A Multi-property Method to Evaluate Trust of Edge Computing Based on Data Driven Capsule Network

As one of the computing paradigms in the process of traditional cloud computing turning to marginalization, edge computing is designed to meet the requirements of edge devices such as real-time response, security, privacy and so on. However, resources in edge computing are generally heterogeneous and dynamic, resulting in lack of trust among devices or a completely untrusted computing resources. Thus, novel and effective methods to evaluate the trust of edge devices in order to increasing the adoption of edge computing resources, have become an urgent issue. In this context the paper proposes a multi-property method to evaluate trust of edge computing, we establish an objective expression of trust property by considering which factors affect trust evaluation in resource request or service application process from the perspective of dynamic change, then the data-driven capsule network is utilized to analyze the correlation between trust properties and gives an objective prediction of trustworthy. The main contribution of this paper is the design of an effective trust evaluation method, which gives the objective reliability of edge devices also coordinates all levels to provide users with trustworthy application services.

[1]  Xiaoyong Li,et al.  A Reliable and Lightweight Trust Computing Mechanism for IoT Edge Devices Based on Multi-Source Feedback Information Fusion , 2018, IEEE Access.

[2]  Geoffrey E. Hinton,et al.  Dynamic Routing Between Capsules , 2017, NIPS.

[3]  Chirine Ghedira,et al.  A Trust Management Solution in the Context of Hybrid Clouds , 2014, 2014 IEEE 23rd International WETICE Conference.

[4]  Randy H. Katz,et al.  A view of cloud computing , 2010, CACM.

[5]  Abdul Hanan Abdullah,et al.  A Secure Trust Model Based on Fuzzy Logic in Vehicular Ad Hoc Networks With Fog Computing , 2017, IEEE Access.

[6]  Jie Zhang,et al.  A Multifaceted Approach to Modeling Agent Trust for Effective Communication in the Application of Mobile Ad Hoc Vehicular Networks , 2011, IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews).

[7]  Chunxiao Chigan,et al.  On Joint Privacy and Reputation Assurance for Vehicular Ad Hoc Networks , 2014, IEEE Transactions on Mobile Computing.

[8]  Zhi-Wei Xu,et al.  Cloud-Sea Computing Systems: Towards Thousand-Fold Improvement in Performance per Watt for the Coming Zettabyte Era , 2014, Journal of Computer Science and Technology.

[9]  Rong Yu,et al.  Distributed Reputation Management for Secure and Efficient Vehicular Edge Computing and Networks , 2017, IEEE Access.

[10]  John Shawe-Taylor,et al.  Canonical Correlation Analysis: An Overview with Application to Learning Methods , 2004, Neural Computation.

[11]  Rodrigo Roman,et al.  Mobile Edge Computing, Fog et al.: A Survey and Analysis of Security Threats and Challenges , 2016, Future Gener. Comput. Syst..

[12]  Chonho Lee,et al.  A survey of mobile cloud computing: architecture, applications, and approaches , 2013, Wirel. Commun. Mob. Comput..

[13]  Feng Zhou,et al.  Scalable Feedback Aggregating (SFA) Overlay for Large-Scale P2P Trust Management , 2012, IEEE Transactions on Parallel and Distributed Systems.

[14]  Grace A. Lewis,et al.  Establishing Trusted Identities in Disconnected Edge Environments , 2016, 2016 IEEE/ACM Symposium on Edge Computing (SEC).

[15]  Tibor Juhas The use of elliptic curves in cryptography , 2007 .