2018
DOI: 10.1016/j.future.2018.01.026
|View full text |Cite
|
Sign up to set email alerts
|

DTRM: A new reputation mechanism to enhance data trustworthiness for high-performance cloud computing

Abstract: Cloud computing and the mobile Internet have been the two most influential information technology revolutions, which intersect in mobile cloud computing (MCC). The burgeoning MCC enables the large-scale collection and processing of big data, which demand trusted, authentic, and accurate data to ensure an important but often overlooked aspect of big data --data veracity. Troublesome internal attacks launched by internal malicious users is one key problem that reduces data veracity and remains difficult to handl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1

Citation Types

0
1
0

Year Published

2020
2020
2023
2023

Publication Types

Select...
4

Relationship

0
4

Authors

Journals

citations
Cited by 4 publications
(1 citation statement)
references
References 33 publications
(47 reference statements)
0
1
0
Order By: Relevance
“…Li et al 20 proposed a trust‐based service composition agent learning model, which designs a new comprehensive trust management model by using a fuzzy comprehensive evaluation method. Lin et al 21 proposed a data‐credibility‐enhancing mechanism for the prevention of internal attacks, which integrates sensitivity‐based data categories, metagraph‐based user group partitioning, and reputation transfer methods into reputation query and evaluation processes. In addition to the above mentioned, scholars have done research on trust or reputation of social networks 22,23 or web service environments 24,25 …”
Section: Related Workmentioning
confidence: 99%
“…Li et al 20 proposed a trust‐based service composition agent learning model, which designs a new comprehensive trust management model by using a fuzzy comprehensive evaluation method. Lin et al 21 proposed a data‐credibility‐enhancing mechanism for the prevention of internal attacks, which integrates sensitivity‐based data categories, metagraph‐based user group partitioning, and reputation transfer methods into reputation query and evaluation processes. In addition to the above mentioned, scholars have done research on trust or reputation of social networks 22,23 or web service environments 24,25 …”
Section: Related Workmentioning
confidence: 99%