springer US
Erschienen in
Peer-to-Peer Networking and Applications / Ausgabe 5/2020
Print ISSN: 1936-6442
Elektronische ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00889-3

Weitere Artikel der Ausgabe 5/2020

Peer-to-Peer Networking and Applications 5/2020 Zur Ausgabe