Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification

被引:52
作者
D'Angelo, Gianni [1 ]
Rampone, Salvatore [1 ]
Palmieri, Francesco [2 ]
机构
[1] Univ Sannio, Dept Sci & Technol, Via Mulini 59A, I-82100 Benevento, Italy
[2] Univ Salerno, Dept Comp Sci, Via Giovanni Paolo 2 132, I-84084 Fisciano, SA, Italy
关键词
Pervasive computing; Trust model; Artificial intelligence; Apriori algorithm; Naive Bayes classifier;
D O I
10.1007/s00500-016-2183-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Pervasive computing is one of the latest and more advanced paradigms currently available in the computers arena. Its ability to provide the distribution of computational services within environments where people live, work or socialize leads to make issues such as privacy, trust and identity more challenging compared to traditional computing environments. In this work, we review these general issues and propose a pervasive computing architecture based on a simple but effective trust model that is better able to cope with them. The proposed architecture combines some artificial intelligence techniques to achieve close resemblance with human-like decision making. Accordingly, Apriori algorithm is first used in order to extract the behavioral patterns adopted from the users during their network interactions. Na < ve Bayes classifier is then used for final decision making expressed in term of probability of user trustworthiness. To validate our approach, we applied it to some typical ubiquitous computing scenarios. The obtained results demonstrated the usefulness of such approach and the competitiveness against other existing ones.
引用
收藏
页码:6297 / 6315
页数:19
相关论文
共 68 条
  • [1] Afzali Boroujeni G. A., 2013, E COMMERCE DEV COUNT, P1
  • [2] Agrawal R., 1993, SIGMOD Record, V22, P207, DOI 10.1145/170036.170072
  • [3] Al-Karkhi A, 2012, INT J DISTRIB PARALL, V3, P197
  • [4] [Anonymous], 2003, P 12 INT C WORLD WID
  • [5] [Anonymous], 1999, ARTIFICIAL INTELLIGE
  • [6] [Anonymous], 2005, J INFORM TECHNOLOGY
  • [7] [Anonymous], 1988, TRUST MAKING BREAKIN
  • [8] [Anonymous], INT J COMPUTER SCI I
  • [9] [Anonymous], 1999, RFC2693
  • [10] [Anonymous], 2007, P 2007 INT C SERV SY, DOI DOI 10.1109/ICSSSM.2007.4280214