2016
DOI: 10.3390/e19010011
|View full text |Cite
|
Sign up to set email alerts
|

A Cloud Theory-Based Trust Computing Model in Social Networks

Abstract: How to develop a trust management model and then to efficiently control and manage nodes is an important issue in the scope of social network security. In this paper, a trust management model based on a cloud model is proposed. The cloud model uses a specific computation operator to achieve the transformation from qualitative concepts to quantitative computation. Additionally, this can also be used to effectively express the fuzziness, randomness and the relationship between them of the subjective trust. The n… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
8
0

Year Published

2018
2018
2024
2024

Publication Types

Select...
7
1
1

Relationship

3
6

Authors

Journals

citations
Cited by 11 publications
(8 citation statements)
references
References 28 publications
0
8
0
Order By: Relevance
“…En indicates the uncertainty measure of qualitative concept, which reflects the dispersion degree of cloud droplet, which is determined by the ambiguity and randomness of qualitative concept. He is a measure of the fuzziness of entropy, the size of which indirectly reflects the thickness of cloud droplets and the fuzziness and randomness of entropy [34][35][36].…”
Section: Numerical Characteristics Of Cloudsmentioning
confidence: 99%
“…En indicates the uncertainty measure of qualitative concept, which reflects the dispersion degree of cloud droplet, which is determined by the ambiguity and randomness of qualitative concept. He is a measure of the fuzziness of entropy, the size of which indirectly reflects the thickness of cloud droplets and the fuzziness and randomness of entropy [34][35][36].…”
Section: Numerical Characteristics Of Cloudsmentioning
confidence: 99%
“…According to present problems of the ad-hoc network and the node attributes, Wang Xiaodong et al [19] built a model to evaluate the credibility of ad-hoc network nodes by using Bayesian network. After analyzing the structure pattern of online shopping software, Si Guannan et al [20][21][22][23][24][25] established a multilayer credibility evaluation system and realized the credibility index evaluation of online shopping software on the basis of Bayesian network bottom-up analysis. Liang Hongquan et al [26] considered the interpersonal trust model and studied the trusted relationship of network nodes.…”
Section: Related Workmentioning
confidence: 99%
“…Spoofing attacks have grown exponentially in the last few years [14][15][16]. Among other areas, social networks have recently reported serious privacy and security issues [17][18][19]. Therefore, to ensure a higher security level in social networks it would be convenient to implement some kind of spoofing detector.…”
Section: Introductionmentioning
confidence: 99%