Font Size: a A A

Trust Evaluation Mechanism Of Accessing Terminal Based On Cloud-edge Collaboration

Posted on:2022-05-02Degree:MasterType:Thesis
Country:ChinaCandidate:C X XiaFull Text:PDF
GTID:2518306341951619Subject:Computer Science and Technology
Abstract/Summary:PDF Full Text Request
With the development of network applications,the demand of the high response speed and low time delay is increasing.As a result,the Cloud-edge Collaboration is provided as a new computing model which combines the advantages of the both,and proved to be effective to protect the privacy and ensure the quality of the network service.However,due to the complex computing environment,dynamic devices and various accessing terminals,the security and efficiency problems are more and more outstanding.To protect the safety of the Cloud-edge collaboration,the issue of trust evaluation of accessing terminals has attracted many researchers'attention.This article focuses on the evaluation mechanism of accessing terminals,which could be divided to two parts.First,in order to help the edge to update the security strict standards,we design a security strict evaluation model for the accessing terminals.We design an improved LightGBM algorithm to learn the evaluation algorithms of other researchers based on CNN.We construct the data set by simulation and this algorithm is trained in the cloud and could analyze the security condition of the edge in high speed.In this process,the missed malicious devices can be recognized and fitered.Then we the analyze the security severity and design different adjusting strategies to adjust the security strict standards.In addition,in order to protect the response speed facing the emergencies,the design is light-weighted enough and performs good in large-scale environments.From the simulation results we can know the overall performances are good with the application of this model.Secondly,in order to ensure the speed of terminal access,we design a light-weighted trust evaluation algorithm for terminals based on the multi-feedback mechanism.We design the trust features with the considering of many aspects using the Information Entropy Theory.Based on it,we use the EMW algorithm to evaluate the overall credibility of the accessing terminals.From the simulation we can know this algorithm is reliable,light-weighted,privacy safeguarding and performs good against various malicious attacks.In a word,this article studies the trust problems of accessing terminals to improve the security and reliability of the cloud-edge when suffering from the malicious attacks.
Keywords/Search Tags:Cloud-edge Collaboration, Terminal Access, LightGBM algorithm, EMW algorithm
PDF Full Text Request
Related items