History and Future Information Based Trust Model in C2C E-commerce
Sch. of Comput., North China Electr. Power Univ., Baoding, ChinaDOI: 10.1109/IAS.2009.286 Conference: Information Assurance and Security, 2009. IAS '09. Fifth International Conference on, Volume: 2
Source: IEEE Xplore
In order to solve the problem of trust in C2C e-commerce better, a history and future information based trust model is proposed in this paper. In this model the historical evaluation and future information are all considered. Thus, the entitiespsila historical behaviors are reflected in the trust value, and the starvation effect is prevented effectively. Based on the research achievements of trust and combined with the characteristics of C2C e-commerce, the time decay factor and experience factor are redesigned, and the cheating memory factor is introduced in this paper. The new time decay factor can avoid the reputation value decaying so fast that the historical reputation value is too small; the new experience factor can prevent the valuators from accumulating experience too fast in small-scale transactions; the cheating memory factor can punish the deceivers effectively and prevent them from cheating frequently. Finally, the effectiveness of the model is verified experimentally.
Full-text previewDOI: · Available from: org.cn
Data provided are for informational purposes only. Although carefully collected, accuracy cannot be guaranteed. The impact factor represents a rough estimation of the journal's impact factor and does not reflect the actual current impact factor. Publisher conditions are provided by RoMEO. Differing provisions from the publisher's actual policy or licence agreement may be applicable.
- [Show abstract] [Hide abstract]
ABSTRACT: For the trust evaluation problem in P2P e-commerce, a trust cloud-based dynamic secure trust management model (TCDSTM) was proposed. Cloud theory was used to describe the trust and the trust level in TCDSTM. Then an anti-attack global trust aggregation algorithm, the node type identification and topology reconstruction mechanisms were presented. Both theoretical analysis and simulation results show that TCDSTM not only can resist collusion attack, on-off attack and other malicious attacks, but also can improve the success rate of transactions. In addition, TCDSTM has low communication overhead.
- [Show abstract] [Hide abstract]
ABSTRACT: Cloud computing provides many benefits for individuals and enterprises by offering a range of computing services. The service dynamism, elasticity, economy and choices are too attractive to ignore. At the meantime, cloud computing has opened up a new frontier of challenges by introducing trust scenario. The Trustworthiness Evaluation of cloud Services is a paramount concern. In this paper, we present a framework to quantitatively measure and rank the trustworthiness of cloud services. In particular, we address the fundamental understanding of trustworthiness, quantitative trustworthiness metrics, unified scale of trust factors, trust factors categorization, trust coordinate and multi-criteria analysis for trustworthiness decision making. Our comprehensive framework of trustworthiness evaluation contains five basic building blocks. The preprocessing block query and calculate the existent trustworthiness record. Then the trust factors are collected, if there was no match record found. The trust factor management block categorize the trust factors and convert them by using unified scale. The trust factor processing block is for weighting and positioning of trust factors. The trustworthiness decision making block provide calculation of cloud service trustworthiness, and the results are recorded in our trustworthiness record block. The proposed trustworthiness measurement framework is employed in several experiments by using existing trust dataset. The analysis based on the experiment result indicates our trustworthiness evaluation is accurate and flexible.