Skip to main content

Agent-Based Credibility Protection Model for Decentralized Network Computing Environment

  • Conference paper
Advanced Parallel Processing Technologies (APPT 2013)

Part of the book series: Lecture Notes in Computer Science ((LNTCS,volume 8299))

Included in the following conference series:

  • 1322 Accesses

Abstract

Decentralized networks have some unique characteristics, such as heterogeneity, autonomy, distribution and openness, which lead to serious security issues and low credibility. In this paper, the agent technology is utilized to construct a novel credibility protection model, which efficiently makes open, disordered, decentralized networks evolve gradually as an orderly, stable and reliable computing environment. Within this model, our research is focused on the credibility measurement mechanism, and a novel behavior-credibility evaluation algorithm is proposed. The evaluation value of behavior-credibility is calculated based on the current and historical performances of nodes as service providers and consumers to make an accurate prediction. Based on a decentralized network simulation environment, we conducted several rounds of simulation experiments to test the function, performance and validity of the model, mechanism and algorithm.

This is a preview of subscription content, log in via an institution to check access.

Access this chapter

Chapter
USD 29.95
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
eBook
USD 39.99
Price excludes VAT (USA)
  • Available as PDF
  • Read on any device
  • Instant download
  • Own it forever
Softcover Book
USD 54.99
Price excludes VAT (USA)
  • Compact, lightweight edition
  • Dispatched in 3 to 5 business days
  • Free shipping worldwide - see info

Tax calculation will be finalised at checkout

Purchases are for personal use only

Institutional subscriptions

Preview

Unable to display preview. Download preview PDF.

Unable to display preview. Download preview PDF.

References

  1. Shen, C., Zhang, H., Wang, H.: Research on Trusted Computing and its Development. Science China: Information Sciences 3, 405–433 (2010)

    Article  Google Scholar 

  2. Liu, K., Shan, Z., Wang, J.: Survey of Basic Research in Trusted Software. Sci. Found China 3, 145–151 (2008)

    Google Scholar 

  3. Xu, X., Wang, R.: The Collaboration Alliance Mechanism of P2P Based on Mobile Multi-agent Technology. Journal of Electronics & Information Technology 2, 345–349 (2007)

    Google Scholar 

  4. Wang, H., Tang, Y., Yi, G.: Trustworthiness of Internet-based software. Science in China Series E: Information Sciences 10, 759–773 (2006)

    Article  Google Scholar 

  5. Jiang, W., Zhang, L., Wang, P.: Dynamic Scheduling Model of Computing Resource Based on MAS Cooperation Mechanism. Science in China Series F: Information Sciences 8, 1302–1320 (2009)

    Article  Google Scholar 

  6. Dou, W., Wang, H., Jia, Y., Zou, P.: A Recommendation-Based Peer-to-Peer Trust Model. Journal of Software 4, 571–583 (2004)

    MathSciNet  Google Scholar 

Download references

Author information

Authors and Affiliations

Authors

Editor information

Editors and Affiliations

Rights and permissions

Reprints and permissions

Copyright information

© 2013 Springer-Verlag Berlin Heidelberg

About this paper

Cite this paper

Xu, X., Tu, Q., Wang, X. (2013). Agent-Based Credibility Protection Model for Decentralized Network Computing Environment. In: Wu, C., Cohen, A. (eds) Advanced Parallel Processing Technologies. APPT 2013. Lecture Notes in Computer Science, vol 8299. Springer, Berlin, Heidelberg. https://doi.org/10.1007/978-3-642-45293-2_20

Download citation

  • DOI: https://doi.org/10.1007/978-3-642-45293-2_20

  • Publisher Name: Springer, Berlin, Heidelberg

  • Print ISBN: 978-3-642-45292-5

  • Online ISBN: 978-3-642-45293-2

  • eBook Packages: Computer ScienceComputer Science (R0)

Publish with us

Policies and ethics