Cloud Trust-Driven Hierarchical Sharing Method of Internet of Things Information Resources
نویسندگان
چکیده
Short information sharing time is one of the problems to be solved in traditional Internet. Therefore, this paper proposes a hierarchical simulation Internet Things structure framework that trusts cloud drive resource sharing. By setting thresholds and iterative adjustment parameters, complementary judgment matrix constructed obtain minimum nonnegative deviation value optimal weight vector. This sorts according security model, obtains model avoid human tampering, designs acquisition process ensure reliability source data. We use radio frequency identification (RFID) equipment preprocessing massive heterogeneous data Things. In network environment where resources are limited fully considered, trust-based adaptive detection algorithm used evaluate credibility trust-driven for services propose model. Firstly, key characteristics analyzed. Then, was established by using specific constraints, trust steepness function, evaluation criteria, constraint coefficient. Finally, an example IoT system designed verify effectiveness Experimental results show that, compared with or algorithm, has good effect underlying information.
منابع مشابه
An Efficient Secret Sharing-based Storage System for Cloud-based Internet of Things
Internet of things (IoTs) is the newfound information architecture based on the internet that develops interactions between objects and services in a secure and reliable environment. As the availability of many smart devices rises, secure and scalable mass storage systems for aggregate data is required in IoTs applications. In this paper, we propose a new method for storing aggregate data in Io...
متن کاملSecure Information Sharing in an Industrial Internet of Things
This paper investigates how secure information sharing with external vendors can be achieved in an Industrial Internet of Things (IIoT). It also identifies necessary security requirements for secure information sharing based on identified security challenges stated by the industry. The paper then proposes a roadmap for improving security in IIoT which investigates both short-term and long-term ...
متن کاملA Mutual Authentication Method for Internet of Things
Today, we are witnessing the expansion of various Internet of Things (IoT) applications and services such as surveillance and health. These services are delivered to users via smart devices anywhere and anytime. Forecasts show that the IoT, which is controlled online in the user environment, will reach 25 billion devices worldwide by 2020. Data security is one of the main concerns in the IoT. ...
متن کاملTrust and the Internet of Things
We present the design of the shoppingLense and its surrounding infrastructure. The shoppingLense is designed to allow open collaborative tagging of patterns within the environment, and for users to browse the environment using augmented reality. We use trust to control the presentation of the patterns and anchors within the augmented reality, building upon trust relationships that are dynamical...
متن کاملA Novel Trust Management Model in the Social Internet of Things
The Internet of Things (IoT) and social networking integration, create a new concept named Social Internet of Things (SIoT) according to which the things are able to autonomously establish social relationships with regard to the owners. Things in SIoT operate according to a service-oriented architecture. There may be misbehaving owners and consequently misbehaving devices that can perform harmf...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Complexity
سال: 2021
ISSN: ['1099-0526', '1076-2787']
DOI: https://doi.org/10.1155/2021/5573103