The Confidence Level Recognition of Network Computing System Based on Cloud Model

Article Preview

Abstract:

Network computing system exists security issue, so we proposed a calculation method which could distinguish credible level from information mining. The calculation method uses system credible state detector to detect network system entities behaviors which in different environments and the different angles, extraction behaviors that affect credible decision-making as evidence. Normalized the systematic evidence, then the information of data mining based on cloud model and calculation credible identification. Finally, make the decision of system confidence level.

You might also be interested in these eBooks

Info:

Periodical:

Pages:

1109-1113

Citation:

Online since:

February 2014

Authors:

Export:

Price:

Permissions CCC:

Permissions PLS:

Сopyright:

© 2014 Trans Tech Publications Ltd. All Rights Reserved

Share:

Citation:

* - Corresponding Author

[1] Jianxin Li, Jinpeng Huai, XianXian Li, and Li Lin. DTM: A Dynamic Trust Management Model for Internet Computing Environments[J]. Chinese Journal of Computer, 2009, 32(3)493-505.

Google Scholar

[2] Guanghui Chang. Research on Dependable Monitoring in Large-scale Distributed Systems[D]. PHD thesis of Chongqing University, (2011).

Google Scholar

[3] Martinez A M, Kak A C. PCA versus LDA [J]. IEEE Transactions on Pattern Analysis and Machine Intelligence. 2001, 23(2): 228-233.

DOI: 10.1109/34.908974

Google Scholar

[4] Gumus E, Kilic N, Sertbas A, et al. Evaluation of face recognition techniques using PCAwavelets and SVM [J]. Expert Systems with Applications. 2010, 37(9): 6404-6408.

DOI: 10.1016/j.eswa.2010.02.079

Google Scholar

[5] Chuang Lin, and Xuehai Peng. Research on Trustworthy Networks[J]. Chinese Journal of Computer. 2005, 28(5), 751-758.

Google Scholar

[6] Yi Du. Research and Application of Association Rules in Data Mining[D]. PHD thesis of Nanjing PLA University of Science and Technology. 2000. 04.

Google Scholar

[7] Y. Huang, P.E. Chung, C. Kintala, C-Ywang, and D-R. Liang, NT-SwiFT: Software implemented fault tolerance on Windows NT [J], Journal of Systems and Software, 2004, 71(1): 127-141.

DOI: 10.1016/s0164-1212(02)00154-1

Google Scholar

[8] Global Environment for Networking, Investigations [EB/OL]. [2007-08-08] http: /geni. net.

Google Scholar

[9] Junsheng Chang. Research on Reputation Based Trust Management in Internet-based Virtual Computing Enviroment[D]. PHD thesis of National University of Defense Technology, (2008).

Google Scholar