Skip to main content
Top
Published in: Peer-to-Peer Networking and Applications 5/2020

27-02-2020

A trust evaluation system based on reputation data in Mobile edge computing network

Authors: Xiaoheng Deng, Jin Liu, Leilei Wang, Zhihui Zhao

Published in: Peer-to-Peer Networking and Applications | Issue 5/2020

Log in

Activate our intelligent search to find suitable subject content or patents.

search-config
loading …

Abstract

In recent days, Mobile Edge Computing (MEC) emerges as a new computing paradigm that pushes computing resources towards the edge of the Internet and close to end users and more scholars begin to carry out their different kinds of research under the framework of edge computing. Unlike cloud computing however, edge computing often lacks a centralized security mechanism, which increases the security risks of resource consumers. Therefore, to address security issues for facilitating MEC well, we focus on the establishment of an effective trust evaluation system in this paper. We presented a Reputation-based Trust Evaluation and Management (RTEM) system for a secure and efficient MEC network, wherein the edge servers are adopted to execute reputation data management for mobile edge nodes. In this system, a three-tier trust evaluation framework (identity trust, capability trust, behavior trust) was proposed to ensure the edge nodes that join the network system for service interaction are qualified, capable, and reliable. In order to update and calculate reputation data more accurately, we designed a reputation-based trust evaluation model and evaluated the effectiveness and robustness of our designed model on the OMNeT++ platform. The results show that our proposed mechanism can increase the transaction success rate of the edge network by more than two times compared with the network without trust evaluation mechanism, and perform better than the traditional subject logic (TSL) trust evalaution mechanism.

Dont have a licence yet? Then find out more about our products and how to get one now:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literature
1.
go back to reference Garcia Lopez P, Montresor A, Epema D et al (2015) Edge-centric computing: vision and challenges[J]. ACM SIGCOMM Computer Communication Review 45(5):37–42CrossRef Garcia Lopez P, Montresor A, Epema D et al (2015) Edge-centric computing: vision and challenges[J]. ACM SIGCOMM Computer Communication Review 45(5):37–42CrossRef
2.
go back to reference Roman R, Lopez J, Mambo M (2016) Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges[J]. Futur Gener Comput Syst 78(Part 2):680–698 Roman R, Lopez J, Mambo M (2016) Mobile edge computing, fog et al.: A survey and analysis of security threats and challenges[J]. Futur Gener Comput Syst 78(Part 2):680–698
3.
go back to reference Wang S, Zhang X, Zhang Y, Wang L, Yang J, Wang W (2017) A survey on mobile edge networks: convergence of computing, caching and communications. IEEE Access 5:67576779 Wang S, Zhang X, Zhang Y, Wang L, Yang J, Wang W (2017) A survey on mobile edge networks: convergence of computing, caching and communications. IEEE Access 5:67576779
10.
go back to reference Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things[J]. Journal Netw Comput Appl 42(3):120–134CrossRef Yan Z, Zhang P, Vasilakos AV (2014) A survey on trust management for internet of things[J]. Journal Netw Comput Appl 42(3):120–134CrossRef
11.
go back to reference Gong S F, Zhu J L (2012) A Survey of Reputation and Trust Mechanism in Peer-to-Peer Network[C]// International Conference on Industrial Control and Electronics Engineer- ing.Xi'an:IEEE. 116–119 Gong S F, Zhu J L (2012) A Survey of Reputation and Trust Mechanism in Peer-to-Peer Network[C]// International Conference on Industrial Control and Electronics Engineer- ing.Xi'an:IEEE. 116–119
12.
go back to reference Tang W, Ren J, Zhang Y (2019) Enabling trusted and privacy-preserving healthcare Services in Social Media Health Networks. IEEE Trans Multimedia 21(3):579–590CrossRef Tang W, Ren J, Zhang Y (2019) Enabling trusted and privacy-preserving healthcare Services in Social Media Health Networks. IEEE Trans Multimedia 21(3):579–590CrossRef
14.
go back to reference Marsh S P (1994) Formalising trust as a computational concept[J]. University of Stirling, Marsh S P (1994) Formalising trust as a computational concept[J]. University of Stirling,
15.
go back to reference T.Beth, M.Borcherding, B.Klein (1994) Valuation of trust in open network[C]//Proceedings of the European Symposium on Research in Security (ESOR ICS) 3–18 T.Beth, M.Borcherding, B.Klein (1994) Valuation of trust in open network[C]//Proceedings of the European Symposium on Research in Security (ESOR ICS) 3–18
16.
go back to reference M.Blaze, J.Feigenbaum, J.Lacy Decentralized trust management[C]//Proceedings of IEEE symposium on security and privacy. Los Alamitos: IEEE 164–173 M.Blaze, J.Feigenbaum, J.Lacy Decentralized trust management[C]//Proceedings of IEEE symposium on security and privacy. Los Alamitos: IEEE 164–173
17.
go back to reference Xiong L, Liu L PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities[C]//Proceedings of IEEE Transactions on knowledge and Data Engineering, 2004: 843–857 Xiong L, Liu L PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities[C]//Proceedings of IEEE Transactions on knowledge and Data Engineering, 2004: 843–857
18.
go back to reference Xiong L, Liu L. A reputation-based trust model for peer-to-peer ecommerce Commu- nities[C] Proceedings of IEEE international Conference on electronic commerce, New York: ACM, 2003: 228–229 Xiong L, Liu L. A reputation-based trust model for peer-to-peer ecommerce Commu- nities[C] Proceedings of IEEE international Conference on electronic commerce, New York: ACM, 2003: 228–229
19.
go back to reference Kamvar SD, Scholosser Mt, Molina HG. The Eigen trust algorithm for reputation management in P2P networks[C]]//Proceedings of the 12th international world wide web Conf, New York: ACM, 2003: 640–651 Kamvar SD, Scholosser Mt, Molina HG. The Eigen trust algorithm for reputation management in P2P networks[C]]//Proceedings of the 12th international world wide web Conf, New York: ACM, 2003: 640–651
20.
go back to reference Damiani E, Di Vimercati SDC, Paraboschi S et al (2003) Managing and sharing servants' reputations in P2P systems[J]. IEEE Trans Knowl Data Eng 15(4):840–854CrossRef Damiani E, Di Vimercati SDC, Paraboschi S et al (2003) Managing and sharing servants' reputations in P2P systems[J]. IEEE Trans Knowl Data Eng 15(4):840–854CrossRef
21.
go back to reference Mrmol FG, Prez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks[J]. J Netw Comput Appl 35(3):934–941CrossRef Mrmol FG, Prez GM (2012) TRIP, a trust and reputation infrastructure-based proposal for vehicular ad hoc networks[J]. J Netw Comput Appl 35(3):934–941CrossRef
22.
go back to reference Huang X, Yu R, Kang J, et al. (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks[J]. IEEE Access pp(99):1–1 Huang X, Yu R, Kang J, et al. (2017) Distributed reputation management for secure and efficient vehicular edge computing and networks[J]. IEEE Access pp(99):1–1
23.
go back to reference Kantert J, Edenhofer S, Tomforde S, et al. (2015) Representation of trust and reputation in self-managed computing systems[C]//2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE 1827–1834 Kantert J, Edenhofer S, Tomforde S, et al. (2015) Representation of trust and reputation in self-managed computing systems[C]//2015 IEEE international conference on computer and information technology; ubiquitous computing and communications; dependable, autonomic and secure computing; pervasive intelligence and computing. IEEE 1827–1834
24.
go back to reference Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 17(4):960–969CrossRef Li W, Song H (2016) ART: an attack-resistant trust management scheme for securing vehicular ad hoc networks[J]. IEEE Trans Intell Transp Syst 17(4):960–969CrossRef
25.
go back to reference Li Z, Chigan CT (2014) On joint privacy and reputation assurance for vehicular ad hoc networks[J]. IEEE Trans Mob Comput 13(10):2334–2344CrossRef Li Z, Chigan CT (2014) On joint privacy and reputation assurance for vehicular ad hoc networks[J]. IEEE Trans Mob Comput 13(10):2334–2344CrossRef
26.
go back to reference Noor TH, Sheng QZ, Yao L et al (2016) CloudArmor: supporting reputation-based trust management for cloud services[J]. IEEE Trans Parallel Distrib Syst 27(2):367–380CrossRef Noor TH, Sheng QZ, Yao L et al (2016) CloudArmor: supporting reputation-based trust management for cloud services[J]. IEEE Trans Parallel Distrib Syst 27(2):367–380CrossRef
27.
go back to reference Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system[M]//. In: The economics of the Internet and E-Commerce, Emerald Group Publishing Limited, pp 127–157 Resnick P, Zeckhauser R (2002) Trust among strangers in internet transactions: Empirical analysis of eBay's reputation system[M]//. In: The economics of the Internet and E-Commerce, Emerald Group Publishing Limited, pp 127–157
28.
go back to reference Mousa H, Mokhtar SB, Hasan O et al (2015) Trust management and reputation systems in mobile participatory sensing applications: a survey[J]. Comput Netw 90:49–73CrossRef Mousa H, Mokhtar SB, Hasan O et al (2015) Trust management and reputation systems in mobile participatory sensing applications: a survey[J]. Comput Netw 90:49–73CrossRef
Metadata
Title
A trust evaluation system based on reputation data in Mobile edge computing network
Authors
Xiaoheng Deng
Jin Liu
Leilei Wang
Zhihui Zhao
Publication date
27-02-2020
Publisher
Springer US
Published in
Peer-to-Peer Networking and Applications / Issue 5/2020
Print ISSN: 1936-6442
Electronic ISSN: 1936-6450
DOI
https://doi.org/10.1007/s12083-020-00889-3

Other articles of this Issue 5/2020

Peer-to-Peer Networking and Applications 5/2020 Go to the issue

Premium Partner