Developing a trust model for pervasive computing based on Apriori association rules learning and Bayesian classification

被引:52
作者
D'Angelo, Gianni [1 ]
Rampone, Salvatore [1 ]
Palmieri, Francesco [2 ]
机构
[1] Univ Sannio, Dept Sci & Technol, Via Mulini 59A, I-82100 Benevento, Italy
[2] Univ Salerno, Dept Comp Sci, Via Giovanni Paolo 2 132, I-84084 Fisciano, SA, Italy
关键词
Pervasive computing; Trust model; Artificial intelligence; Apriori algorithm; Naive Bayes classifier;
D O I
10.1007/s00500-016-2183-1
中图分类号
TP18 [人工智能理论];
学科分类号
081104 ; 0812 ; 0835 ; 1405 ;
摘要
Pervasive computing is one of the latest and more advanced paradigms currently available in the computers arena. Its ability to provide the distribution of computational services within environments where people live, work or socialize leads to make issues such as privacy, trust and identity more challenging compared to traditional computing environments. In this work, we review these general issues and propose a pervasive computing architecture based on a simple but effective trust model that is better able to cope with them. The proposed architecture combines some artificial intelligence techniques to achieve close resemblance with human-like decision making. Accordingly, Apriori algorithm is first used in order to extract the behavioral patterns adopted from the users during their network interactions. Na < ve Bayes classifier is then used for final decision making expressed in term of probability of user trustworthiness. To validate our approach, we applied it to some typical ubiquitous computing scenarios. The obtained results demonstrated the usefulness of such approach and the competitiveness against other existing ones.
引用
收藏
页码:6297 / 6315
页数:19
相关论文
共 68 条
  • [51] The Effects of an Interactive Software Agent on Student Affective Dynamics while Using an Intelligent Tutoring System
    Rodrigo, Ma. Mercedes T.
    Baker, Ryan S. J. D.
    Agapito, Jenilyn
    Nabos, Julieta
    Concepcion Repalam, Ma.
    Reyes, Salvador S., Jr.
    San Pedro, Maria Ofelia C. Z.
    [J]. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING, 2012, 3 (02) : 224 - 236
  • [52] Salleb-Aouissi A, 2013, J MACH LEARN RES, V14, P3153
  • [53] Sharifi A., 2013, INT J ENG INNOVATIE, V3, P40
  • [54] Spiekermann S., 2001, EC'01. Proceedings of the 3rd ACM Conference on Electronic Commerce, P38, DOI 10.1145/501158.501163
  • [55] Srikant R., 1996, Mining sequential patterns: Generalizations and performance improvements, P1, DOI [DOI 10.1145/235968.233311, 10.1007/BFb0014140]
  • [56] On trust models and trust evaluation metrics for ad hoc networks
    Theodorakopoulos, G
    Baras, JS
    [J]. IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2006, 24 (02) : 318 - 328
  • [57] Ullman J. D., 2000, Discovery Science. Third International Conference, DS 2000. Proceedings (Lecture Notes in Artificial Intelligence Vol.1967), P1
  • [58] Viana MM, 2007, ICT-MICC: 2007 IEEE INTERNATIONAL CONFERENCE ON TELECOMMUNICATIONS AND MALAYSIA INTERNATIONAL CONFERENCE ON COMMUNICATIONS, VOLS 1 AND 2, PROCEEDINGS, P124
  • [59] Speech Emotion Recognition Using Fourier Parameters
    Wang, Kunxia
    An, Ning
    Li, Bing Nan
    Zhang, Yanyong
    [J]. IEEE TRANSACTIONS ON AFFECTIVE COMPUTING, 2015, 6 (01) : 69 - 75
  • [60] A Vector-Based Trust Model for P2P E-commerce
    Wang, Qian
    Wang, Lifang
    [J]. ICNC 2008: FOURTH INTERNATIONAL CONFERENCE ON NATURAL COMPUTATION, VOL 7, PROCEEDINGS, 2008, : 117 - 123