Skip to main content

2019 | OriginalPaper | Buchkapitel

Mobile Agent-Based Mobile Intelligent Business Security Transaction Model

verfasst von : Wei-Jin Jiang, Jia-Hui Chen, Yu-Hui Xu, Yang Wang

Erschienen in: Computer Supported Cooperative Work and Social Computing

Verlag: Springer Singapore

Aktivieren Sie unsere intelligente Suche, um passende Fachinhalte oder Patente zu finden.

search-config
loading …

Abstract

The flexibility and convenience of mobile commerce is more in line with the needs of e-commerce in the new era, but it also brings a series of unique security issues in the mobile environment. The serious information asymmetry between the two sides of the transaction creates more opportunities for fraud. This has caused consumers to lose trust in the mobile commerce market. The phenomenon of mobile commerce fraud and lack of trust has become one of the main factors hindering the development of mobile commerce. The paper proposes a dynamic trust computing model which is based on mobile agent, which realizes the qualitative and quantitative conversion of trust. To stop malicious users from credit hype and deception, a special attribute evaluation method and trust punishment method are proposed. The new user trust degree assignment method has been improved, and a method of dynamically setting the initial trust degree of new users based on the minimum trust degree of the previous system is proposed, which resists the ruin behavior of abandoning the reputation data at random. By adopting the transaction evaluation system and weights. The system introduces a multi-factor mechanism. The model better reflects the influence of subjective factors such as individual preference and risk attitude on trust calculation, and enhances the sensitivity of trust algorithm in trading individual attributes. Detailed theoretical analysis and a large number of simulation experiments verify the mechanism can solve the problem of trust computing in mobile network transactions.

Sie haben noch keine Lizenz? Dann Informieren Sie sich jetzt über unsere Produkte:

Springer Professional "Wirtschaft+Technik"

Online-Abonnement

Mit Springer Professional "Wirtschaft+Technik" erhalten Sie Zugriff auf:

  • über 102.000 Bücher
  • über 537 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Maschinenbau + Werkstoffe
  • Versicherung + Risiko

Jetzt Wissensvorsprung sichern!

Springer Professional "Technik"

Online-Abonnement

Mit Springer Professional "Technik" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 390 Zeitschriften

aus folgenden Fachgebieten:

  • Automobil + Motoren
  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Elektrotechnik + Elektronik
  • Energie + Nachhaltigkeit
  • Maschinenbau + Werkstoffe




 

Jetzt Wissensvorsprung sichern!

Springer Professional "Wirtschaft"

Online-Abonnement

Mit Springer Professional "Wirtschaft" erhalten Sie Zugriff auf:

  • über 67.000 Bücher
  • über 340 Zeitschriften

aus folgenden Fachgebieten:

  • Bauwesen + Immobilien
  • Business IT + Informatik
  • Finance + Banking
  • Management + Führung
  • Marketing + Vertrieb
  • Versicherung + Risiko




Jetzt Wissensvorsprung sichern!

Literatur
2.
Zurück zum Zitat Ae, K.Y., Rasik, P.: A trust prediction framework in rating-based on experience sharing social networks without a Web of Trust. Inf. Sci. 191(3), 128–145 (2012)MATH Ae, K.Y., Rasik, P.: A trust prediction framework in rating-based on experience sharing social networks without a Web of Trust. Inf. Sci. 191(3), 128–145 (2012)MATH
3.
Zurück zum Zitat Nan, H., Ling, L., Sambamurthy, V.: Fraud detection in online consumer reviews. Decis. Support Syst. 50(3), 614–626 (2011)CrossRef Nan, H., Ling, L., Sambamurthy, V.: Fraud detection in online consumer reviews. Decis. Support Syst. 50(3), 614–626 (2011)CrossRef
4.
Zurück zum Zitat Zhang, Z.Q., Xie, X.Q., et al.: CRank: a credit assessment model in C2C e-Commerce. Inf. Syst. Dev. 5, 333–343 (2011)CrossRef Zhang, Z.Q., Xie, X.Q., et al.: CRank: a credit assessment model in C2C e-Commerce. Inf. Syst. Dev. 5, 333–343 (2011)CrossRef
5.
Zurück zum Zitat Yun, Y.: C2C transactions in the dynamic credit evaluation model. Inf. Sci. 28(4), 563–566 (2010) Yun, Y.: C2C transactions in the dynamic credit evaluation model. Inf. Sci. 28(4), 563–566 (2010)
6.
Zurück zum Zitat Yaghoubi, N.: Trust models in e-Business: analytical-compare approach. Interdiscip. J. Contemp. Res. Bus. 2(9), 398–416 (2011) Yaghoubi, N.: Trust models in e-Business: analytical-compare approach. Interdiscip. J. Contemp. Res. Bus. 2(9), 398–416 (2011)
7.
Zurück zum Zitat Zhang, X.: A strengthening of security solutions C2C transaction integrity. Microelectron. Comput. 27(5), 194–198 (2010) Zhang, X.: A strengthening of security solutions C2C transaction integrity. Microelectron. Comput. 27(5), 194–198 (2010)
8.
Zurück zum Zitat Marsh, S.: Formalising trust as a computational concept. Ph.D. thesis, University of Stirling (1994) Marsh, S.: Formalising trust as a computational concept. Ph.D. thesis, University of Stirling (1994)
9.
Zurück zum Zitat Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the Symposium on Security and Privacy, Oakland, pp. 164–173 (1996) Blaze, M., Feigenbaum, J., Lacy, J.: Decentralized trust management. In: Proceedings of the Symposium on Security and Privacy, Oakland, pp. 164–173 (1996)
10.
Zurück zum Zitat Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: trust management for public-key infrastructures. In: Proceedings of the 1998 Security Protocols International Workshop, Cambridge, England, pp. 59–63 (1998) Blaze, M., Feigenbaum, J., Keromytis, A.D.: Keynote: trust management for public-key infrastructures. In: Proceedings of the 1998 Security Protocols International Workshop, Cambridge, England, pp. 59–63 (1998)
11.
Zurück zum Zitat Griffiths, N.: Task delegation using experience based multi-dimensional trust. In: Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems, Netherlands, pp. 489–496. ACM Press, London (2005) Griffiths, N.: Task delegation using experience based multi-dimensional trust. In: Proceedings of the 4th International Joint Conference on Autonomous Agents and Multiagent Systems, Netherlands, pp. 489–496. ACM Press, London (2005)
12.
Zurück zum Zitat Zhang, Q., Zhang, X., Wen, X.Z., Liu, J.R., Ting, S.: Construction of peer-to-peer multiple-grain trust model. J. Softw. 17(1), 96–107 (2006)CrossRef Zhang, Q., Zhang, X., Wen, X.Z., Liu, J.R., Ting, S.: Construction of peer-to-peer multiple-grain trust model. J. Softw. 17(1), 96–107 (2006)CrossRef
15.
Zurück zum Zitat Reece, S., Rogers, A., Roberts, S., Jennings, N.R.: Rumours and reputation: evaluating multi-dimensional trust within a decentralized reputation system. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1–8. ACM Press, Honolulu (2007) Reece, S., Rogers, A., Roberts, S., Jennings, N.R.: Rumours and reputation: evaluating multi-dimensional trust within a decentralized reputation system. In: Proceedings of the 6th International Joint Conference on Autonomous Agents and Multiagent Systems, pp. 1–8. ACM Press, Honolulu (2007)
16.
Zurück zum Zitat Reece, S., Roberts, S., Rogers, A., Jennings, N.R.: A multi-dimensional trust model for heterogeneous contract observations. In: Proceedings of the 22th AAAI Conference on Artificial Intelligence, pp. 128–135. AAAI Press, London (2007) Reece, S., Roberts, S., Rogers, A., Jennings, N.R.: A multi-dimensional trust model for heterogeneous contract observations. In: Proceedings of the 22th AAAI Conference on Artificial Intelligence, pp. 128–135. AAAI Press, London (2007)
17.
Zurück zum Zitat Wang, S., Zhang, L., Li, H.-S.: Evaluation approach of subjective trust based on cloud model. J. Softw. 21(6), 1341–1352 (2010)CrossRef Wang, S., Zhang, L., Li, H.-S.: Evaluation approach of subjective trust based on cloud model. J. Softw. 21(6), 1341–1352 (2010)CrossRef
19.
Zurück zum Zitat Ashtiani, M., Azgomi, M.A.: Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR. Soft Comput. 20(1), 399–421 (2016)CrossRef Ashtiani, M., Azgomi, M.A.: Trust modeling based on a combination of fuzzy analytic hierarchy process and fuzzy VIKOR. Soft Comput. 20(1), 399–421 (2016)CrossRef
20.
Zurück zum Zitat Wu, T., Xiao, J., Qin, K., et al.: Cloud model-based method for range constrained thresholding. Comput. Electr. Eng. 42(2), 33–48 (2015)CrossRef Wu, T., Xiao, J., Qin, K., et al.: Cloud model-based method for range constrained thresholding. Comput. Electr. Eng. 42(2), 33–48 (2015)CrossRef
21.
Zurück zum Zitat McCole, P., Ramsey, E., Williams, J.: Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. J. Bus. Res. 63(9/10), 1018–1024 (2010)CrossRef McCole, P., Ramsey, E., Williams, J.: Trust considerations on attitudes towards online purchasing: the moderating effect of privacy and security concerns. J. Bus. Res. 63(9/10), 1018–1024 (2010)CrossRef
22.
Zurück zum Zitat Jun, X.: Survey of trust model based on uncertainty theory. J. Chin. Comput. Syst. 38(1), 99–106 (2017) Jun, X.: Survey of trust model based on uncertainty theory. J. Chin. Comput. Syst. 38(1), 99–106 (2017)
23.
Zurück zum Zitat Jiang, W., Xu, Y., Guo, H., Zhang, L.: Multi agent system-based dynamic trust calculation model and credit management mechanism of online trading. Sci. China Inf. Sci. 44(9), 1084–1101 (2014) Jiang, W., Xu, Y., Guo, H., Zhang, L.: Multi agent system-based dynamic trust calculation model and credit management mechanism of online trading. Sci. China Inf. Sci. 44(9), 1084–1101 (2014)
Metadaten
Titel
Mobile Agent-Based Mobile Intelligent Business Security Transaction Model
verfasst von
Wei-Jin Jiang
Jia-Hui Chen
Yu-Hui Xu
Yang Wang
Copyright-Jahr
2019
Verlag
Springer Singapore
DOI
https://doi.org/10.1007/978-981-13-3044-5_4