TY - GEN
T1 - A context aware reputation mechanism for enhancing big data veracity in mobile cloud computing
AU - Lin, Hui
AU - Hu, Jia
AU - Liu, Jiajia
AU - Xu, Li
AU - Wu, Yulei
N1 - Publisher Copyright:
© 2015 IEEE.
PY - 2015/12/22
Y1 - 2015/12/22
N2 - Data veracity ensures that the data used are trabusted, authentic and protected from unauthorized access and modification. It is under greater focus than ever before in big data research as data are used for critical decision makings more often. In order to implement the veracity of big data, specific trust models and approaches must be designed and developed. In this paper, a category based context aware and recommendation incentive based reputation mechanism (CCRM) is proposed to defend against the internal attacks to enhance the big data veracity in mobile cloud computing (MCC). In CCRM, the data category and context sensing technologies, security relevance evaluation model and Vickrey-Clark-Groves (VCG) based recommendation incentive scheme are integrated into the reputation evaluation process to defend against the insider attacks to enhance the data veracity. Simulation results and performance analysis demonstrate the superior performance of the CCRM in terms of the utility of the recommender, the reputation decrease speed and update accuracy, compared to the existing reputation mechanisms under internal collusion attacks and bad mouthing attacks in MCC.
AB - Data veracity ensures that the data used are trabusted, authentic and protected from unauthorized access and modification. It is under greater focus than ever before in big data research as data are used for critical decision makings more often. In order to implement the veracity of big data, specific trust models and approaches must be designed and developed. In this paper, a category based context aware and recommendation incentive based reputation mechanism (CCRM) is proposed to defend against the internal attacks to enhance the big data veracity in mobile cloud computing (MCC). In CCRM, the data category and context sensing technologies, security relevance evaluation model and Vickrey-Clark-Groves (VCG) based recommendation incentive scheme are integrated into the reputation evaluation process to defend against the insider attacks to enhance the data veracity. Simulation results and performance analysis demonstrate the superior performance of the CCRM in terms of the utility of the recommender, the reputation decrease speed and update accuracy, compared to the existing reputation mechanisms under internal collusion attacks and bad mouthing attacks in MCC.
KW - Big data veracity
KW - Mechanism design
KW - Mobile cloud computing
KW - Reputation mechanism
UR - http://www.scopus.com/inward/record.url?scp=84964285551&partnerID=8YFLogxK
U2 - 10.1109/CIT/IUCC/DASC/PICOM.2015.304
DO - 10.1109/CIT/IUCC/DASC/PICOM.2015.304
M3 - 会议稿件
AN - SCOPUS:84964285551
T3 - Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
SP - 2049
EP - 2054
BT - Proceedings - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
A2 - Atzori, Luigi
A2 - Jin, Xiaolong
A2 - Jarvis, Stephen
A2 - Liu, Lei
A2 - Calvo, Ramon Aguero
A2 - Hu, Jia
A2 - Min, Geyong
A2 - Georgalas, Nektarios
A2 - Wu, Yulei
PB - Institute of Electrical and Electronics Engineers Inc.
T2 - 15th IEEE International Conference on Computer and Information Technology, CIT 2015, 14th IEEE International Conference on Ubiquitous Computing and Communications, IUCC 2015, 13th IEEE International Conference on Dependable, Autonomic and Secure Computing, DASC 2015 and 13th IEEE International Conference on Pervasive Intelligence and Computing, PICom 2015
Y2 - 26 October 2015 through 28 October 2015
ER -