Enhancing cloud-based IoT security through trustworthy cloud service: An integration of security and reputation approach
The Internet of Things (IoT) provides a new paradigm for the development of heterogeneous
and distributed systems, and it has increasingly become a ubiquitous computing service …
and distributed systems, and it has increasingly become a ubiquitous computing service …
A synergetic trust model based on SVM in underwater acoustic sensor networks
Underwater acoustic sensor networks (UASNs) have been widely applied in underwater
scenarios where numerous anchoring or floating sensor nodes collaborate in performing …
scenarios where numerous anchoring or floating sensor nodes collaborate in performing …
A domain partition-based trust model for unreliable clouds
PY Zhang, Y Kong, MC Zhou - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
Cloud computing has become an important scientific computing and commercial application
paradigm. Many computing resources and data exist in clouds, and face various trust issues …
paradigm. Many computing resources and data exist in clouds, and face various trust issues …
A double-blind anonymous evaluation-based trust model in cloud computing environments
P Zhang, M Zhou, Y Kong - IEEE Transactions on Systems …, 2019 - ieeexplore.ieee.org
In the last ten years, cloud services provided many applications in various areas. Most of
them are hosted in a heterogeneous distributed large-scale cloud computing environment …
them are hosted in a heterogeneous distributed large-scale cloud computing environment …
A security reputation model for IoT health data using S-AlexNet and dynamic game theory in cloud computing environment
F Kong, Y Zhou, B Xia, L Pan, L Zhu - IEEe Access, 2019 - ieeexplore.ieee.org
With the rapid development of cloud computing, users are exposed to increasingly serious
security threats such as data leakage and privacy exposure when using cloud platform …
security threats such as data leakage and privacy exposure when using cloud platform …
ZTIMM: A zero-trust-based identity management model for volunteer cloud computing
A Albuali, T Mengistu, D Che - … 13th International Conference, Held as Part …, 2020 - Springer
The availability of efficient, affordable, green computing alternatives for emerging
paradigms, such as edge, mobile, and volunteer cloud computing, is growing. But these …
paradigms, such as edge, mobile, and volunteer cloud computing, is growing. But these …
Trustworthiness evaluation-based routing protocol for incompletely predictable vehicular ad hoc networks
Incompletely predictable vehicular ad hoc networks is a type of networks where vehicles
move in a certain range or just in a particular tendency, which is very similar to some …
move in a certain range or just in a particular tendency, which is very similar to some …
A cloud service selection method based on trust and user preference clustering
In order to achieve universal and personalized cloud service choices in a social network
environment, we propose a cloud service selection method based on trust and user …
environment, we propose a cloud service selection method based on trust and user …
A novel reward and penalty trust evaluation model based on confidence interval using Petri Net
Trust brings a novel means to improve the security of entities. Entities potentially initiate
interactions with each other without having prior contacts. These interactions can either be …
interactions with each other without having prior contacts. These interactions can either be …
Auto‐Adaptive Trust Measurement Model Based on Multidimensional Decision‐Making Attributes for Internet of Vehicles
D Yin, B Gong - Wireless Communications and Mobile …, 2022 - Wiley Online Library
As an important branch and application of the Internet of Things (IoT), the Internet of
Vehicles (IoV) has the characteristics of wide distribution and dynamic connection. The …
Vehicles (IoV) has the characteristics of wide distribution and dynamic connection. The …