计算机应用 ›› 2013, Vol. 33 ›› Issue (01): 142-145.DOI: 10.3724/SP.J.1087.2013.00142

• 信息安全 • 上一篇    下一篇

基于模糊理论的可信计算信任评估方法研究

莫家庆1,胡忠望1,叶雪琳2   

  1. 1. 肇庆学院 计算机学院, 广东 肇庆 526061
    2. 肇庆学院 教育技术与计算机中心, 广东 肇庆 526061
  • 收稿日期:2012-07-23 修回日期:2012-08-25 出版日期:2013-01-01 发布日期:2013-01-09
  • 通讯作者: 莫家庆
  • 作者简介:莫家庆(1973-),男,广东肇庆人,副教授,CCF会员,主要研究方向:信息安全、数据库;胡忠望(1965-),男,湖南常德人,教授,CCF会员,主要研究方向:计算机网络与安全、信息技术教育;叶雪琳(1971-),女,湖南常德人,助理工程师,主要研究方向:计算机安全。
  • 基金资助:

    广东省高等学校人才引进专项(粤财教[2010]343号);肇庆市科技创新计划项目(2011G212)

Research of trust assessment method in trust computing based on fuzzy theory

MO Jiaqing1,HU Zhongwang1,YE Xuelin2   

  1. 1. School of Computer Science, Zhaoqing University, Zhaoqing Guangdong 526061, China
    2. Education Technology and Computer Center, Zhaoqing University, Zhaoqing Guangdong 526061, China
  • Received:2012-07-23 Revised:2012-08-25 Online:2013-01-01 Published:2013-01-09
  • Contact: MO Jiaqing

摘要: 信任链是可信计算的关键技术之一,如何对其表达和评估是研究热点。针对可信计算环境中影响信任评价的各种复杂因素以及信任关系的不确定性和动态性,提出一种基于模糊理论的可信计算信任评估方法。引入历史度量记录和时间衰减因子以构建直接信任度,建立粒度为5的信任等级空间,并给出间接信任度的模糊评判方法。运用改进的Einstein算子定义相似度函数,在此基础上给出信任链上实体的信任模糊推理和评估过程。方法把模糊推理和信任传递相结合,可以全面地评估信任链上实体的信任度。模拟实验表明,与同类方法相比较,所提方法对恶意评估具有较好的抵抗能力,且评估结果的可信性和可靠性更好,是一种可信计算信任评估的新方法。

关键词: 可信计算, 信任评估, 模糊理论, 信任链, 度量

Abstract: Trust chain is one of the key technologies in trusted computing, and how to express it and assess it is a current hot research focus. According to the complex factors which influence the trust assessment and the uncertainty and dynamism of trust relation in trust computing environment, a trust computing assessment method was proposed based on fuzzy theory. This method established level five space for the trust particle, the historical measurement record and time attenuation factor were introduced to construct the direct trust, and a fuzzy evaluation method of indirect trust was also given. By defining similar degree function with the improved Einstein operator, the trust entity fuzzy reasoning and evaluation process of trust chain was given. This method combined fuzzy reasoning with trust transferring, and it could assess the trust of entity in trust chain fully. The simulation experiments show that, the proposed method has a better ability to resist the malicious assessment and has better credibility and reliability in the results of the assessment as compared with other similar methods. It is a new method for the trust assessment in trusted computing.

Key words: trusted computing, trust assessment, fuzzy theory, trust chain, measurement

中图分类号: