Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources

نویسندگان

چکیده

Short information sharing time is one of the problems to be solved in traditional Internet. Therefore, this paper proposes a hierarchical simulation Internet Things structure framework that trusts cloud drive resource sharing. By setting thresholds and iterative adjustment parameters, complementary judgment matrix constructed obtain minimum nonnegative deviation value optimal weight vector. This sorts according security model, obtains model avoid human tampering, designs acquisition process ensure reliability source data. We use radio frequency identification (RFID) equipment preprocessing massive heterogeneous data Things. In network environment where resources are limited fully considered, trust-based adaptive detection algorithm used evaluate credibility trust-driven for services propose model. Firstly, key characteristics analyzed. Then, was established by using specific constraints, trust steepness function, evaluation criteria, constraint coefficient. Finally, an example IoT system designed verify effectiveness Experimental results show that, compared with or algorithm, has good effect underlying information.

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things

Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...

متن کامل

Secure Information Sharing in an Industrial Internet of Things

This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT). It also identifies necessary security requirements for secure information sharing based on identified security challenges stated by the industry. The paper then proposes a roadmap for improving security in IIoT which investigates both short-term and long-term ...

متن کامل

A Mutual Authentication Method for Internet of Things

Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...

متن کامل

Trust and the Internet of Things

We present the design of the shoppingLense and its surrounding infrastructure. The shoppingLense is designed to allow open collaborative tagging of patterns within the environment, and for users to browse the environment using augmented reality. We use trust to control the presentation of the patterns and anchors within the augmented reality, building upon trust relationships that are dynamical...

متن کامل

A Novel Trust Management Model in the Social Internet of Things

The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Complexity

سال: 2021

ISSN: ['1099-0526', '1076-2787']

DOI: https://doi.org/10.1155/2021/5573103