Font Size: a A A

The Trust Management Based On Evolutionary Game In Cloud Computing

Posted on:2016-12-27Degree:MasterType:Thesis
Country:ChinaCandidate:T T MaFull Text:PDF
GTID:2298330470450756Subject:Management Science and Engineering
Abstract/Summary:PDF Full Text Request
Cloud computing uses virtualization technology to provide data storage,computing services, platform services and software services for individuals andbusinesses. Cloud computing lead the rapid development of Internet technology. Butthe security problems have been on the road of the development way, for example,customer data has been tampered with, lost, network exposed to viruses and otherthreats to paralysis. The appearance of these events not only triggered the safetyscares of the customers, caused the wide attention of the society, but also hindered thefurther development of cloud computing. For the above cloud security, this paperpresents related solutions, do the following research:Firstly, this paper analyzes security problems in cloud computing, but the basicreason is the crisis of confidence that cause by all kinds of security problems and isthe key to hinder the development of cloud computing. So we can strengthen thereputation identification about the participation in cloud service, namely bycomputing credit value, so as to judge the services quality level offered by cloudservice providers, so that the user can choose to buy or accept service.Secondly, this paper lists the factors that influence the calculation about creditvalues and use the analytical hierarchy process to give these factors weight incalculating direct credit value.The article also introduced the NBTVE trust evaluationalgorithm in detail, on this basis, I further optimize the NBTVE algorithm from thetime factor. That is to say, weights of the credit values accumulated by the assessedbefore will reduce over time, the degree of reduction will be more and more greater.This can promote the assessed always maintain good service in order to maintain highcredit values, forming a virtuous cycle. And put forward to give the indirect evaluator different weight base on the evaluator’s own credit value, thus reasonably calculatethe indirect credit value.Finally, this article use the experimental simulation to prove positive effects onrestricting malicious service providers though Introducing credit values thatpromoting the development of cloud counting and brings to harmonious environment.
Keywords/Search Tags:cloud counting, cloud security, credit values, evolutionary game theory
PDF Full Text Request
Related items