Trust Mechanism-Based Multi-Tier Computing System for Service-Oriented Edge-Cloud Networks

被引:12
作者
Huang, Mingfeng [1 ]
Li, Zhetao [2 ]
Xiao, Fu [3 ]
Long, Saiqin [2 ]
Liu, Anfeng [1 ]
机构
[1] Cent South Univ, Sch Comp Sci & Engn, Changsha 410083, Hunan, Peoples R China
[2] Jinan Univ, Coll Informat Sci & Technol, Natl & Local Joint Engn Res Ctr Network Secur Dete, Guangdong Prov Key Lab Data Secur & Privacy Protec, Guangzhou 510632, Guangdong, Peoples R China
[3] Nanjing Univ Posts & Telecommun, Sch Comp Sci, Nanjing 210003, Jiangsu, Peoples R China
基金
中国国家自然科学基金;
关键词
Edge-cloud networks; trust evaluation; trust detection; data security; INTERNET;
D O I
10.1109/TDSC.2023.3285927
中图分类号
TP3 [计算技术、计算机技术];
学科分类号
0812 ;
摘要
Edge-cloud networks face security threats during data collection, data routing, and service construction, resulting in data tampering, stealing, and communication interruption. Trust mechanism can predict data quality and cooperation probability of nodes before purchasing data or establishing cooperation, so as to select trusted participants for data perception and interaction. Howe ver, there are some problems with existing trust methods, such as limited evaluation scope, incomplete trust evidence, and inaccurate evaluation results. To address these issues, a Trust mechanism-based Multi-Tier Computing system (TMTC) is proposed in this article. Specifically, we propose a two-tier trust evaluation model. At the data collection layer, it conducts trust evaluation on data reporters based on data submission and communication interactions. At the network layer, it evaluates trust of routers through path backtracking verification, multi-service analysis and coincident path analysis. Then, based on evaluation results, a differentiated trust detection is initiated for normal and abnormal nodes. And high-frequency detection tasks are initiated for malicious nodes to improve accuracy, sparse detection tasks are initiated for normal nodes to reduce costs. Finally, extensive experiments conducted on the synthetic and real-world datasets demonstrate that, TMTC can resist data tampering and good-bad mouth attacks effectively. And whether in a dense or uniform scene, it outperforms two benchmark methods by increasing malicious node detection rate by 13.37%-21.87% and reducing cost by 18.8%-50.32%.
引用
收藏
页码:1639 / 1651
页数:13
相关论文
共 33 条
[1]   Data Collection in Smart Communities Using Sensor Cloud: Recent Advances, Taxonomy, and Future Research Directions [J].
Ali, Ihsan ;
Gani, Abdullah ;
Ahmedy, Ismail ;
Yaqoob, Ibrar ;
Khan, Suleman ;
Anisi, Mohammad Hossein .
IEEE COMMUNICATIONS MAGAZINE, 2018, 56 (07) :192-197
[2]  
[Anonymous], 2014, Parking places of Beijing
[3]   Node-Level Trust Evaluation in Wireless Sensor Networks [J].
Desai, S. Sundeep ;
Nene, Manisha J. .
IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, 2019, 14 (08) :2139-2152
[4]   UAV-Empowered Edge Computing Environment for Cyber-Threat Detection in Smart Vehicles [J].
Garg, Sahil ;
Singh, Amritpal ;
Batra, Shalini ;
Kumar, Neeraj ;
Yang, Laurence T. .
IEEE NETWORK, 2018, 32 (03) :42-51
[5]  
Gupta S., SYNTHESIS LECT DATA, P2021
[6]  
Gupta S, 2022, Arxiv, DOI arXiv:2201.00982
[7]   A Synergetic Trust Model Based on SVM in Underwater Acoustic Sensor Networks [J].
Han, Guangjie ;
He, Yu ;
Jiang, Jinfang ;
Wang, Ning ;
Guizani, Mohsen ;
Ansere, James Adu .
IEEE TRANSACTIONS ON VEHICULAR TECHNOLOGY, 2019, 68 (11) :11239-11247
[8]   A UAV-Assisted Ubiquitous Trust Communication System in 5G and Beyond Networks [J].
Huang, Mingfeng ;
Liu, Anfeng ;
Xiong, Neal N. ;
Wu, Jie .
IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2021, 39 (11) :3444-3458
[9]  
IETF RATS, About us
[10]  
IntelliJ IDEA, About us