Volume 30 Issue 1
Jan.  2021
Turn off MathJax
Article Contents
ZHANG Lin, HUANG Yanwen, XUAN Jie, et al., “Trust Evaluation Model Based on PSO and LSTM for Huge Information Environments,” Chinese Journal of Electronics, vol. 30, no. 1, pp. 92-101, 2021, doi: 10.1049/cje.2020.12.005
Citation: ZHANG Lin, HUANG Yanwen, XUAN Jie, et al., “Trust Evaluation Model Based on PSO and LSTM for Huge Information Environments,” Chinese Journal of Electronics, vol. 30, no. 1, pp. 92-101, 2021, doi: 10.1049/cje.2020.12.005

Trust Evaluation Model Based on PSO and LSTM for Huge Information Environments

doi: 10.1049/cje.2020.12.005
Funds:

the National Natural Science Foundation of China 61572260

the National Natural Science Foundation of China 61872196

the National Natural Science Foundation of China 61872194

the National Natural Science Foundation of China 61402241

Scientific & Technological Support Project of Jiangsu Province BE2017166

the Jiangsu Natural Science Foundation for Excellent Young Scholar BK20160089

Research of Natural Science of NJUPT NY217050

More Information
  • Author Bio:

    HUANG Yanwen   was born in 1995. She is currently pursuing a Master degree in Nanjing University of posts and Telecommunications, China. Her research interests include trust model and data mining. (Email: 15261826052@163.com)

    XUAN Jie   was born in 1993. He received the M.S. degree in information security in Nanjing University of Posts and Telecommunications in 2018. His research interests are focused on network security, trust model and data mining. (Email: 614034012@qq.com)

    FU Xiong   was born in 1979. He received the Ph.D. degree in computer technology from University of Science and Technology of China in 2007. Now, he is an associate professor in Nanjing University of Posts and Telecommunications. His research interests are focused on cloud computing and distributed computing. (Email: fux@njupt.edu.cn)

    LIN Qiaomin   was born in 1979. He received the Ph.D. degree in information network from the Nanjing University of Posts and Telecommunications in 2011. Now, he is an associate professor in the same university. His research interests are focused on privacy protection and Internet of things. (Email: lqm@njupt.edu.cn)

    WANG Ruchuan   was born is 1943. Now he is a professor and a doctorial tutor in Nanjing University of Posts and Telecommunications. He can also enroll new postdoctoral researchers in information and communication engineering in the same college. His research interests are computer software, computer network, information security and Wireless Sensor Network. (Email: wangrc@njupt.edu.cn)

  • Corresponding author: ZHANG Lin   (corresponding author) was born in 1980. She received the Ph.D. degree in information network from the Nanjing University of Posts and Telecommunications in 2009. Now, she is a postdoctoral researcher and is an associate professor in the same university. Her research interests are focused on service computing, network security and trust model. (Email: zhangl@njupt.edu.cn)
  • Received Date: 2018-09-24
  • Accepted Date: 2019-09-10
  • Publish Date: 2021-01-01
  • Due to the challenge of increasing data volume, the traditional trust model is unable to manage data with high efficiency and effectively extract useful information hidden in big data. To fully utilize big data and combine machine learning with trust evaluation, a trust evaluation model based on Long short-term memory (LSTM) is presented. The powerful learning ability, expressive ability and dynamic timing of LSTM can be applied to study data while avoiding the vanishing and exploding gradient phenomena of traditional Recurrent neural networks (RNNs) to ensure that the model can learn sequences of random length and provide accurate trust evaluation. Targeting the performance instability caused by the LSTM model's random initialization of weights and thresholds, Particle swarm optimization (PSO), one of the intelligent algorithms, is introduced to find global optimal initial weights and thresholds. Experiments proved that the trust model proposed in this paper has high accuracy and contributes a new idea for trust evaluation in big data environments.
  • loading
  • [1]
    Y.K. Li, S.H. Liu, D. Li, et al., "Release connection fingerprints in social networks using personalized differential privacy", Chinese Journal of Electronics, Vol. 27, No. 5, pp. 1104-1110, 2018. doi: 10.1049/cje.2017.08.008
    [2]
    G.D. Angelo, S. Rampone and F. Palmieri, "Developing a trust model for pervasive computing based on Apriori association rules learning and bayesian classification", Soft Computing, Vol. 21, No. 21, pp. 6297-6315, 2017. doi: 10.1007/s00500-016-2183-1
    [3]
    S. Siadat, A.M. Rahmani and H. Navid, "Identifying fake feedback in cloud trust management systems using feedback evaluation component and Bayesian game model", Journal of Supercomputing, Vol. 73, No. 6, pp. 1-23, 2017.
    [4]
    C.H. Yu, X.J. Liu, B. Li, et al., "Mobile service recommendation based on context similarity and social network", Chinese Journal of Electronics, Vol. 45, No. 6, pp. 1530-1536, 2017. (in Chinese) http://en.cnki.com.cn/Article_en/CJFDTOTAL-DZXU201706036.htm
    [5]
    C. Fernandez-Gago, I. Agudo and J. Lopez, "Building trust from context similarity measures", Computer Standards & Interfaces, Vol. 36, No. 4, pp. 792-800, 2014.
    [6]
    M. J Sule, M. Li, G. Taylor, et al., "Fuzzy logic approach to modelling trust in cloud computing", IET Cyber-Physical Systems: Theory & Applications, Vol. 2, No. 2, pp. 84-89, 2017.
    [7]
    H. Shirgahi, M. Mohsenzadeh and H.H.S. Javadi, "A three level fuzzy system for evaluating the trust of single web services", Journal of Intelligent & Fuzzy Systems, Vol. 32, No. 1, pp. 1-23, 2016.
    [8]
    S.A. Soleymani, A.H. Abdullah, M. Zareei, et al., "A secure trust model based on fuzzy logic in vehicular ad hoc networks with fog computing", IEEE Access, Vol. 5, pp. 15619-15629, 2017. doi: 10.1109/ACCESS.2017.2733225
    [9]
    H. Xia, Z. Jia and H.M. Sha, "Research of trust model based on fuzzy theory in mobile ad hoc networks", IET Information Security, Vol. 8, No. 2, pp. 88-1033, 2013. doi: 10.1049/iet-ifs.2012.0145
    [10]
    H.Y. Cai, Z. Li and J.F. Tian, "A new trust evaluation model based on cloud theory in e-commerce environment", IEEE International Symposium on Intelligence Information Processing and Trusted Computing, Huanggang, China, pp. 139-142, 2011.
    [11]
    Z.Y. Yu, H.W. Zhang, Niu K, et al., "Research on service trust evaluation approach under cloud computing environment", IET International Conference on Cyberspace Technology, Beijing, China, pp. 1-5, 2016.
    [12]
    Y. P Xiao, H.H. Yao and Y.B. Liu, "A WSNs node reputation security scheme based on cloud model", Chinese Journal of Electronics, Vol. 44, No. 1, pp. 168-175, 2016. (in Chinese) http://www.cqvip.com/QK/90131X/201601/668743114.html
    [13]
    M. Chiregi and N.J. Navimipour, "A comprehensive study of the trust evaluation mechanisms in the cloud computing", Journal of Service Science Research, Vol. 9, No. 1, pp. 1-30, 2017. doi: 10.1007/s12927-017-0001-7
    [14]
    L. Zhang, J.W. Liu and R. C Wang, et al., "Trust evaluation model based on improved D-S evidence theory", Journal of Communications, Vol. 34, No. 7, pp. 167-173, 2013. (in Chinese) http://en.cnki.com.cn/Article_en/CJFDTOTAL-TXXB201307018.htm
    [15]
    Q.Y. Zhao, Zuo WL, Tian ZS, et al., "A method for assessment of trust relationship strength based on the improved D-S evidence theory", Chinese Journal of Computers, Vol. 37, No. 4, pp. 873-883, 2014. (in Chinese) http://www.researchgate.net/publication/286323607_A_method_for_assessment_of_trust_relationship_strength_based_on_the_improved_D-S_evidence_theory
    [16]
    Y. Wang, X. Wang and W.L. Zuo, "Trust prediction podeling based on social theories", Journal of Software, Vol. 25, No. 12, pp. 2893-2904, 2014. (in Chinese)
    [17]
    W.Y. Zhang, B. Wu, Y.S. Geng, et al., "Rating and trust prediction based on collective matrix factorization", Acta Electronica Sinica, Vol. 44, No. 7, pp. 1582-1586, 2016. (in Chinese) http://en.cnki.com.cn/Article_en/CJFDTOTAL-DZXU201607009.htm
    [18]
    S. Hou, X.G. Luo and K. Song, "A maximum entropy weighted trust-analysis algorithm based on sources clustering", Acta Electronica Sinica, Vol. 44, No. 5, pp. 993-999, 2015. (in Chinese) http://www.researchgate.net/publication/283099310_A_maximum_entropy_weighted_trust-analysis_algorithm_based_on_sources_clustering
    [19]
    Y. Wang, Q. Chen, C. Kang, et al., "Clustering of electricity consumption behavior dynamics toward big data applications", IEEE Transactions on Smart Grid, Vol. 7, No. 5, pp. 2437-2447, 2017. http://ieeexplore.ieee.org/document/7448460/
    [20]
    Wu J, Guo S, Li J, et al., "Big data meet green challenges: big data toward green applications", IEEE Systems Journal, Vol. 10, No. 3, pp. 888-900, 2016. doi: 10.1109/JSYST.2016.2550530
    [21]
    K.E. Jie, D. Hong, T. Cheng, et al., "PBWA: A Provenance-Based What-If Analysis Approach for Data Mining Processes", Chinese Journal of Electronics, Vol. 26, No. 5, pp. 986-992, 2017. doi: 10.1049/cje.2017.06.003
    [22]
    P.F. Shen, S.F. Liu and L. Han, "Distrust prediction in signed social network", Chinese Journal of Electronics, Vol. 28, No. 1, pp. 188-194, 2019. http://www.cnki.com.cn/Article/CJFDTotal-EDZX201901025.htm
    [23]
    S. Ramaswamy, "Efficient algorithms for mining outliers from large data sets", ACM Sigmod Record, Vol. 29, No. 2, pp. 427-438, 2000. doi: 10.1145/335191.335437
    [24]
    S. Hochreiter and J. Schmidhuber, "Long short-term memory", Neural Computation, Vol. 9, No. 8, pp. 1735-1780, 1997.
    [25]
    J. Madar, J. Abonyi and F. Szeifert, "Interactive particle swarm optimization", Proceedings of the 2005 5th International Conference on Intelligent Systems Design and Applications, Montreal, Canada, pp. 314-319, 2005.
    [26]
    R. Eberhart and Y. Shi, "Particle swarm optimization: developments, applications and resources", Proceedings of the 2001 Congress on Evolutionary Computation (IEEE Cat. No. 01TH8546), California, USA, pp. 81-86, 2002.
    [27]
    P.J. Werbos, "Backpropagation through time: what it does and how to do it", Proceedings of the IEEE, Vol. 78, No. 10, pp. 1550-1560, 1990. doi: 10.1109/5.58337
    [28]
    D. Wei, L. Hu, J.W. Sun, et al., "A new trust model for online social networks", 2016 First IEEE International Conference on Computer Communication and the Internet. IEEE, Nagoya, Japan, pp. 300-304, 2016.
  • 加载中

Catalog

    通讯作者: 陈斌, bchen63@163.com
    • 1. 

      沈阳化工大学材料科学与工程学院 沈阳 110142

    1. 本站搜索
    2. 百度学术搜索
    3. 万方数据库搜索
    4. CNKI搜索

    Figures(10)  / Tables(3)

    Article Metrics

    Article views (494) PDF downloads(17) Cited by()
    Proportional views
    Related

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return